Sample records for security policy challenges

  1. Guidelines for Network Security in the Learning Environment.

    ERIC Educational Resources Information Center

    Littman, Marlyn Kemper

    1996-01-01

    Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)

  2. Computer Network Security- The Challenges of Securing a Computer Network

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2011-01-01

    This article is intended to give the reader an overall perspective on what it takes to design, implement, enforce and secure a computer network in the federal and corporate world to insure the confidentiality, integrity and availability of information. While we will be giving you an overview of network design and security, this article will concentrate on the technology and human factors of securing a network and the challenges faced by those doing so. It will cover the large number of policies and the limits of technology and physical efforts to enforce such policies.

  3. Strategic Planning for Comprehensive Security in the European Union’s Military Operations: EUFOR RD Congo, EUFOR Tchad/RCA, and EUNAVFOR Somalia

    DTIC Science & Technology

    2010-06-01

    Globalization and Environmental Challenges: Reconceptualizing Security in the 21st Century, 947. 11 Marco A. Ferroni and Ashoka Mody, International Public...Security and Defence Policy, 67–70; Howorth, Security and Defence Policy in the European Union, 152–154. 47 Hubert Zimmermann, “Security Exporters...consilium.europa.eu/showPage.aspx?id=1519&lang=en (accessed 12 March 2010). Ferroni, Marco A. and Ashoka Mody. International Public Goods: Incentives

  4. Youth transitioning out of foster care: an evaluation of a Supplemental Security Income policy change.

    PubMed

    King, Laura; Rukh-Kamaa, Aneer

    2013-01-01

    Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.

  5. Global Warming: Its Implications for U.S. National Security Policy

    DTIC Science & Technology

    2009-03-19

    The approach to this topic will be to look at the science behind anthropogenic global warming . Is man largely responsible for causing global warming due...paper will then investigate the nexus between global warming and U.S. national security policy. It will address the challenges facing U.S. leaders and...policy makers as they tackle the issue of global warming and its implications for U.S. policy. Finally it will conclude with recommendations for those

  6. Security Planning and Policies to Meet the Challenges of Climate Change

    DTIC Science & Technology

    2010-07-01

    Security Climate change poses challenges to societies and governments that go far beyond the alteration of our environment. The physical impacts of...capacity of governments to respond. In this sense, the growing likelihood of events such as mass migrations, crop failures, economic shocks, public...riots and violence, floods and other natural disasters, widespread epidemics, and competition for resources pose serious challenges for governments and

  7. The Two Solitudes of Educational Policy and the Challenge of Development

    ERIC Educational Resources Information Center

    Murgatroyd, Stephen; Sahlberg, Pasi

    2016-01-01

    Policy makers are challenged to improve educational outcomes, manage scarce resources and secure public acceptance of their initiatives to provide quality, relevant and effective education. In making decisions they are pulled between competing ideologies about the process and purposes of schooling. This paper explores these ideologies and suggests…

  8. Information security risk management for computerized health information systems in hospitals: a case study of Iran.

    PubMed

    Zarei, Javad; Sadoughi, Farahnaz

    2016-01-01

    In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.

  9. Honduran-U.S. Relations

    DTIC Science & Technology

    2010-11-30

    legislature should help the government secure approval of its policy agenda, the political crisis left the new President with daunting challenges...The Lobo government faces significant challenges in fostering economic development in one of the hemisphere’s poorest countries; securing...indicators. The government has little room to address these issues as the country’s fiscal balance has deteriorated in recent years despite benefiting

  10. A European Perspective on Security Research

    NASA Astrophysics Data System (ADS)

    Liem, Khoen; Hiller, Daniel; Castex, Christoph

    Tackling the complexity and interdependence of today's security environment in the globalized world of the 21st century is an everlasting challenge. Whereas the end of the Cold War presented a caesura of global dimension for the political and economic architecture and a realignment of power distribution and international relations between former adversaries, September 11th of 2001 may be seen as another caesura. Since then, specifically among countries of the Western hemisphere, traditional security paradigms and theories have been critically questioned and the different security cultures and perceptions have resulted in diverse security and defence policies as well as in security research efforts of individual countries. Consensus, it seems, exists on the question of what the threats are that our modern interconnected societies are facing. Whether looking at international terrorism, organized crime, climate change, the illegal trafficking of goods and people or naturally caused catastrophes, these phenomena all have in common that they are in most cases of transnational nature. Formerly existing dividing lines between internal and external security continue to fade, presenting an enormous challenge for those in charge of designing security policy and even more so for the various institutions safeguarding European security. That is why dissent often revolves around the question on how to get hold of these complex problems. Geographic location, cultural background, ethical make-up of society as well as relations with neighbouring countries are all important aspects to be considered when assessing the security culture and policy of individual countries.

  11. Shared Electronic Health Record Systems: Key Legal and Security Challenges.

    PubMed

    Christiansen, Ellen K; Skipenes, Eva; Hausken, Marie F; Skeie, Svein; Østbye, Truls; Iversen, Marjolein M

    2017-11-01

    Use of shared electronic health records opens a whole range of new possibilities for flexible and fruitful cooperation among health personnel in different health institutions, to the benefit of the patients. There are, however, unsolved legal and security challenges. The overall aim of this article is to highlight legal and security challenges that should be considered before using shared electronic cooperation platforms and health record systems to avoid legal and security "surprises" subsequent to the implementation. Practical lessons learned from the use of a web-based ulcer record system involving patients, community nurses, GPs, and hospital nurses and doctors in specialist health care are used to illustrate challenges we faced. Discussion of possible legal and security challenges is critical for successful implementation of shared electronic collaboration systems. Key challenges include (1) allocation of responsibility, (2) documentation routines, (3) and integrated or federated access control. We discuss and suggest how challenges of legal and security aspects can be handled. This discussion may be useful for both current and future users, as well as policy makers.

  12. Information security risk management for computerized health information systems in hospitals: a case study of Iran

    PubMed Central

    Zarei, Javad; Sadoughi, Farahnaz

    2016-01-01

    Background In recent years, hospitals in Iran – similar to those in other countries – have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. Materials and methods This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts’ opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Results Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Conclusion Information security risk management is not followed by Iran’s hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran’s Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran. PMID:27313481

  13. Updating energy security and environmental policy: Energy security theories revisited.

    PubMed

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. Climate challenges, vulnerabilities, and food security

    PubMed Central

    Nelson, Margaret C.; Ingram, Scott E.; Dugmore, Andrew J.; Streeter, Richard; Peeples, Matthew A.; McGovern, Thomas H.; Hegmon, Michelle; Arneborg, Jette; Brewington, Seth; Spielmann, Katherine A.; Simpson, Ian A.; Strawhacker, Colleen; Comeau, Laura E. L.; Torvinen, Andrea; Madsen, Christian K.; Hambrecht, George; Smiarowski, Konrad

    2016-01-01

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy. PMID:26712017

  15. Climate challenges, vulnerabilities, and food security.

    PubMed

    Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad

    2016-01-12

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.

  16. The Brazilian school feeding programme: an example of an integrated programme in support of food and nutrition security.

    PubMed

    Sidaner, Emilie; Balaban, Daniel; Burlandy, Luciene

    2013-06-01

    The present paper analyses the advances and challenges of the school feeding programme in Brazil (PNAE), as part of the Brazilian experience building up an integrated food and nutrition security national system. It explores the role of policy and regulatory frameworks in constructing quality service delivery and intersectoral integration. Review of PNAE and federal government technical documents and studies, legislation, minutes of meetings and official documents of the National Council of Food and Nutrition Security from 2003 to 2011. Food insecurity has decreased significantly in Brazil in the last decade, indicating that appropriate choices were made in terms of public policies and institutional arrangements, which other countries can learn from. Brazil food and nutrition security system; school feeding; school food. Brazil's integrated food and nutrition security policy approach promoted intersectorality in the food system, articulating actions to guarantee access to healthy food and to strengthen family farming. The quality of school meals has progressively improved; in particular, the availability of fruits and vegetables increased. However, national standards regarding menu composition have not yet been met. Regulations were an important factor, along with the policy approach linking food production, nutrition, health and education. Challenges are related to conflict of interests and to farmers' insufficient capacity to meet supply requirements and comply with technical procedures. Local food production, school meals and nutrition education can be linked through integrated programmes and policies, improving access to healthier foods. Government leadership, strong legislation, civil society participation and intersectoral decision making are determinant.

  17. On the Water-Food Nexus: an Optimization Approach for Water and Food Security

    NASA Astrophysics Data System (ADS)

    Mortada, Sarah; Abou Najm, Majdi; Yassine, Ali; Alameddine, Ibrahim; El-Fadel, Mutasem

    2016-04-01

    Water and food security is facing increased challenges with population increase, climate and land use change, as well as resource depletion coupled with pollution and unsustainable practices. Coordinated and effective management of limited natural resources have become an imperative to meet these challenges by optimizing the usage of resources under various constraints. In this study, an optimization model is developed for optimal resource allocation towards sustainable water and food security under nutritional, socio-economic, agricultural, environmental, and natural resources constraints. The core objective of this model is to maximize the composite water-food security status by recommending an optimal water and agricultural strategy. The model balances between the healthy nutritional demand side and the constrained supply side while considering the supply chain in between. It equally ensures that the population achieves recommended nutritional guidelines and population food-preferences by quantifying an optimum agricultural and water policy through transforming optimum food demands into optimum cropping policy given the water and land footprints of each crop or agricultural product. Through this process, water and food security are optimized considering factors that include crop-food transformation (food processing), water footprints, crop yields, climate, blue and green water resources, irrigation efficiency, arable land resources, soil texture, and economic policies. The model performance regarding agricultural practices and sustainable food and water security was successfully tested and verified both at a hypothetical and pilot scale levels.

  18. How much land-based greenhouse gas mitigation can be achieved without compromising food security and environmental goals?

    PubMed

    Smith, Pete; Haberl, Helmut; Popp, Alexander; Erb, Karl-Heinz; Lauk, Christian; Harper, Richard; Tubiello, Francesco N; de Siqueira Pinto, Alexandre; Jafari, Mostafa; Sohi, Saran; Masera, Omar; Böttcher, Hannes; Berndes, Göran; Bustamante, Mercedes; Ahammad, Helal; Clark, Harry; Dong, Hongmin; Elsiddig, Elnour A; Mbow, Cheikh; Ravindranath, Nijavalli H; Rice, Charles W; Robledo Abad, Carmenza; Romanovskaya, Anna; Sperling, Frank; Herrero, Mario; House, Joanna I; Rose, Steven

    2013-08-01

    Feeding 9-10 billion people by 2050 and preventing dangerous climate change are two of the greatest challenges facing humanity. Both challenges must be met while reducing the impact of land management on ecosystem services that deliver vital goods and services, and support human health and well-being. Few studies to date have considered the interactions between these challenges. In this study we briefly outline the challenges, review the supply- and demand-side climate mitigation potential available in the Agriculture, Forestry and Other Land Use AFOLU sector and options for delivering food security. We briefly outline some of the synergies and trade-offs afforded by mitigation practices, before presenting an assessment of the mitigation potential possible in the AFOLU sector under possible future scenarios in which demand-side measures codeliver to aid food security. We conclude that while supply-side mitigation measures, such as changes in land management, might either enhance or negatively impact food security, demand-side mitigation measures, such as reduced waste or demand for livestock products, should benefit both food security and greenhouse gas (GHG) mitigation. Demand-side measures offer a greater potential (1.5-15.6 Gt CO2 -eq. yr(-1) ) in meeting both challenges than do supply-side measures (1.5-4.3 Gt CO2 -eq. yr(-1) at carbon prices between 20 and 100 US$ tCO2 -eq. yr(-1) ), but given the enormity of challenges, all options need to be considered. Supply-side measures should be implemented immediately, focussing on those that allow the production of more agricultural product per unit of input. For demand-side measures, given the difficulties in their implementation and lag in their effectiveness, policy should be introduced quickly, and should aim to codeliver to other policy agenda, such as improving environmental quality or improving dietary health. These problems facing humanity in the 21st Century are extremely challenging, and policy that addresses multiple objectives is required now more than ever. © 2013 John Wiley & Sons Ltd.

  19. National Security Policy and Security Challenges of Maldives

    DTIC Science & Technology

    2014-06-13

    creates the true problems the Maldivians are currently facing. Hidden agendas, unprofessionalism, and low ethical standards of politicians and...based on sharia law. The theories of cultural relativism and democracy strongly advocate the freedoms of societies, thus the Maldivian decision as a

  20. Type-Based Access Control in Data-Centric Systems

    NASA Astrophysics Data System (ADS)

    Caires, Luís; Pérez, Jorge A.; Seco, João Costa; Vieira, Hugo Torres; Ferrão, Lúcio

    Data-centric multi-user systems, such as web applications, require flexible yet fine-grained data security mechanisms. Such mechanisms are usually enforced by a specially crafted security layer, which adds extra complexity and often leads to error prone coding, easily causing severe security breaches. In this paper, we introduce a programming language approach for enforcing access control policies to data in data-centric programs by static typing. Our development is based on the general concept of refinement type, but extended so as to address realistic and challenging scenarios of permission-based data security, in which policies dynamically depend on the database state, and flexible combinations of column- and row-level protection of data are necessary. We state and prove soundness and safety of our type system, stating that well-typed programs never break the declared data access control policies.

  1. Climate change, resource use and food security in midcentury under a range of plausible scenarios

    NASA Astrophysics Data System (ADS)

    Wiebe, K.

    2016-12-01

    Achieving and maintaining food security at local, national and global scales is challenged by changes in population, income and climate, among other socioeconomic and biophysical drivers. Assessing these challenges and possible solutions over the coming decades requires a systematic and multidisciplinary approach. The Global Futures and Strategic Foresight program, a CGIAR initiative led by the International Food Policy Research Institute in collaboration with the 14 other CGIAR research centers, is working to improve tools and conduct ex ante assessments of promising technologies, investments and policies under alternative global futures to inform decision making in the CGIAR and its partners. Alternative socioeconomic and climate scenarios are explored using an integrated system of climate, water, crop and economic models. This presentation will share findings from recent projections of food production and prices to 2050 at global and regional scales, together with their potential implications for land and water use, food security, nutrition and health.

  2. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    NASA Astrophysics Data System (ADS)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  3. Dynamic and adaptive policy models for coalition operations

    NASA Astrophysics Data System (ADS)

    Verma, Dinesh; Calo, Seraphin; Chakraborty, Supriyo; Bertino, Elisa; Williams, Chris; Tucker, Jeremy; Rivera, Brian; de Mel, Geeth R.

    2017-05-01

    It is envisioned that the success of future military operations depends on the better integration, organizationally and operationally, among allies, coalition members, inter-agency partners, and so forth. However, this leads to a challenging and complex environment where the heterogeneity and dynamism in the operating environment intertwines with the evolving situational factors that affect the decision-making life cycle of the war fighter. Therefore, the users in such environments need secure, accessible, and resilient information infrastructures where policy-based mechanisms adopt the behaviours of the systems to meet end user goals. By specifying and enforcing a policy based model and framework for operations and security which accommodates heterogeneous coalitions, high levels of agility can be enabled to allow rapid assembly and restructuring of system and information resources. However, current prevalent policy models (e.g., rule based event-condition-action model and its variants) are not sufficient to deal with the highly dynamic and plausibly non-deterministic nature of these environments. Therefore, to address the above challenges, in this paper, we present a new approach for policies which enables managed systems to take more autonomic decisions regarding their operations.

  4. Biofuels and Food Security. A report by the High Level Panel of Experts on Food Security and Nutrition

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    NONE

    In October 2011, the UN Committee on World Food Security (CFS) recommended a ''review of biofuels policies -- where applicable and if necessary -- according to balanced science-based assessments of the opportunities and challenges that they may represent for food security so that biofuels can be produced where it is socially, economically and environmentally feasible to do so''. In line with this, the CFS requested the HLPE (High Level Panel of Experts) to ''conduct a science-based comparative literature analysis taking into consideration the work produced by the FAO and Global Bioenergy Partnership (GBEP) of the positive and negative effects ofmore » biofuels on food security''. Recommendations from the report include the following. Food security policies and biofuel policies cannot be separated because they mutually interact. Food security and the right to food should be priority concerns in the design of any biofuel policy. Governments should adopt the principle: biofuels shall not compromise food security and therefore should be managed so that food access or the resources necessary for the production of food, principally land, biodiversity, water and labour are not put at risk. The CFS should undertake action to ensure that this principle is operable in the very varied contexts in which all countries find themselves. Given the trend to the emergence of a global biofuels market, and a context moving from policy-driven to market-driven biofuels, there is an urgent need for close and pro-active coordination of food security, biofuel/bioenergy policies and energy policies, at national and international levels, as well as rapid response mechanisms in case of crisis. There is also an urgent need to create an enabling, responsible climate for food and non-food investments compatible with food security. The HLPE recommends that governments adopt a coordinated food security and energy security strategy, which would require articulation around the following five axes/dimensions: Adapt to the change to global, market-driven dynamics; Address the land, water and resource implications of biofuel policies; Foster the transition from biofuels to comprehensive food-energy policies; Promote research and development; and, Develop methods and guidelines for coordinated food, Biofuels, and bio-energy policies at national and international levels.« less

  5. Construction of the food and nutrition security policy in Brazil: strategies and challenges in the promotion of intersectorality at the federal government level.

    PubMed

    Burlandy, Luciene

    2009-01-01

    This article analyzes institutional strategies of the Brazilian federal government that aim at promoting intersectorality in the field of Food and Nutrition Security (FNS), based on bibliographic review and document analysis. It is assumed that, although formal institutionality in this government level is not enough to promote intersectorality, it is important in process induction. It follows that the combination of different institutional mechanisms favors intersectorality, such as: the existence and location of councils integrated by government sectors and civil society in the presidency; political support by the presidency and inclusion of the issue as being strategic in the governmental agenda; assembly of institutional spaces that articulate the highest government spheres and that integrate technical levels; programs that integrate food production, commercialization, and consumption. Challenges concern interrelation with economic policy and the construction of budget agreed among sectors, integrated to policy management and monitoring.

  6. Achieving sustainable irrigation water withdrawals: global impacts on food security and land use

    NASA Astrophysics Data System (ADS)

    Liu, Jing; Hertel, Thomas W.; Lammers, Richard B.; Prusevich, Alexander; Baldos, Uris Lantz C.; Grogan, Danielle S.; Frolking, Steve

    2017-10-01

    Unsustainable water use challenges the capacity of water resources to ensure food security and continued growth of the economy. Adaptation policies targeting future water security can easily overlook its interaction with other sustainability metrics and unanticipated local responses to the larger-scale policy interventions. Using a global partial equilibrium grid-resolving model SIMPLE-G, and coupling it with the global Water Balance Model, we simulate the consequences of reducing unsustainable irrigation for food security, land use change, and terrestrial carbon. A variety of future (2050) scenarios are considered that interact irrigation productivity with two policy interventions— inter-basin water transfers and international commodity market integration. We find that pursuing sustainable irrigation may erode other development and environmental goals due to higher food prices and cropland expansion. This results in over 800 000 more undernourished people and 0.87 GtC additional emissions. Faster total factor productivity growth in irrigated sectors will encourage more aggressive irrigation water use in the basins where irrigation vulnerability is expected to be reduced by inter-basin water transfer. By allowing for a systematic comparison of these alternative adaptations to future irrigation vulnerability, the global gridded modeling approach offers unique insights into the multiscale nature of the water scarcity challenge.

  7. Evolution and complexity of government policies to protect the health of undocumented/illegal migrants in Thailand – the unsolved challenges

    PubMed Central

    Suphanchaimat, Rapeepong; Putthasri, Weerasak; Prakongsai, Phusit; Tangcharoensathien, Viroj

    2017-01-01

    Background Of the 65 million residents in Thailand, >1.5 million are undocumented/illegal migrants from neighboring countries. Despite several policies being launched to improve access to care for these migrants, policy implementation has always faced numerous challenges. This study aimed to investigate the policy makers’ views on the challenges of implementing policies to protect the health of undocumented/illegal migrants in light of the dynamics of all of the migrant policies in Thailand. Methods This study used a qualitative approach. Data were collected by document review, from related laws/regulations concerning migration policy over the past 40 years, and from in-depth interviews with seven key policy-level officials. Thematic analysis was applied. Results Three critical themes emerged, namely, national security, economic necessity, and health protection. The national security discourse played a dominant role from the early 1900s up to the 1980s as Thailand attempted to defend itself from the threats of colonialism and communism. The economic boom of the 1990s created a pronounced labor shortage, which required a large migrant labor force to drive the growing economy. The first significant attempt to protect the health of migrants materialized in the early 2000s, after Thailand achieved universal health coverage. During that period, public insurance for undocumented/illegal migrants was introduced. The insurance used premium-based financing. However, the majority of migrants remained uninsured. Recently, the government attempted to overhaul the entire migrant registry system by introducing a new measure, namely the One Stop Service. In principle, the One Stop Service aimed to integrate the functions of all responsible authorities, but several challenges still remained; these included ambiguous policy messages and the slow progress of the nationality verification process. Conclusion The root causes of the challenges in migrant health policy are incoherent policy direction and objectives across government authorities and unclear policy messages. In addition, the health sector, especially the Ministry of Public Health, has been de facto powerless and, due to its outdated bureaucracy, has lacked the capacity to keep pace with the problems regarding human mobility. PMID:28458588

  8. Evolution and complexity of government policies to protect the health of undocumented/illegal migrants in Thailand - the unsolved challenges.

    PubMed

    Suphanchaimat, Rapeepong; Putthasri, Weerasak; Prakongsai, Phusit; Tangcharoensathien, Viroj

    2017-01-01

    Of the 65 million residents in Thailand, >1.5 million are undocumented/illegal migrants from neighboring countries. Despite several policies being launched to improve access to care for these migrants, policy implementation has always faced numerous challenges. This study aimed to investigate the policy makers' views on the challenges of implementing policies to protect the health of undocumented/illegal migrants in light of the dynamics of all of the migrant policies in Thailand. This study used a qualitative approach. Data were collected by document review, from related laws/regulations concerning migration policy over the past 40 years, and from in-depth interviews with seven key policy-level officials. Thematic analysis was applied. Three critical themes emerged, namely, national security, economic necessity, and health protection. The national security discourse played a dominant role from the early 1900s up to the 1980s as Thailand attempted to defend itself from the threats of colonialism and communism. The economic boom of the 1990s created a pronounced labor shortage, which required a large migrant labor force to drive the growing economy. The first significant attempt to protect the health of migrants materialized in the early 2000s, after Thailand achieved universal health coverage. During that period, public insurance for undocumented/illegal migrants was introduced. The insurance used premium-based financing. However, the majority of migrants remained uninsured. Recently, the government attempted to overhaul the entire migrant registry system by introducing a new measure, namely the One Stop Service. In principle, the One Stop Service aimed to integrate the functions of all responsible authorities, but several challenges still remained; these included ambiguous policy messages and the slow progress of the nationality verification process. The root causes of the challenges in migrant health policy are incoherent policy direction and objectives across government authorities and unclear policy messages. In addition, the health sector, especially the Ministry of Public Health, has been de facto powerless and, due to its outdated bureaucracy, has lacked the capacity to keep pace with the problems regarding human mobility.

  9. Security, development and human rights: normative, legal and policy challenges for the international drug control system.

    PubMed

    Barrett, Damon

    2010-03-01

    This commentary addresses some of the challenges posed by the broader normative, legal and policy framework of the United Nations for the international drug control system. The 'purposes and principles' of the United Nations are presented and set against the threat based rhetoric of the drug control system and the negative consequences of that system. Some of the challenges posed by human rights law and norms to the international drug control system are also described, and the need for an impact assessment of the current system alongside alternative policy options is highlighted as a necessary consequence of these analyses. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  10. Fifty Years of Social Security: Past Achievements and Future Challenges. An Information Paper Prepared for Use by the Special Committee on Aging. United States Senate, Ninety-Ninth Congress, First Session.

    ERIC Educational Resources Information Center

    Congress of the U.S., Washington, DC. Senate Special Committee on Aging.

    This document contains six essays examining the history and impact of the social security program on America's economic and social development. "Social Security: The Cornerstone of American Social Welfare Policy," by Malcolm H. Morrison, presents brief background information on the system and discusses the basic principles of social…

  11. Inside the Wire: American Security and Cyber Warfare

    DTIC Science & Technology

    2017-03-01

    Baumbauer, Derek E. "Ghost in the Network." University Of Pennsylvania Law Review 162, no. 5(April 2014): 1011-91. Daniali, Ghorban. "E- Money Laundering ...Challenges, Shared Opportunities." Strategic Studies Quarterly 6, no. 1(Spring 2012): 3-8. Cser, Orsolya. "The Role and Security of Money From the...34 Journal of National Security Law & Policy 7, no. 1(February 2014): 115-38. Cser, Orsolya. "The Role and Security of Money From the Aspect of Cyber

  12. Policy Challenges of Accelerating Technological Change: Security Policy and Strategy Implications of Parallel Scientific Revolutions

    DTIC Science & Technology

    2014-09-01

    generation, exotic storage technologies, smart power grid management, and better power sources for directed-energy weapons (DEW). Accessible partner nation...near term will help to mitigate risks and improve outcomes. 2 Forecasting typically extrapolates predictions based...eventually, diminished national power . Within this context, this paper examines policy, legal, ethical, and strategy implications for DoD from the impact

  13. Challenges and Responses to Asian Food Security

    NASA Astrophysics Data System (ADS)

    Teng, Paul P. S.; Oliveros, Jurise A. P.

    2015-10-01

    Food security is a complex phenomenon made up of multiple dimensions — food availability, physical access to food, economic access to food, food utilization — each of which has a stability dimension which underpins it. This review provides details on these dimensions and links them to two published indices which provide assessments of the state of food security in a country. The paper further provides analyses of the main supply and demand factors in the food security equation. Food security faces natural and anthropogenic threats such as loss of productive land and water, climate change and declining crop productivity, all of which are potentially amenable to solutions provided by science and technology. Demographic and accompanying diet changes further exacerbate the demands made on the natural resource base for food production. Finally, possible responses to the challenges confronting a secured food future are discussed from technological, policy and system level perspectives.

  14. Tackling U.S. energy challenges and opportunities: preliminary policy recommendations for enhancing energy innovation in the United States

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Anadon, Laura Diaz; Gallagher, Kelly Sims; Bunn, Matthew

    2009-02-18

    The report offers preliminary recommendations for near-term actions to strengthen the U.S. effort to develop and deploy advanced energy technologies. The report comes as the Obama Administration and the 111th U.S. Congress face enormous challenges and opportunities in tackling the pressing security, economic, and environmental problems posed by the energy sector. Improving the technologies of energy supply and end-use is a prerequisite for surmounting these challenges in a timely and cost-effective way, and this report elaborates on how policy can support develop of these important energy technologies.

  15. Public Health Crisis: the Need for Primary Prevention in Failed and Fragile States.

    PubMed

    Quinn, John; Stoeva, Preslava; Zelený, Tomáš; Nanda, Toozy; Tomanová, Alžběta; Bencko, Vladimír

    2017-09-01

    A new 'normal' in global affairs may be erupting from large global powers to that of non-state actors and proxies committing violence through scaled conflict in a post-Westphalian world generating significant global health policy challenges. Health security of populations are multifactorial and indirectly proportional to war, conflict and disaster. Preventing conflict and avoiding the health vacuum that occurs in war and violence may be best practices for policy makers. This paper considers an approach of applying clinical primary prevention principles to global health policy. Brief policy review of current standards and practices in health security in fragile and failed states and prevention; and definitions discussion. A short case study series are presented with best practices, with risk and outcome review. The global balance of power and order may be shifting through geopolitical transference and inadequate action by major global power brokers. Health security in at risk nation-states may be decreasing as a result. Small scale conflict with large-scale violence threatens health security and may experience increased incidence and prevalence in fragile and failed states. Preventative policy to resuscitate fragile and failed states and prevent further external and internal shocks may support health and promote a positive feedback loop of further state stability and increased health security. Public health policy shift to mitigate state failure and public health crisis in war and conflict through the basis of primary prevention may provide best practices and maximize health security for at risk populations. Copyright© by the National Institute of Public Health, Prague 2017

  16. 76 FR 57026 - Air Force Scientific Advisory Board Notice of Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-15

    ... and Technology plan emphasizing next generation energy, autonomy, sustainment, cyber, and ISR... secure cyber ops; acquisition challenges amid new era of defense policy and lessons learned from...

  17. Information Assurance and Forensic Readiness

    NASA Astrophysics Data System (ADS)

    Pangalos, Georgios; Katos, Vasilios

    Egalitarianism and justice are amongst the core attributes of a democratic regime and should be also secured in an e-democratic setting. As such, the rise of computer related offenses pose a threat to the fundamental aspects of e-democracy and e-governance. Digital forensics are a key component for protecting and enabling the underlying (e-)democratic values and therefore forensic readiness should be considered in an e-democratic setting. This position paper commences from the observation that the density of compliance and potential litigation activities is monotonically increasing in modern organizations, as rules, legislative regulations and policies are being constantly added to the corporate environment. Forensic practices seem to be departing from the niche of law enforcement and are becoming a business function and infrastructural component, posing new challenges to the security professionals. Having no a priori knowledge on whether a security related event or corporate policy violation will lead to litigation, we advocate that computer forensics need to be applied to all investigatory, monitoring and auditing activities. This would result into an inflation of the responsibilities of the Information Security Officer. After exploring some commonalities and differences between IS audit and computer forensics, we present a list of strategic challenges the organization and, in effect, the IS security and audit practitioner will face.

  18. Incorporating Risk and Indicators into a Water Security Framework

    NASA Astrophysics Data System (ADS)

    Allen, D. M.; Bakker, K.; Simpson, M. W.; Norman, E.; Dunn, G.

    2010-12-01

    The concept of water security has received growing attention over the past five years in academic debates and policy circles, particularly with respect to cumulative impacts assessment and watershed management. We propose an integrative definition for water security; one that considers both stressors and impacts (or effects) on hydrological systems. We present a water security assessment framework that considers status and risk indicators for both water quality and quantity as measures of impacts. This assessment framework also integrates the social sciences with natural science, engineering, and public health, providing opportunities to address environmental challenges, including the relationship between water and land use dynamics, the integration of aquatic ecosystem and human health concerns, and the alignment of governance with water management imperatives. We argue that this framework has the potential to advance water science, the contributing disciplines, and water policy and management.

  19. Technological Tyranny

    NASA Astrophysics Data System (ADS)

    Greenwood, Dick

    1984-08-01

    It is implicitly assumed by those who create, develop, control and deploy new technology, as well as by society at-large, that technological innovation always represents progress. Such an unchallenged assumption precludes an examination and evaluation of the interrelationships and impact the development and use of technology have on larger public policy matters, such as preservation of democratic values, national security and military policies, employment, income and tax policies, foreign policy and the accountability of private corporate entities to society. This brief challenges those assumptions and calls for social control of technology.

  20. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach

    PubMed Central

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-01-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges. PMID:26997936

  1. Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach.

    PubMed

    Kumar, Anand; Ligatti, Jay; Tu, Yi-Cheng

    2015-11-01

    Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data. We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.

  2. Protecting water and wastewater infrastructure from cyber attacks

    NASA Astrophysics Data System (ADS)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  3. National Security Forum for Women Held on June 11-12, 1985 at Washington, DC. Challenges to U.S. National Security.

    DTIC Science & Technology

    1985-01-01

    government down there that breaks promises, that censors the press, that kicks out priests, and that runs drugs to support their revolution, you will have a...Aspen Skiing Corporation, Twentieth Century-Fox Film Corporation, Schroders, Inc., American Security and Trust Company, the Ethics and Public Policy... Malaysia , Indonesia, the Philippines, and most recently Brunei. The total trade with ASEAN is exceeded only by Canada, Japan, the United Kingdom, and

  4. Hospital security and patient elopement: protecting patients and your healthcare facility.

    PubMed

    Smith, Thomas A

    2012-01-01

    Regulatory and financial consequences of adverse events associated with patient elopements are bringing new challenges to healthcare security to develop policies and procedures to prevent and respond to such incidents. This article provides an overview of the problem of elopement in healthcare and what it means to the security function; gives a working knowledge of healthcare related standards and guidelines aimed at reducing patient elopement; and reviews the elements of an elopement prevention and response plan for your organization.

  5. Global health interdependence and the international physicians' movement.

    PubMed

    Gellert, G A

    1990-08-01

    International Physicians for the Prevention of Nuclear War has had an impressive public impact in the 1980s, helping to shatter the myths of surviving and medically responding to a nuclear attack. The 1990s present a new challenge for the medical community in a different social and international context characterized by increasing global interdependence. Another view of physician activism is presented to complement advocacy for nuclear disarmament in the promotion of peace. A framework for analysis is provided by "fateful visions"--accepted policy views of prospective superpower relations--drawn from practitioners of foreign policy, international relations, and security affairs. A perceptual gap may exist between physicians who wish to address underlying ethical and public health concerns on security issues and policy practitioners who are accustomed to discussion within existing policy frames of reference that can be pragmatically used. A strategy is proposed for physicians to use their specialized training and skills to evaluate trends in global health interdependence. The international physicians' movement may contribute substantively to the formulation of policy by expanding and interpreting an increasingly complex database on interdependence, and by creating a dialogue with policy formulators based on mutual recognition of the value and legitimacy of each professions' expertise and complementary contributions to international security policy.

  6. Risks and responses to universal drinking water security.

    PubMed

    Hope, Robert; Rouse, Michael

    2013-11-13

    Risks to universal drinking water security are accelerating due to rapid demographic, climate and economic change. Policy responses are slow, uneven and largely inadequate to address the nature and scale of the global challenges. The challenges relate both to maintaining water security in increasingly fragile supply systems and to accelerating reliable access to the hundreds of millions who remain water-insecure. A conceptual framework illustrates the relationship between institutional, operational and financial risks and drinking water security outcomes. We apply the framework to nine case studies from rural and urban contexts in South Asia and sub-Saharan Africa. Case studies are purposively selected based on established and emerging examples of political, technological or institutional reforms that address water security risks. We find broad evidence that improved information flows reduce institutional costs and promote stronger and more transparent operational performance to increase financial sustainability. However, political barriers need to be overcome in all cases through internal or external interventions that require often decadal time frames and catalytic investments. No single model exists, though there is sufficient evidence to demonstrate that risks to drinking water security can be reduced even in the most difficult and challenging contexts.

  7. The Evolving Risk of Climate Change and National Security: People not Polar Bears

    NASA Astrophysics Data System (ADS)

    Titley, D.

    2014-12-01

    This talk will provide a general overview of climate change and discuss why this is a national security issue. Climate change is about people, about water, and about change itself. Understanding the rate of climate change, relative to the abilities of both humans and ecosystems to adapt is critical. I will briefly describe the multiple, independent lines of evidence that the climate is changing, and that the primary cause of this change is a change in atmospheric composition caused by the burning of fossil fuels. I will cover the history of climate change as seen within the U.S. Department of Defense and U.S. Navy, how this challenge is being addressed from budgetary, policy, and political angles, and what are the greatest challenges to national security that arise from climate change and in particular, the associated changes in the Arctic. I will conclude with an assessment of future challenges and opportunities regarding climate change, from science, policy, and political perspectives, and why we know enough to take significant action now, even if we don't know every detail about the future. In addition, this talk will address how to effectively talk about climate change through the use of analogies, plain, non-jargon English, and even a little humor.

  8. The food-energy-water nexus and urban complexity

    NASA Astrophysics Data System (ADS)

    Romero-Lankao, Patricia; McPhearson, Timon; Davidson, Debra J.

    2017-04-01

    While tackling interdependencies among food, energy, and water security is promising, three fundamental challenges to effective operationalization need addressing: the feasibility of science-policy integration, cross-scale inequalities, and path-dependencies in infrastructure and socio-institutional practices.

  9. Food security and marine capture fisheries: characteristics, trends, drivers and future perspectives

    PubMed Central

    Garcia, Serge M.; Rosenberg, Andrew A.

    2010-01-01

    World population is expected to grow from the present 6.8 billion people to about 9 billion by 2050. The growing need for nutritious and healthy food will increase the demand for fisheries products from marine sources, whose productivity is already highly stressed by excessive fishing pressure, growing organic pollution, toxic contamination, coastal degradation and climate change. Looking towards 2050, the question is how fisheries governance, and the national and international policy and legal frameworks within which it is nested, will ensure a sustainable harvest, maintain biodiversity and ecosystem functions, and adapt to climate change. This paper looks at global fisheries production, the state of resources, contribution to food security and governance. It describes the main changes affecting the sector, including geographical expansion, fishing capacity-building, natural variability, environmental degradation and climate change. It identifies drivers and future challenges, while suggesting how new science, policies and interventions could best address those challenges. PMID:20713390

  10. Security model for picture archiving and communication systems.

    PubMed

    Harding, D B; Gac, R J; Reynolds, C T; Romlein, J; Chacko, A K

    2000-05-01

    The modern information revolution has facilitated a metamorphosis of health care delivery wrought with the challenges of securing patient sensitive data. To accommodate this reality, Congress passed the Health Insurance Portability and Accountability Act (HIPAA). While final guidance has not fully been resolved at this time, it is up to the health care community to develop and implement comprehensive security strategies founded on procedural, hardware and software solutions in preparation for future controls. The Virtual Radiology Environment (VRE) Project, a landmark US Army picture archiving and communications system (PACS) implemented across 10 geographically dispersed medical facilities, has addressed that challenge by planning for the secure transmission of medical images and reports over their local (LAN) and wide area network (WAN) infrastructure. Their model, which is transferable to general PACS implementations, encompasses a strategy of application risk and dataflow identification, data auditing, security policy definition, and procedural controls. When combined with hardware and software solutions that are both non-performance limiting and scalable, the comprehensive approach will not only sufficiently address the current security requirements, but also accommodate the natural evolution of the enterprise security model.

  11. Drugs in Afghanistan: The Challenges With Implementing U.S. Strategy

    DTIC Science & Technology

    2008-03-13

    governance, allow Islamic extremists to turn a poisonous ideology into a global movement. —Robert M . Gates1 The U.S. National Security Strategy...detoxify the country of Afghanistan and sever its ties to the insurgency. Endnotes 1 Robert M . Gates, “Munich Conference on Security Policy...State, “Background Note: Afghanistan.” 8 Antonio Donini , Humanitarian Agenda 2015 Afghanistan Country Study, Briefing Paper (Medford, MA: Feinstein

  12. U.S. Army Special Forces Roles in Asymmetric Warfare

    DTIC Science & Technology

    2001-06-01

    1Jonathan B . Tucker, “Asymmetric Warfare: An Emerging Threat to U.S. Security,” Forum For Applied Research and Public Policy (Monterey...8Ibid., 34. 9Tucker, 11. 10Ibid., 2. 11 Henry H . Shelton, GEN, USA, Commander in Chief, U.S. Special Operations Command...the Senate Armed Services Committee, “Military Threats and Security Challenges Through 2015,” (Washington: 3 February 2000), 3. 26GEN Henry H

  13. Social Security and Disability Due to Mental Impairment in Adults.

    PubMed

    Goldman, Howard H; Frey, William D; Riley, Jarnee K

    2018-05-07

    The Social Security Administration (SSA) oversees two disability programs, Social Security Disability Insurance (SSDI) and Supplemental Security Income (SSI). Adults with mental impairments represent a very large component of the programs. Policy makers and SSA are concerned about the accuracy of disability determination and also about low levels of labor force participation among individuals with disabilities. Adults with mental impairments are challenging to assess for work-related functional limitations. They are also a challenge to return to labor force participation. SSA has sponsored several demonstration research programs focusing on improving the accuracy of disability determination and on interventions in supported employment to return individuals with mental impairments to competitive employment. This article reviews the demonstration research focused on both entry into the disability system (at the "front door") and potential exit from it (through the "back door"). All of the research holds promise to "right-size" the SSA disability program.

  14. Challenges of Information Technology Security in the NASA Environment

    NASA Technical Reports Server (NTRS)

    Santiago, S. S.

    2000-01-01

    A brief description of the NASA organization and how the CIO responsibilities are integrated into that organization followed by an introduction of the NASA ITS Program goals and objectives. An overview of the four major enterprises' cultures and how those cultures tie back to the Enterprises' missions. A description of the ITS challenges that exist stemming from the competing NASA Enterprises' requirements and how they have formed the basis of the NASA ITS Program. A talk will focus on policies and procedures and the technology being incorporated into the NASA infrastructure and how that technology ties back to the policies and procedures.

  15. Space-Derived Transparency: Players, Policies, Implications, and Synergies

    NASA Astrophysics Data System (ADS)

    Kinnan, C. J.

    2001-06-01

    Space-derived transparency will become a common means of monitoring, preventing, and mitigating crises, verifying compliance with treaties and law, and enabling confidence and security building measures. Democratization and globalization, the proliferation of information technologies, the availability of commercial space high-resolution imagery, and the growing influence of NGOs invite this question: What is (space-derived) transparency and what effect does it have on US security policy? Three camps have emerged in the debate -Horaeists who seek to build a transnational society through complete transparency; Preservationists, mostly military, who fear the threat to national security, want to deny most space-derived information to non-traditional/non-state actors; and Synergists who seek to capitalize on the best of both camps. There is evidence suggesting that space-derived transparency is an inevitable trend and will resist even the best means of preservationist control. Space-derived transparency may change the dynamic of the security environment by introducing new players into the policy fomentation and implementation process. These players, if not properly schooled in imagery analysis or the potential effects of their use of misinterpreted space-derived imagery, could force policy makers to make fast, ill-considered decisions in order to respond to incidents. In some cases this fast response will defuse potential crises and in other situations these rushed decisions might result in policies without considering the potential consequences, which could turn incidents into crises. Space-derived transparency is a step forward into the future for each camp . . . the challenge for the United States lies in forging synergies in an increasingly transparent world while maintaining the balance between openness and security.

  16. Redesigning healthcare systems to meet the health challenges associated with climate change in the twenty-first century.

    PubMed

    Phua, Kai-Lit

    2015-01-01

    In the twenty-first century, climate change is emerging as a significant threat to the health and well-being of the public through links to the following: extreme weather events, sea level rise, temperature-related illnesses, air pollution patterns, water security, food security, vector-borne infectious diseases, and mental health effects (as a result of extreme weather events and climate change-induced population displacement). This article discusses how national healthcare systems can be redesigned through changes in its components such as human resources, facilities and technology, health information system, and health policy to meet these challenges.

  17. Canes Implementation: Analysis of Budgetary, Business, and Policy Challenges

    DTIC Science & Technology

    2014-12-01

    Concept of Operations COTS Commercial Off the Shelf DAG Defense Acquisitions Guidebook DAS Defense Acquisitions System DOD Department of Defense...and Integration NSS National Security Strategy OA Open Architecture OCO Overseas Contingency Operations OEF Operation Enduring Freedom OIF...and software and civilian-type open architecture ( OA ) presents a series of challenges. The purpose of this report is to provide the Navy with a

  18. An Agile Enterprise Regulation Architecture for Health Information Security Management

    PubMed Central

    Chen, Ying-Pei; Hsieh, Sung-Huai; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-01-01

    Abstract Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital. PMID:20815748

  19. An agile enterprise regulation architecture for health information security management.

    PubMed

    Chen, Ying-Pei; Hsieh, Sung-Huai; Cheng, Po-Hsun; Chien, Tsan-Nan; Chen, Heng-Shuen; Luh, Jer-Junn; Lai, Jin-Shin; Lai, Feipei; Chen, Sao-Jie

    2010-09-01

    Information security management for healthcare enterprises is complex as well as mission critical. Information technology requests from clinical users are of such urgency that the information office should do its best to achieve as many user requests as possible at a high service level using swift security policies. This research proposes the Agile Enterprise Regulation Architecture (AERA) of information security management for healthcare enterprises to implement as part of the electronic health record process. Survey outcomes and evidential experiences from a sample of medical center users proved that AERA encourages the information officials and enterprise administrators to overcome the challenges faced within an electronically equipped hospital.

  20. Crops and food security--experiences and perspectives from Taiwan.

    PubMed

    Huang, Chen-Te; Fu, Tzu-Yu Richard; Chang, Su-San

    2009-01-01

    Food security is an important issue that is of concern for all countries around the world. There are many factors which may cause food insecurity including increasing demand, shortage of supply, trade condition, another countries' food policy, lack of money, high food and oil prices, decelerating productivity, speculation, etc. The food self-sufficiency ratio of Taiwan is only 30.6% weighted by energy in 2007. Total agriculture imports and cereals have increased significantly due to the expansion of livestock and fishery industries and improve living standard. The agriculture sector of Taiwan is facing many challenges, such as: low level of food self-sufficiency, aging farmers, large acreage of set-aside farmlands, small scale farming, soaring price of fertilizers, natural disasters accelerated by climate change, and rapid changes in the world food economy. To cope with these challenges, the present agricultural policy is based on three guidelines: "Healthfulness, Efficiency, and Sustainability." A program entitled "Turning Small Landlords into Large Tenants" was launched to make effective use of idle lands. Facing globalization and the food crisis, Taiwan will secure stable food supply through revitalization of its set-aside farmlands and international markets, and provide technical assistance to developing countries, in particular for staple food crops.

  1. Africa: addressing growing threats to food security.

    PubMed

    Rukuni, Mandivamba

    2002-11-01

    Africa remains the only region in the world where the number of hungry people will still be on the increase in 2020, and the number of malnourished children will have increased correspondingly. In this report I have acknowledged the general public policy trends across Africa in terms of macroeconomic policy reforms and political transitions. These welcome trends have to still produce stable nations and economies. Although economic development is the long-term solution to Africa's challenge on hunger and poverty, this will take time. And it follows therefore that African nations have to pursue policies and strategies that promote long-term growth while at the same time offering short-term safety nets for the poorest of the poor. The growth and development strategy will have at its core the need to increase significantly the levels of public-sector investment in agriculture and rural development and to give top priority to the commercialization of smallholder agriculture so as to increase productivity and competitiveness. But food security at the household level is ultimately a balance between availability and access, and in this regard governments need complementary food security policies that increase the probability of food access by the vulnerable groups.

  2. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks

    PubMed Central

    Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada

    2015-01-01

    Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs). We evaluate our approach using a case study from the intelligent transportation system domain. PMID:25746093

  3. Global Health Governance at a Crossroads.

    PubMed

    Ng, Nora Y; Ruger, Jennifer Prah

    2011-06-21

    This review takes stock of the global health governance (GHG) literature. We address the transition from international health governance (IHG) to global health governance, identify major actors, and explain some challenges and successes in GHG. We analyze the framing of health as national security, human security, human rights, and global public good, and the implications of these various frames. We also establish and examine from the literature GHG's major themes and issues, which include: 1) persistent GHG problems; 2) different approaches to tackling health challenges (vertical, horizontal, and diagonal); 3) health's multisectoral connections; 4) neoliberalism and the global economy; 5) the framing of health (e.g. as a security issue, as a foreign policy issue, as a human rights issue, and as a global public good); 6) global health inequalities; 7) local and country ownership and capacity; 8) international law in GHG; and 9) research gaps in GHG. We find that decades-old challenges in GHG persist and GHG needs a new way forward. A framework called shared health governance offers promise.

  4. Global Health Governance at a Crossroads

    PubMed Central

    Ng, Nora Y.; Ruger, Jennifer Prah

    2014-01-01

    This review takes stock of the global health governance (GHG) literature. We address the transition from international health governance (IHG) to global health governance, identify major actors, and explain some challenges and successes in GHG. We analyze the framing of health as national security, human security, human rights, and global public good, and the implications of these various frames. We also establish and examine from the literature GHG’s major themes and issues, which include: 1) persistent GHG problems; 2) different approaches to tackling health challenges (vertical, horizontal, and diagonal); 3) health’s multisectoral connections; 4) neoliberalism and the global economy; 5) the framing of health (e.g. as a security issue, as a foreign policy issue, as a human rights issue, and as a global public good); 6) global health inequalities; 7) local and country ownership and capacity; 8) international law in GHG; and 9) research gaps in GHG. We find that decades-old challenges in GHG persist and GHG needs a new way forward. A framework called shared health governance offers promise. PMID:24729828

  5. Security and Policy for Group Collaboration

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ian Foster; Carl Kesselman

    2006-07-31

    “Security and Policy for Group Collaboration” was a Collaboratory Middleware research project aimed at providing the fundamental security and policy infrastructure required to support the creation and operation of distributed, computationally enabled collaborations. The project developed infrastructure that exploits innovative new techniques to address challenging issues of scale, dynamics, distribution, and role. To reduce greatly the cost of adding new members to a collaboration, we developed and evaluated new techniques for creating and managing credentials based on public key certificates, including support for online certificate generation, online certificate repositories, and support for multiple certificate authorities. To facilitate the integration ofmore » new resources into a collaboration, we improved significantly the integration of local security environments. To make it easy to create and change the role and associated privileges of both resources and participants of collaboration, we developed community wide authorization services that provide distributed, scalable means for specifying policy. These services make it possible for the delegation of capability from the community to a specific user, class of user or resource. Finally, we instantiated our research results into a framework that makes it useable to a wide range of collaborative tools. The resulting mechanisms and software have been widely adopted within DOE projects and in many other scientific projects. The widespread adoption of our Globus Toolkit technology has provided, and continues to provide, a natural dissemination and technology transfer vehicle for our results.« less

  6. Wide-area situation awareness in electric power grid

    NASA Astrophysics Data System (ADS)

    Greitzer, Frank L.

    2010-04-01

    Two primary elements of the US energy policy are demand management and efficiency and renewable sources. Major objectives are clean energy transmission and integration, reliable energy transmission, and grid cyber security. Development of the Smart Grid seeks to achieve these goals by lowering energy costs for consumers, achieving energy independence and reducing greenhouse gas emissions. The Smart Grid is expected to enable real time wide-area situation awareness (SA) for operators. Requirements for wide-area SA have been identified among interoperability standards proposed by the Federal Energy Regulatory Commission and the National Institute of Standards and Technology to ensure smart-grid functionality. Wide-area SA and enhanced decision support and visualization tools are key elements in the transformation to the Smart Grid. This paper discusses human factors research to promote SA in the electric power grid and the Smart Grid. Topics that will be discussed include the role of human factors in meeting US energy policy goals, the impact and challenges for Smart Grid development, and cyber security challenges.

  7. The Interagency Cometh: Is the National Security System of 1947 Capable of Handling the Challenges of 2009?

    DTIC Science & Technology

    2009-01-01

    command system.2 The United States Southern Command, responsible for Department of Defense planning, coordination, and operations in Central America ...South America and i waters, formed its Joint Interagency Task Force South to enable it to conduct coordinated illicit trafficking operations. ts y...Collin Powell and Secretary of Defense Donald Rumsfeld, the National Security Council has at times been a place for policy to come to die under the

  8. Defense Budgeting in a Constrained Economy: Reengineering the Budget Process to Meet the Challenge of a Modernizing Zimbabwe Defense Force

    DTIC Science & Technology

    1998-06-01

    Public Policy Analysis and Management Vol. 5 (Connecticut: JAI Press Inc ., 1992) 20. 38 Thomas A Simcik, Reengineering the Navy Program Objective...Winston Inc .,1969. Olvey, Lee D. The Economics of National Security, Avery Publishing Group : 1984. Premchand, A., Government Budgeting And Expenditure... the current process is presented and analyzed against relevant theory on policy analysis , reengineering, and contemporary budgeting systems, in

  9. Public Health Crisis in War and Conflict - Health Security in Aggregate.

    PubMed

    Quinn, John; Zelený, Tomáš; Subramaniam, Rammika; Bencko, Vladimír

    2017-03-01

    Public health status of populations is multifactorial and besides other factors it is linked to war and conflict. Public health crisis can erupt when states go to war or are invaded; health security may be reduced for affected populations. This study reviews in aggregate multiple indices of human security, human development and legitimacy of the state in order to describe a predictable global health portrait. Paradigm shift of large global powers to that non-state actors and proxies impact regional influence through scaled conflict and present major global health challenges for policy makers. Small scale conflict with large scale violence threatens health security for at-risk populations. The paper concludes that health security is directly proportional to state security. Copyright© by the National Institute of Public Health, Prague 2017

  10. Assessing the privacy policies in mobile personal health records.

    PubMed

    Zapata, Belén Cruz; Hernández Niñirola, Antonio; Fernández-Alemán, José Luis; Toval, Ambrosio

    2014-01-01

    The huge increase in the number and use of smartphones and tablets has led health service providers to take an interest in mHealth. Popular mobile app markets like Apple App Store or Google Play contain thousands of health applications. Although mobile personal health records (mPHRs) have a number of benefits, important challenges appear in the form of adoption barriers. Security and privacy have been identified as part of these barriers and should be addressed. This paper analyzes and assesses a total of 24 free mPHRs for Android and iOS. Characteristics regarding privacy and security were extracted from the HIPAA. The results show important differences in both the mPHRs and the characteristics analyzed. A questionnaire containing six questions concerning privacy policies was defined. Our questionnaire may assist developers and stakeholders to evaluate the security and privacy of their mPHRs.

  11. Security policies and trust in ubiquitous computing.

    PubMed

    Joshi, Anupam; Finin, Tim; Kagal, Lalana; Parker, Jim; Patwardhan, Anand

    2008-10-28

    Ubiquitous environments comprise resource-constrained mobile and wearable devices and computational elements embedded in everyday artefacts. These are connected to each other using both infrastructure-based as well as short-range ad hoc networks. Limited Internet connectivity limits the use of conventional security mechanisms such as public key infrastructures and other forms of server-centric authentication. Under these circumstances, peer-to-peer interactions are well suited for not just information interchange, but also managing security and privacy. However, practical solutions for protecting mobile devices, preserving privacy, evaluating trust and determining the reliability and accuracy of peer-provided data in such interactions are still in their infancy. Our research is directed towards providing stronger assurances of the reliability and trustworthiness of information and services, and the use of declarative policy-driven approaches to handle the open and dynamic nature of such systems. This paper provides an overview of some of the challenges and issues, and points out directions for progress.

  12. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    NASA Astrophysics Data System (ADS)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  13. [How to establish the hospital information system security policies].

    PubMed

    Gong, Qing-Yue; Shi, Cheng

    2008-03-01

    It is important to establish the hospital information system security policies. While these security policies are being established, a comprehensive consideration should be given to the acceptable levels of users, IT supporters and hospital managers. We should have a formal policy designing process that is consistently followed by all security policies. Reasons for establishing the security policies and their coverage and applicable objects should be stated clearly. Besides, each policy should define user's responsibilities and penalties of violation. Every organization will need some key policies, such as of information sources usage, remote access, information protection, perimeter security, and baseline host/device security. Security managing procedures are the mechanisms to enforce the policies. An incident-handling procedure is the most important security managing procedure for all organizations.

  14. The Alignment of Small States: Singapore and Vietnam

    DTIC Science & Technology

    2011-12-01

    University Press, 1998. Geiss, Imanuel. German Foreign Policy, 1871–1914. Boston: Routledge & Kegan Paul Ltd, 1976. Goh, Evelyn. “Great Powers and...Meeting the China Challenge: The U.S. in Southeast Asian Regional Security Strategies. Washington, D.C.: East-West Center Washington. Green , Michael J

  15. Privacy and Technology: Counseling Institutions of Higher Education.

    ERIC Educational Resources Information Center

    Cranman, Kevin A.

    1998-01-01

    Examines the challenges to colleges and universities associated with maintaining privacy as use of technology increases and technology advances. Lapses in security, types of information needing protection, liability under federal laws, other relevant laws and pending legislation, ethics, and policy implementation in the electronic age are…

  16. Managing water resources for biomass production in a biofuel economy

    USDA-ARS?s Scientific Manuscript database

    One goal of our national security policy is to become more energy independent using biofuels. The expanded production of agricultural crops for bioenergy production has introduced new challenges for management of water. Water availability has been widely presumed in the discussion of bioenergy crop ...

  17. Briefing Teams in World Affairs Class.

    ERIC Educational Resources Information Center

    Dunn, Joe P.

    1992-01-01

    In a college world affairs course, the teacher acted as foreign policy/national security advisor to the president and assigned students as staff members for different geographic regions. Students briefed him daily, first on current events, then on specific issues. Students enjoyed the challenging assignments, intensive questioning, and policy…

  18. A Framework for Translating a High Level Security Policy into Low Level Security Mechanisms

    NASA Astrophysics Data System (ADS)

    Hassan, Ahmed A.; Bahgat, Waleed M.

    2010-01-01

    Security policies have different components; firewall, active directory, and IDS are some examples of these components. Enforcement of network security policies to low level security mechanisms faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to automate the process of translation of high level security policy into low level security mechanisms. This paper introduces a framework of an automation process that translates a high level security policy into low level security mechanisms. The framework is described in terms of three phases; in the first phase all network assets are categorized according to their roles in the network security and relations between them are identified to constitute the network security model. This proposed model is based on organization based access control (OrBAC). However, the proposed model extend the OrBAC model to include not only access control policy but also some other administrative security policies like auditing policy. Besides, the proposed model enables matching of each rule of the high level security policy with the corresponding ones of the low level security policy. Through the second phase of the proposed framework, the high level security policy is mapped into the network security model. The second phase could be considered as a translation of the high level security policy into an intermediate model level. Finally, the intermediate model level is translated automatically into low level security mechanism. The paper illustrates the applicability of proposed approach through an application example.

  19. The United States, Russia, Europe, and Security: How to Address the Unfinished Business of the Post-Cold War Era

    DTIC Science & Technology

    2012-04-01

    offered transparency and force limitations through clear rules of the game, enabling former enemies to keep suspicions in check. It guarantees...will have to change. Of course, it will change should oil prices drop to the point of getting Russia on its knees . Beyond such a scenario, there will...and addressing security challenges in and around Europe. Today’s declaratory policy hardly matches the facts on the ground, and the rules of the

  20. Proceedings from the conference on high speed computing: High speed computing and national security

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hirons, K.P.; Vigil, M.; Carlson, R.

    1997-07-01

    This meeting covered the following topics: technologies/national needs/policies: past, present and future; information warfare; crisis management/massive data systems; risk assessment/vulnerabilities; Internet law/privacy and rights of society; challenges to effective ASCI programmatic use of 100 TFLOPs systems; and new computing technologies.

  1. US Policy Options Mitigating Venezuelan Sponsored Security Challenges

    DTIC Science & Technology

    2009-03-12

    Marcos Perez Jimenez ousted President Freire. In 1958, a coalition of disenchanted political groups ousted President Jimenez to restore democracy, then...1. 20 Hubert Herring, A History of Latin America from the Beginnings to the Present, 3rd (New York: Alfred A. Knopf, 1972), 523. 21 Harold A

  2. The Eastring gas pipeline in the context of the Central and Eastern European gas supply challenge

    NASA Astrophysics Data System (ADS)

    Mišík, Matúš; Nosko, Andrej

    2017-11-01

    Ever since the 2009 natural gas crisis, energy security has been a crucial priority for countries of Central and Eastern Europe. Escalating in 2014, the conflict between Ukraine and Russia further fuelled negative expectations about the future development of energy relations for the region predominantly supplied by Russia. As a response to the planned cessation of gas transit through the Brotherhood pipeline, which brings Russian gas to Europe via Ukraine and Slovakia, the Slovak transmission system operator Eustream proposed the Eastring pipeline. This Perspective analyses this proposal and argues that neither the perceived decrease in Slovak energy security nor the loss of economic rent from the international gas transit should be the main policy driver behind such a major infrastructure project. Although marketed as an answer to current Central and Eastern European gas supply security challenges, the Eastring pipeline is actually mainly focused on issues connected to the Slovak gas transit.

  3. Elements of ESA's policy on space and security

    NASA Astrophysics Data System (ADS)

    Giannopapa, Christina; Adriaensen, Maarten; Antoni, Ntorina; Schrogl, Kai-Uwe

    2018-06-01

    In the past decade Europe has been facing rising security threats, ranging from climate change, migrations, nearby conflicts and crises, to terrorism. The demand to tackle these critical challenges is increasing in Member States. Space is already contributing, and could further contribute with already existing systems and future ones. The increasing need for security in Europe and for safety and security of Europe's space activities has led to a growing number of activities in ESA in various domains. It has also driven new and strengthened partnerships with security stakeholders in Europe. At the European level, ESA is collaborating closely with the main European institutions dealing with space security. In addition, as an organisation ESA has evolved to conduct security-related projects and programmes and to address the threats to its own activities, thereby securing the investments of the Member States. Over the past years the Agency has set up a comprehensive regulatory framework in order to be able to cope with security related requirements. Over the past years, ESA has increased its exchanges with its Member States. The paper presents main elements of the ESA's policy on space and security. It introduces the current European context for space and security, the European goals in this domain and the specific objectives to which the Agency intends to contribute. Space and security in the ESA context is set out under two components: a) security from space and b) security in space, including the security of ESA's own activities (corporate security and the security of ESA's space missions). Subsequently, ESA's activities are elaborated around these two pillars, composed of different activities conducted in the most appropriate frameworks and in coordination with the relevant stakeholders and shareholders.

  4. One Health in food safety and security education: Subject matter outline for a curricular framework.

    PubMed

    Angelos, John A; Arens, Amanda L; Johnson, Heather A; Cadriel, Jessica L; Osburn, Bennie I

    2017-06-01

    Educating students in the range of subjects encompassing food safety and security as approached from a One Health perspective requires consideration of a variety of different disciplines and the interrelationships among disciplines. The Western Institute for Food Safety and Security developed a subject matter outline to accompany a previously published One Health in food safety and security curricular framework. The subject matter covered in this outline encompasses a variety of topics and disciplines related to food safety and security including effects of food production on the environment. This subject matter outline should help guide curriculum development and education in One Health in food safety and security and provides useful information for educators, researchers, students, and public policy-makers facing the inherent challenges of maintaining and/or developing safe and secure food supplies without destroying Earth's natural resources.

  5. Advanced Techniques for Deploying Reliable and Efficient Access Control: Application to E-healthcare.

    PubMed

    Jaïdi, Faouzi; Labbene-Ayachi, Faten; Bouhoula, Adel

    2016-12-01

    Nowadays, e-healthcare is a main advancement and upcoming technology in healthcare industry that contributes to setting up automated and efficient healthcare infrastructures. Unfortunately, several security aspects remain as main challenges towards secure and privacy-preserving e-healthcare systems. From the access control perspective, e-healthcare systems face several issues due to the necessity of defining (at the same time) rigorous and flexible access control solutions. This delicate and irregular balance between flexibility and robustness has an immediate impact on the compliance of the deployed access control policy. To address this issue, the paper defines a general framework to organize thinking about verifying, validating and monitoring the compliance of access control policies in the context of e-healthcare databases. We study the problem of the conformity of low level policies within relational databases and we particularly focus on the case of a medical-records management database defined in the context of a Medical Information System. We propose an advanced solution for deploying reliable and efficient access control policies. Our solution extends the traditional lifecycle of an access control policy and allows mainly managing the compliance of the policy. We refer to an example to illustrate the relevance of our proposal.

  6. Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Water Security

    NASA Technical Reports Server (NTRS)

    Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.

    2018-01-01

    River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.

  7. 12 CFR 12.7 - Securities trading policies and procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 1 2014-01-01 2014-01-01 false Securities trading policies and procedures. 12... RECORDKEEPING AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 12.7 Securities trading policies and procedures. (a) Policies and procedures; reports of securities trading. A national bank effecting securities...

  8. 12 CFR 12.7 - Securities trading policies and procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 1 2013-01-01 2013-01-01 false Securities trading policies and procedures. 12... RECORDKEEPING AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 12.7 Securities trading policies and procedures. (a) Policies and procedures; reports of securities trading. A national bank effecting securities...

  9. 12 CFR 12.7 - Securities trading policies and procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 1 2012-01-01 2012-01-01 false Securities trading policies and procedures. 12... RECORDKEEPING AND CONFIRMATION REQUIREMENTS FOR SECURITIES TRANSACTIONS § 12.7 Securities trading policies and procedures. (a) Policies and procedures; reports of securities trading. A national bank effecting securities...

  10. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage

    PubMed Central

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model. PMID:27898703

  11. Efficiently Multi-User Searchable Encryption Scheme with Attribute Revocation and Grant for Cloud Storage.

    PubMed

    Wang, Shangping; Zhang, Xiaoxue; Zhang, Yaling

    2016-01-01

    Cipher-policy attribute-based encryption (CP-ABE) focus on the problem of access control, and keyword-based searchable encryption scheme focus on the problem of finding the files that the user interested in the cloud storage quickly. To design a searchable and attribute-based encryption scheme is a new challenge. In this paper, we propose an efficiently multi-user searchable attribute-based encryption scheme with attribute revocation and grant for cloud storage. In the new scheme the attribute revocation and grant processes of users are delegated to proxy server. Our scheme supports multi attribute are revoked and granted simultaneously. Moreover, the keyword searchable function is achieved in our proposed scheme. The security of our proposed scheme is reduced to the bilinear Diffie-Hellman (BDH) assumption. Furthermore, the scheme is proven to be secure under the security model of indistinguishability against selective ciphertext-policy and chosen plaintext attack (IND-sCP-CPA). And our scheme is also of semantic security under indistinguishability against chosen keyword attack (IND-CKA) in the random oracle model.

  12. Challenge theme 7: Information support for management of border security and environmental protection: Chapter 9 in United States-Mexican Borderlands: Facing tomorrow's challenges through USGS science

    USGS Publications Warehouse

    Parcher, Jean W.; Page, William R.

    2013-01-01

    Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.

  13. Building a Secure and Feature-rich Mobile Mapping Service App Using HTML5: Challenges and Best Practices

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Karthik, Rajasekar; Patlolla, Dilip Reddy; Sorokine, Alexandre

    Managing a wide variety of mobile devices across multiple mobile operating systems is a security challenge for any organization [1, 2]. With the wide adoption of mobile devices to access work-related apps, there is an increase in third-party apps that might either misuse or improperly handle user s personal or sensitive data [3]. HTML5 has been receiving wide attention for developing cross-platform mobile apps. According to International Data Corporation (IDC), by 2015, 80% of all mobile apps will be based in part or wholly upon HTML5 [4]. Though HTML5 provides a rich set of features for building an app, itmore » is a challenge for organizations to deploy and manage HTML5 apps on wide variety of devices while keeping security policies intact. In this paper, we will describe an upcoming secure mobile environment for HTML5 apps, called Sencha Space that addresses these issues and discuss how it will be used to design and build a secure and cross-platform mobile mapping service app. We will also describe how HTML5 and a new set of related technologies such as Geolocation API, WebGL, Open Layers 3, and Local Storage, can be used to provide a high end and high performance experience for users of the mapping service app.« less

  14. Identifying and Eliminating Barriers Faced by Nontraditional Department of Defense Suppliers

    DTIC Science & Technology

    2014-01-01

    organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more...Commands, the Department of the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community . For more information on the RAND...17 Lack of Access to and Communication

  15. ETheory's Spell-On Qualitative Inquiry and Educational Research.

    ERIC Educational Resources Information Center

    Thomas, Gary

    2002-01-01

    Challenges theory's secure place in qualitative inquiry on three counts. Argues (1) the search for theory in such inquiry originates in a crypto-functionalism; (2) theory's supposed importance for policy formulation cannot in itself justify it; and (3) arguments about its successful use are belied by examining discussion about theory in those…

  16. Improvements to the Visa Application System: Serving the S&T Community, Promoting The American Economy and Keeping Us Safe

    NASA Astrophysics Data System (ADS)

    Gillen, Mathew

    2014-03-01

    The speaker will address policy changes and improvements in visa processing that help scientists and students to visit and study in the United States. The speaker will also discuss challenges involved with balancing the needs of U.S. science with national security interests.

  17. Making Charter School Facilities More Affordable: State-driven Policy Approaches. Innovations in Education

    ERIC Educational Resources Information Center

    US Department of Education, 2008

    2008-01-01

    Securing appropriate facilities can be a significant challenge for those intending to open a charter school. Although, like all public schools, charter schools receive per-pupil dollars from the state, they generally receive considerably less. Additionally, because traditional public schools rely on their district to provide their school…

  18. Western Lake Erie Basin: Soft-data-constrained, NHDPlus resolution watershed modeling and exploration of applicable conservation scenarios

    USDA-ARS?s Scientific Manuscript database

    Complex watershed simulation models are powerful tools that can help scientists and policy-makers address challenging topics, such as land use management and water security. In the Western Lake Erie Basin (WLEB), complex hydrological models have been applied at various scales to help describe relat...

  19. Security and SCADA protocols

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Igure, V. M.; Williams, R. D.

    2006-07-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview ofmore » security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)« less

  20. AGU, Science and Engagement with the Energy Industry

    NASA Astrophysics Data System (ADS)

    Leinen, M.; Davidson, E. A.

    2016-12-01

    The relationship between science and society evolves over time and the social, political, and economic factors shaping this relationship are complex. When problems facing society become more challenging, the public, NGOs, and policy makers call for science to more directly inform solutions, to assure accountability for the use of funds and to address conflicts of interest. But when policy solutions for such challenges require significant economic and societal tradeoffs, discussion of the science can become polarized and politicized. When this occurs, AGU's policies that uphold the highest standards of scientific integrity, address conflicts of interests and promote independence for members are even more important. These policies are implemented through processes for: a) control of science presented at meeting and in publications; b) requirements for data cited in publications to be publicly accessible, and c) an organizational support policy that prohibits sponsors from influencing science presented in AGU programs. The private sector wields vast influence on human behavior and governmental policy through commerce and lobbying. These actions can be controversial when the profit motive appears incongruent with other societal opinions of what is in the public interest. Climate change is an example of this tension, where the economic exploitation of fossil fuels has complex effects on food and energy security as well as on the environment. Nonetheless, the AGU Board unanimously agreed that given our mission to advance science to create a more sustainable earth, engagement of the private sector rather than disengagement is the best way to influence decision makers on all sides because we believe that the private sector needs to be part of any solutions. We plan to use our convening power and scientific authority to bring together diverse views on climate change solutions from the private, NGO, policy, decision-maker and scientific sectors to begin a substantial, responsible and on-going dialogue. We want this dialogue to inform issues of energy, environment, security and the associated economic and societal benefits and tradeoffs in addressing climate change. AGU will share our initial ideas for convening such engagement and in the future will inform our membership on the successes and the on-going challenges.

  1. Network information security in a phase III Integrated Academic Information Management System (IAIMS).

    PubMed

    Shea, S; Sengupta, S; Crosswell, A; Clayton, P D

    1992-01-01

    The developing Integrated Academic Information System (IAIMS) at Columbia-Presbyterian Medical Center provides data sharing links between two separate corporate entities, namely Columbia University Medical School and The Presbyterian Hospital, using a network-based architecture. Multiple database servers with heterogeneous user authentication protocols are linked to this network. "One-stop information shopping" implies one log-on procedure per session, not separate log-on and log-off procedures for each server or application used during a session. These circumstances provide challenges at the policy and technical levels to data security at the network level and insuring smooth information access for end users of these network-based services. Five activities being conducted as part of our security project are described: (1) policy development; (2) an authentication server for the network; (3) Kerberos as a tool for providing mutual authentication, encryption, and time stamping of authentication messages; (4) a prototype interface using Kerberos services to authenticate users accessing a network database server; and (5) a Kerberized electronic signature.

  2. Interdisciplinary assessment of sea-level rise and climate change impacts on the lower Nile delta, Egypt.

    PubMed

    Sušnik, Janez; Vamvakeridou-Lyroudia, Lydia S; Baumert, Niklas; Kloos, Julia; Renaud, Fabrice G; La Jeunesse, Isabelle; Mabrouk, Badr; Savić, Dragan A; Kapelan, Zoran; Ludwig, Ralf; Fischer, Georg; Roson, Roberto; Zografos, Christos

    2015-01-15

    CLImate-induced changes on WAter and SECurity (CLIWASEC) was a cluster of three complementary EC-FP7 projects assessing climate-change impacts throughout the Mediterranean on: hydrological cycles (CLIMB - CLimate-Induced changes on the hydrology of Mediterranean Basins); water security (WASSERMed - Water Availability and Security in Southern EuRope and the Mediterranean) and human security connected with possible hydro-climatic conflicts (CLICO - CLImate change hydro-COnflicts and human security). The Nile delta case study was common between the projects. CLIWASEC created an integrated forum for modelling and monitoring to understand potential impacts across sectors. This paper summarises key results from an integrated assessment of potential challenges to water-related security issues, focusing on expected sea-level rise impacts by the middle of the century. We use this common focus to illustrate the added value of project clustering. CLIWASEC pursued multidisciplinary research by adopting a single research objective: sea-level rise related water security threats, resulting in a more holistic view of problems and potential solutions. In fragmenting research, policy-makers can fail to understand how multiple issues can materialize from one driver. By combining efforts, an integrated assessment of water security threats in the lower Nile is formulated, offering policy-makers a clearer picture of inter-related issues to society and environment. The main issues identified by each project (land subsidence, saline intrusion - CLIMB; water supply overexploitation, land loss - WASSERMed; employment and housing security - CLICO), are in fact related. Water overexploitation is exacerbating land subsidence and saline intrusion, impacting on employment and placing additional pressure on remaining agricultural land and the underdeveloped housing market. All these have wider implications for regional development. This richer understanding could be critical in making better policy decisions when attempting to mitigate climate and social change impacts. The CLIWASEC clustering offers an encouraging path for the new European Commission Horizon 2020 programme to follow. Copyright © 2014 Elsevier B.V. All rights reserved.

  3. The challenge of integration in the implementation of Zimbabwe’s new water policy: case study of the catchment level institutions surrounding the Pungwe-Mutare water supply project

    NASA Astrophysics Data System (ADS)

    Tapela, Barbara Nompumelelo

    Integrated water resources management (IWRM) is viewed by policy makers and practitioners as facilitating the achievement of a balance between water resource use and resource protection, and the resolution of water-related conflicts. The IWRM approach has found particular use in the new water policies of Southern African countries such as Zimbabwe, where water scarcity, after the land question, is perceived to be a major threat to political, economic, social, military and environmental security. Ultimately, IWRM is seen as providing a framework towards ensuring broader security at the local, national, regional and global levels. However, the pilot phase implementation of the new water policy in the various regional countries has revealed that although the legal and institutional frameworks have been put in place, the implementation of the IWRM approach has tended to be problematic (J. Latham, 2001; GTZ, 2000; Leestemaker, 2000; Savenige and van der Zaag, 2000; Sithole, 2000). This paper adopts a case study approach and empirically examines the institutional challenges of implementing the IWRM approach in the post-pilot phase of Zimbabwe's new water policy. The focus is mainly on the institutional arrangements surrounding the Pungwe-Mutare Water Supply Project located within the Save Catchment Area in Eastern Zimbabwe. The major findings of the study are that, while there persist some problems associated with the traditional management approach, there have also emerged new challenges to IWRM. These mainly relate to the transaction costs of the water sector reforms, institutional resilience, stakeholder participation, and the achievement of the desired outcomes. There have also been problems emanating from unexpected political developments at the local and national levels, particularly with regard to the government's ;fast track; land resettlement programme. The paper concludes that there is a need for a more rigorous effort towards integrating the management of water resources by the catchment level institutions.

  4. Understanding the Korean Peninsula in the 21st Century: Political, Economic, and Security Issues in the Asia/Pacific Region. Part II, U.S. and Japanese Relations with the Korean Peninsula: Opportunities and Challenges.

    ERIC Educational Resources Information Center

    Mukai, Gary; Cheng, Amy; Amar, Jasmine; Donahue, Dave; Fisher, Grace; Klein, Emily; Lee, Joanne

    This curriculum unit is part two of a three-part series. Each of the three parts can be taught independently. The lessons include perspectives from each of the countries under study. This unit introduces students to challenges and opportunities presented by policy options for U.S. and Japanese relations with the Korean Peninsula at the turn of the…

  5. History and challenges of Brazilian social movements for the achievement of the right to adequate food.

    PubMed

    da Silva, Ana Carolina Feldenheimer; Recine, Elisabetta; Johns, Paula; Gomes, Fabio da Silva; Ferraz, Mariana de Araújo; Faerstein, Eduardo

    2018-03-01

    The historical struggles that Brazil faced to overcome malnutrition coincided with the empowerment of civil society and social movements which played a crucial role in the affirmation of health and food as social rights. After two decades under military dictatorship, Brazil went through a redemocratization process in the 1980s when activism emerged to demand spaces to participate in policy-making regarding the social agenda, including food and nutrition security (FNS). From 1988 onward institutional structures were established: the National Council of FNS (CONSEA) convenes government and civil society sectors to develop and monitor the implementation of policies, systems and actions. Social participation has been at the heart of structural changes achieved since then. Nevertheless, the country faces multiple challenges regarding FNS such as the double burden of disease, increasing use of pesticides and genetically modified seeds, weak regulation of ultra-processed products, and marketing practices that affect the environment, population health, and food sovereignty. This article aims at examining the development of the participatory political system and the role played by Brazilian social movements in the country's policies on FNS, in addition to outlining challenges faced by those policies.

  6. Firewall systems: the next generation

    NASA Astrophysics Data System (ADS)

    McGhie, Lynda L.

    1996-01-01

    To be competitive in today's globally connected marketplace, a company must ensure that their internal network security methodologies and supporting policies are current and reflect an overall understanding of today's technology and its resultant threats. Further, an integrated approach to information security should ensure that new ways of sharing information and doing business are accommodated; such as electronic commerce, high speed public broadband network services, and the federally sponsored National Information Infrastructure. There are many challenges, and success is determined by the establishment of a solid and firm baseline security architecture that accommodate today's external connectivity requirements, provides transitional solutions that integrate with evolving and dynamic technologies, and ultimately acknowledges both the strategic and tactical goals of an evolving network security architecture and firewall system. This paper explores the evolution of external network connectivity requirements, the associated challenges and the subsequent development and evolution of firewall security systems. It makes the assumption that a firewall is a set of integrated and interoperable components, coming together to form a `SYSTEM' and must be designed, implement and managed as such. A progressive firewall model will be utilized to illustrates the evolution of firewall systems from earlier models utilizing separate physical networks, to today's multi-component firewall systems enabling secure heterogeneous and multi-protocol interfaces.

  7. The carrot and the stick? Strategies to improve compliance with college campus tobacco policies

    PubMed Central

    Fallin-Bennett, Amanda; Roditis, Maria; Glantz, Stanton A.

    2017-01-01

    Objective Tobacco-free policies are being rapidly adopted nationwide, yet compliance with these policies remains a challenge. This study explored college campus key informants’ experiences with tobacco policies, and their perceived benefits, drawbacks, and outcomes. Participants The sample for this study was 68 key informants representing 16 different California universities with varying tobacco policies (no smoking indoors and within 20 feet of entrances, designated smoking areas, 100% smoke-free, and 100% tobacco-free). Methods Qualitative, descriptive study. Semistructured interviews were transcribed verbatim and analyzed using content analysis. Results Strategies to improve compliance ranged from a social approach to a heavy focus on punitive enforcement. Key informants from campuses using a social approach alone reported barriers to improving compliance, including a perceived lack of efficacy of the approach. However, these campuses found it challenging to incorporate enforcement through campus police or security. Conclusions College campus decision makers should explore using a combined approach (social approach as well as formal enforcement), with enforcement primarily the responsibility of nonpolice university channels (eg, Student Affairs, employee supervisors). PMID:27869568

  8. Ideas towards sustainable water security

    NASA Astrophysics Data System (ADS)

    Dalin, Carole

    2016-04-01

    With growing global demands and a changing climate, ensuring water security - the access to sufficient, quality water resources for health and livelihoods and an acceptable level of water related risk - is increasingly challenging. While a billion people still lack access to water, over-exploitation of this resource increases in many developed and developing parts of the world. While some solutions to water stress have been known for a long time, financial, cultural and political barriers often prevent their implementations. This talk will highlight three crucial areas that need to be addressed to progress towards sustainable water security. The first point is on scale, the second on the agricultural sector and irrigation, and the third on food trade and policy.

  9. Cosmopolitanism and foreign policy for health: ethics for and beyond the state

    PubMed Central

    2013-01-01

    Background Foreign policy holds great potential to improve the health of a global citizenship. Our contemporary political order is, in part, characterized by sovereign states acting either in opposition or cooperation with other sovereign states. This order is also characterized by transnational efforts to address transnational issues such as those featured so prominently in the area of global health, such as the spread of infectious disease, health worker migration and the movement of health-harming products. These two features of the current order understandably create tension for truly global initiatives. Discussion National security has become the dominant ethical frame underlying the health-based foreign policy of many states, despite the transnational nature of many contemporary health challenges. This ethical approach engages global health as a means to achieving national security objectives. Implicit in this ethical frame is the version of humanity that dichotomizes between “us” and “them”. What has been left out of this discourse, for the most part, is the role that foreign policy can play in extending the responsibility of states to protect and promote health of the other, for the sake of the other. Summary The principal purpose of this paper is to review arguments for a cosmopolitan ethics of health-based foreign policy. I will argue that health-based foreign policy that is motivated by security interests is lacking both morally and practically to further global health goals. In other words, a cosmopolitan ethic is not only intrinsically superior as a moral ideal, but also has potential to contribute to utilitarian ends. This paper draws on the cosmopolitanism literature to build robust support for foreign policies that contribute to sustainable systems of global health governance. PMID:23829176

  10. An Analysis of China's Fertilizer Policies: Impacts on the Industry, Food Security, and the Environment.

    PubMed

    Li, Yuxuan; Zhang, Weifeng; Ma, Lin; Huang, Gaoqiang; Oenema, Oene; Zhang, Fusuo; Dou, Zhengxia

    2013-07-01

    China has made remarkable strides in recent decades to grow enough food to feed 20% of the world's population with only 9% of the world's arable land. Meanwhile, the nation is experiencing exacerbated air and water pollution problems. Agricultural growth and the pollution aggravation are closely linked with policies affecting fertilizer production and use. Essentially nonexistent in 1950, China's fertilizer industry is now a robust conglomerate producing fertilizers in amounts that not only meet domestic demand but also contribute to international trade. The industry's growth stemmed from a series of policy progressions, featuring (i) a total control system with state ownership and central planning (1949-1984), (ii) a dual system of central planning and market adjustment (1985-1997), (iii) a market-driven system with government-mandated price caps (1998-2009), and (iv) a complete market-oriented system (since 2009). In conjunction with the policy changes were massive subsidy programs totaling more than $18 billion in 2010. The support policies and subsidies helped grow the industry and safeguard an adequate supply of fertilizers at affordable costs to farmers, but the artificially low-priced fertilizers also contributed to a nationwide trend of fertilizer overuse, leading to nutrient pollution. China needs innovative policies and programs to address food security and sustainability challenges. In this study, we review and analyze policies and programs related to China's fertilizer production and use in a 60-yr span (1950-2010) and discuss its impact on the development of the industry, food security, and pressing environmental issues. Finally, our study analyzes long-term trends in fertilizer use in China and offers some key viewpoints to stimulate debates among all stakeholders. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  11. Climate change, water security and the need for integrated policy development: the case of on-farm infrastructure investment in the Australian irrigation sector

    NASA Astrophysics Data System (ADS)

    Maraseni, T. N.; Mushtaq, S.; Reardon-Smith, K.

    2012-09-01

    The Australian Government is currently addressing the challenge of increasing water scarcity through significant on-farm infrastructure investment to facilitate the adoption of new water-efficient pressurized irrigation systems. However, it is highly likely that conversion to these systems will increase on-farm energy consumption and greenhouse gas (GHG) emissions, suggesting potential conflicts in terms of mitigation and adaptation policies. This study explored the trade-offs associated with the adoption of more water efficient but energy-intensive irrigation technologies by developing an integrated assessment framework. Integrated analysis of five case studies revealed trade-offs between water security and environmental security when conversion to pressurized irrigation systems was evaluated in terms of fuel and energy-related emissions, except in cases where older hand-shift sprinkler irrigation systems were replaced. These results suggest that priority should be given, in implementing on-farm infrastructure investment policy, to replacing inefficient and energy-intensive sprinkler irrigation systems such as hand-shift and roll-line. The results indicated that associated changes in the use of agricultural machinery and agrochemicals may also be important. The findings of this study support the use of an integrated approach to avoid possible conflicts in designing national climate change mitigation and adaptation policies, both of which are being developed in Australia.

  12. Building Skills, Increasing Economic Vitality: A Handbook of Innovative State Policies

    ERIC Educational Resources Information Center

    Biswas, Radha Roy; Mills, Jack; Prince, Heath

    2005-01-01

    In their 2004 State of the State speeches, the nation's governors cited many issues competing for their attention and their states' resources, including health care, education, crime, and security (Nodine 2004). Among the most compelling challenges were those related to economic development and the ability of a state's workforce to meet the needs…

  13. Low-Income Children, Their Families and the Great Recession: What Next in Policy?

    ERIC Educational Resources Information Center

    Aber, Lawrence; Chaudry, Ajay

    2010-01-01

    Children and youth vary in their developmental health due to differences in family economic security and exposure to toxic stress. The economic downturn has increased the challenges facing low-income children. The American Recovery and Reinvestment Act of 2009 (ARRA) and the President's first budget made significant down-payments on investments in…

  14. Democratization of Intelligence: Melding Strategic Intelligence and National Discourse

    DTIC Science & Technology

    2009-07-01

    encourages research on intelligence issues that distills lessons and improves Intelligence Community capabilities for policy-level and operational...2006). “Organizational Culture Challenges to Interagency and Intelligence Community Communication and Interaction.” A paper submitted to the Faculty...HOCHSTEIN, Miles. (1993). “Epistemic Communities : Intelligence Studies and International Relations,” Intelligence and National Security, 8, no. 3

  15. 75 FR 80853 - Designing a Digital Future: Federally Funded Research and Development in Networking and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-23

    ... general public. Such information includes, but is not limited to: A person's Social Security number; date... innovation is key to strengthening our economy and forming policy that works for the American people. PCAST... challenges are common across all of these sectors? c. What emerging innovations in these or other sectors...

  16. Influence Operations and the Internet: A 21st Century Issue. Legal, Doctrinal and Policy Challenges in the Cyber World

    DTIC Science & Technology

    2010-02-17

    create a single set of cyberlaws and procedures internationally in order to insure that there is no safe harbor for cyber criminals .”55 PUTTING IT ALL...TOGETHER – OPERATIONAL EXAMPLES Cyber criminals would include state and non-state actors threatening our security. Assuming all of the previous

  17. 21st Century Skills, Education & Competitiveness: A Resource and Policy Guide

    ERIC Educational Resources Information Center

    Partnership for 21st Century Skills, 2008

    2008-01-01

    Americans are deeply concerned about their present and future prospects in a time of economic uncertainty. Policymakers have a make-or-break opening--and an obligation--to chart a new path for public education that will secure the nation's economic competitiveness. This guide summarizes the challenges and opportunities that, if left unaddressed,…

  18. Examining the potential impacts of climate change on international security: EU-Africa partnership on climate change.

    PubMed

    Dodo, Mahamat K

    2014-01-01

    Climate Change like many global problems nowadays is recognized as a threat to the international security and cooperation. In theoretical terms, it is being securitized and included in the traditional security studies. Climate change and its accompanying environmental degradation are perceived to be a threat that can have incalculable consequences on the international community. The consequences are said to have more effects in small island developing nations and Africa where many States are fragile and overwhelmed with mounting challenges. In recent years, the security implications of the climate change are being addressed from national, regional and multilateral level. Against this backdrop, this paper intends to contribute to the debate on climate change and international security and present a broader perspective on the discussion. The paper will draw from the EU-Africa partnership on climate change and is structured as follows: the first part introduces the background of the international climate change policy and its securitization, the second part covers the EU-Africa relations and EU-Africa partnership on climate change, and the third part discusses the Congo Basin Forest Partnership as a concrete example of EU-Africa Partnership on Climate Change. Lastly, the paper concludes by drawing some conclusions and offers some policy perspectives and recommendations. Q54; 055; 052; 01;

  19. The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security

    NASA Technical Reports Server (NTRS)

    Scotti, Vincent, Jr.

    2015-01-01

    This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them.

  20. China's health care system reform: Progress and prospects.

    PubMed

    Li, Ling; Fu, Hongqiao

    2017-07-01

    This paper discusses the progress and prospects of China's complex health care reform beginning in 2009. The Chinese government's undertaking of systemic reform has achieved laudable achievements, including the expansion of social health insurance, the reform of public hospitals, and the strengthening of primary care. An innovative policy tool in China, policy experimentation under hierarchy, played an important role in facilitating these achievements. However, China still faces gaps and challenges in creating a single payer system, restructuring the public hospitals, and establishing an integrated delivery system. Recently, China issued the 13th 5-year plan for medical reform, setting forth the goals, policy priorities, and strategies for health reform in the following 5 years. Moreover, the Chinese government announced the "Healthy China 2030" blueprint in October 2016, which has the goals of providing universal health security for all citizens by 2030. By examining these policy priorities against the existing gaps and challenges, we conclude that China's health care reform is heading in the right direction. To effectively implement these policies, we recommend that China should take advantage of policy experimentation to mobilize bottom-up initiatives and encourage innovations. Copyright © 2017 John Wiley & Sons, Ltd.

  1. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 12 Banks and Banking 4 2011-01-01 2011-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  2. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... 12 Banks and Banking 5 2013-01-01 2013-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  3. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... 12 Banks and Banking 5 2014-01-01 2014-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  4. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 12 Banks and Banking 5 2012-01-01 2012-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  5. 12 CFR 344.8 - Securities trading policies and procedures.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Securities trading policies and procedures. 344.8 Section 344.8 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS... Securities trading policies and procedures. (a) Policies and procedures. Every bank effecting securities...

  6. Challenges in researching violence affecting health service delivery in complex security environments.

    PubMed

    Foghammar, Ludvig; Jang, Suyoun; Kyzy, Gulzhan Asylbek; Weiss, Nerina; Sullivan, Katherine A; Gibson-Fall, Fawzia; Irwin, Rachel

    2016-08-01

    Complex security environments are characterized by violence (including, but not limited to "armed conflict" in the legal sense), poverty, environmental disasters and poor governance. Violence directly affecting health service delivery in complex security environments includes attacks on individuals (e.g. doctors, nurses, administrators, security guards, ambulance drivers and translators), obstructions (e.g. ambulances being stopped at checkpoints), discrimination (e.g. staff being pressured to treat one patient instead of another), attacks on and misappropriation of health facilities and property (e.g. vandalism, theft and ambulance theft by armed groups), and the criminalization of health workers. This paper examines the challenges associated with researching the context, scope and nature of violence directly affecting health service delivery in these environments. With a focus on data collection, it considers how these challenges affect researchers' ability to analyze the drivers of violence and impact of violence. This paper presents key findings from two research workshops organized in 2014 and 2015 which convened researchers and practitioners in the fields of health and humanitarian aid delivery and policy, and draws upon an analysis of organizational efforts to address violence affecting healthcare delivery and eleven in-depth interviews with representatives of organizations working in complex security environments. Despite the urgency and impact of violence affecting healthcare delivery, there is an overall lack of research that is of health-specific, publically accessible and comparable, as well as a lack of gender-disaggregated data, data on perpetrator motives and an assessment of the 'knock-on' effects of violence. These gaps limit analysis and, by extension, the ability of organizations operating in complex security environments to effectively manage the security of their staff and facilities and to deliver health services. Increased research collaboration among aid organizations, researchers and multilateral organizations, such as the WHO, is needed to address these challenges. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Department of the Navy For Policy

    Science.gov Websites

    Policy DEPARTMENT OF THE NAVY For Policy Search this site... Search Policy Security Skip navigation links Security Expand Security Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: - Policy Page Content Deputy Under Secretary of the Navy (Policy) Roles and Responsibilities: Enterprise OPM

  8. Space assets, technology and services in support of energy policy

    NASA Astrophysics Data System (ADS)

    Vasko, C. A.; Adriaensen, M.; Bretel, A.; Duvaux-Bechon, I.; Giannopapa, C. G.

    2017-09-01

    Space can be used as a tool by decision and policy makers in developing, implementing and monitoring various policy areas including resource management, environment, transport, security and energy. This paper focuses on the role of space for the energy policy. Firstly, the paper summarizes the European Union's (EU) main objectives in energy policy enclosed in the Energy Strategy 2020-2030-2050 and demonstrates how space assets can contribute to achieving those objectives. Secondly, the paper addresses how the European Space Agency (ESA) has established multiple initiatives and programs that directly finance the development of space assets, technology and applications that deliver services in support of the EU energy policy and sector. These efforts should be continued and strengthened in order to overcome identified technological challenges. The use of space assets, technology and applications, can help achieve the energy policy objectives for the next decades.

  9. Engaging homeless youth in community-based participatory research: a case study from Skid Row, Los Angeles.

    PubMed

    Garcia, Analilia P; Minkler, Meredith; Cardenas, Zelenne; Grills, Cheryl; Porter, Charles

    2014-01-01

    Growing evidence highlights the benefits to youth of involvement in community-based participatory research. Less attention has been paid, however, to the contributions youth can make to helping change health-promoting policy through such work. We describe a multi-method case study of a policy-focused community-based participatory research project in the Skid Row area of downtown Los Angeles, California, where a small group of homeless youth worked with adult mentors to develop and conduct a survey of 96 homeless youth and used the findings to help secure health-promoting policy change. We review the partnership's work at each stage of the policy-making process; its successes in changing policy regarding recreation, juvenile justice, and education; and the challenges encountered, especially with policy enforcement. We share lessons learned, including the importance of strong adult mentors and of policy environments conducive to sustainable, health-promoting change for marginalized youth.

  10. Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment

    PubMed Central

    Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel

    2008-01-01

    Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979

  11. Water-energy-food security nexus: the road map

    NASA Astrophysics Data System (ADS)

    Hamdy, Atef

    2015-04-01

    The world's growing population and increased prosperity will increase global demand for energy, as well as food and water supplies in the coming decades. In the arid and semi arid regions as in most of the world water and energy have historically been managed separately, with little consideration of cross sectoral interactions, yet in reality, water and energy are closely interconnected. By addressing water and energy together planners can identify crucial interactions, conflicting demands and potential synergies. For many countries around the world it is needed to establish a road map on: (i) how to implement nexus policies to increase efficiency of natural resources management? (ii) how to bridge science with policy and business? (iii) how governments be inspired by business? (iv) how can be business be inspired by science? (v) how can we learn from each other and how collaborate to address the challenges ahead? Such road map should seek to bring together stakeholders involved in the nexus implementation approach over the coming years to develop nexus tools for decision making to quantify water energy food resources on both national and regional level. However, experiences gained and learned lessons indicate clearly that numerous countries are facing several barriers in putting in action their nexus road map due to the lack of integrated resource management, lack of capacity for research development, lack of knowledge sharing across sectors, and not enough interaction between policy makers and scientists. Those are major challenges to be faced to achieve the water, energy and food security nexus. Furthermore, such goal cannot be reached without building and strengthening the synergy between education, research and innovation for sustainable resource management. Those issues beside others will be fully discussed in this paper. Keywords: water-energy-food security; nexus

  12. A game-theoretical approach to multimedia social networks security.

    PubMed

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders.

  13. A Game-Theoretical Approach to Multimedia Social Networks Security

    PubMed Central

    Liu, Enqiang; Liu, Zengliang; Shao, Fei; Zhang, Zhiyong

    2014-01-01

    The contents access and sharing in multimedia social networks (MSNs) mainly rely on access control models and mechanisms. Simple adoptions of security policies in the traditional access control model cannot effectively establish a trust relationship among parties. This paper proposed a novel two-party trust architecture (TPTA) to apply in a generic MSN scenario. According to the architecture, security policies are adopted through game-theoretic analyses and decisions. Based on formalized utilities of security policies and security rules, the choice of security policies in content access is described as a game between the content provider and the content requester. By the game method for the combination of security policies utility and its influences on each party's benefits, the Nash equilibrium is achieved, that is, an optimal and stable combination of security policies, to establish and enhance trust among stakeholders. PMID:24977226

  14. Leadership Matters: Prime Minister Koizumi’s Role in the Normalization of Japan’s Post-9/11 Security Policy

    DTIC Science & Technology

    2008-12-01

    normalization of Japan’s post-9/11 security policy and discuss why it took his specific brand of leadership to allow Japan’s security policy to...security policy and discuss why it took his specific brand of leadership to allow Japan’s security policy to expand. vi THIS PAGE INTENTIONALLY LEFT...performance will demonstrate that institutional reasons alone will not make the position of prime minister stronger or more effective . The literature

  15. The Climate Disruption Challenge for Water Security in a Growing World

    NASA Astrophysics Data System (ADS)

    Paxton, L. J.; Nix, M.; Ihde, A.; MacDonald, L. H.; Parker, C.; Schaefer, R. K.; Weiss, M.; Babin, S. M.; Swartz, W. H.; Schloman, J.

    2012-12-01

    Climate disruption, the increasingly large and erratic departures of weather and climate from the benign conditions of the last one hundred years, is the greatest challenge to the long-term stability of world governments. Population growth, food and water security, energy supplies, and economic factors are, to some degree, within the control of governance and policy and all of these are impacted by climate disruption. Climate disruption, on the other hand, is not amenable to direct modification on the short timescales that commonly dictate governmental policy and human response. Global average temperatures will continue to increase even if there were immediate, profound changes in emission scenarios. Policy makers are faced with the very practical and immediate problem of determining what can one reasonably do to ameliorate the impact of climate disruption. The issue from a policy viewpoint is: how does one make effective policy when faced with a situation in which there are varied viewpoints in competition. How does one establish a consensus for action? What information "speaks" to policy makers? Water security is one such issue and provides an important, immediate, and tangible device to use when we examine how one can determine what policies can be effectively pursued. The Global Assimilation of Information for Action (GAIA) project creates a support environment to address the impact of climate disruption on global, national, regional, and/or local interests. The basic research community is concerned with the scientific aspects of predicting climate change in terms of environmental parameters such as rainfall, temperature and humidity while decision makers must deal with planning for a world that may be very different from the one we have grown accustomed to. Decision makers must deal with the long-term impacts on public health, agriculture, economic productivity, security, extreme weather, etc in an environment that has come to focus on short-term issues. To complicate matters, the information available from the climate studies community is couched in terms of model projections with "uncertainties" and a choice of emission scenarios that are often expressed in terms of the results of computer simulations and model output. GAIA develops actionable information and explores the interactions of policy and practice. Part of this framework is the development of "games". These realistic games include the elements of both agent-based and role simulation games in which subject matter experts interact in a realistic scenario to explore courses of action and their outcomes based on realistic, projected environments. We will present examples of some of the past work done at APL and examples of collaborative or competitive games that could be used to explore climate disruption in terms of social, political, and economic impacts. These games provide immediate, "tactile" experience of the implications of a choice of policy. In this talk we will suggest how this tool can be applied to problems like the Colorado River Basin or the Brahmaputra.

  16. What contribution can international relations make to the evolving global health agenda?

    PubMed

    Davies, Sara E

    2010-01-01

    This article presents two approaches that have dominated International Relations in their approach to the international politics of health. The statist approach, which is primarily security-focused, seeks to link health initiatives to a foreign or defence policy remit. The globalist approach, in contrast, seeks to advance health not because of its intrinsic security value but because it advances the well-being and rights of individuals. This article charts the evolution of these approaches and demonstrates why both have the potential to shape our understanding of the evolving global health agenda. It examines how the statist and globalist perspectives have helped shape contemporary initiatives in global health governance and suggests that there is evidence of an emerging convergence between the two perspectives. This convergence is particularly clear in the articulation of a number of UN initiatives in this area - especially the One World, One Health Strategic Framework and the Oslo Ministerial Declaration (2007) which inspired the first UN General Assembly resolution on global health and foreign policy in 2009 and the UN Secretary-General's note "Global health and foreign policy: strategic opportunities and challenges". What remains to be seen is whether this convergence will deliver on securing states' interest long enough to promote the interests of the individuals who require global efforts to deliver local health improvements.

  17. The Regulatory Framework for Privacy and Security

    NASA Astrophysics Data System (ADS)

    Hiller, Janine S.

    The internet enables the easy collection of massive amounts of personally identifiable information. Unregulated data collection causes distrust and conflicts with widely accepted principles of privacy. The regulatory framework in the United States for ensuring privacy and security in the online environment consists of federal, state, and self-regulatory elements. New laws have been passed to address technological and internet practices that conflict with privacy protecting policies. The United States and the European Union approaches to privacy differ significantly, and the global internet environment will likely cause regulators to face the challenge of balancing privacy interests with data collection for many years to come.

  18. Perspectives on African Challenges: Cross Cutting Issues and Policy Implications

    DTIC Science & Technology

    2012-09-01

    deemed  fit)  would  facilitate  effective  response  to  public  health  security  events  such  as   cholera ,  polio  or...University  of  Michigan,  after  carrying  out  ethnobotanical  fieldwork  in   Mexico  focusing  on  food   systems.  She

  19. Adult and Continuing Education in Europe: Using Public Policy to Secure a Growth in Skills (EUR 25943)

    ERIC Educational Resources Information Center

    Federighi, Paolo

    2013-01-01

    Adult and continuing education has the dual function of contributing to employability and economic growth, on the one hand, and responding to broader societal challenges, in particular promoting social cohesion, on the other. Companies and families support important investments that have, to date, ensured important growth in both skills and the…

  20. Coding ethical behaviour: the challenges of biological weapons.

    PubMed

    Rappert, Brian

    2003-10-01

    Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.

  1. Social Security Is Fair to All Generations: Demystifying the Trust Fund, Solvency, and the Promise to Younger Americans.

    PubMed

    Buchanan, Neil H

    The Social Security system has come under attack for having illegitimately transferred wealth from younger generations to the Baby Boom generation. This attack is unfounded, because it fails to understand how the system was altered in order to force the Baby Boomers to finance their own benefits in retirement. Any challenges that Social Security now faces are not caused by the pay-as-you-go structure of the system but by Baby Boomers' other policy errors, especially the emergence of extreme economic inequality since 1980. Attempting to fix the wrong problem all but guarantees a solution that will make matters worse. Generational justice and distributive justice go hand in hand.

  2. Policy Framework for Addressing Personal Security Issues Concerning Women and Girls. National Strategy on Community Safety and Crime Prevention.

    ERIC Educational Resources Information Center

    National Crime Prevention Centre, Ottawa (Ontario).

    This document presents a policy framework for improving the personal security of women and girls. The document includes: (1) "Introduction"; (2) "Policy Background" (the concept of personal security, the societal context of women's personal security, consequences of violence for women and girls, long-term policy concern, and…

  3. Competence-Based Curricula in the Context of Bologna and EU Higher Education Policy

    PubMed Central

    Davies, Howard

    2017-01-01

    At the turn of the century European higher education policy became twin-track. The Bologna Process was launched and ran alongside developments in European legislation. Both tracks displayed a preoccupation with competences, in relation both to citizenship and to labour market needs. Scrutiny of important policy texts (Key Competences, the European Qualifications Framework, ECTS, the Bologna three-cycle degree structure) shows that ‘competence’ has never been given a precise and secure definition. Only very recently has the term entered the discourse of EU legislation on the recognition of professional qualifications. Current work on competence-based curricula in sectoral professions, including pharmacy, has helped bring the two policy tracks into closer alignment. The examples of competences identified in specific professional contexts can assist EU and Bologna policy-makers as they confront future challenges. PMID:28970429

  4. Livelihoods, power, and food insecurity: adaptation of social capital portfolios in protracted crises--case study Burundi.

    PubMed

    Vervisch, Thomas G A; Vlassenroot, Koen; Braeckman, Johan

    2013-04-01

    The failure of food security and livelihood interventions to adapt to conflict settings remains a key challenge in humanitarian responses to protracted crises. This paper proposes a social capital analysis to address this policy gap, adding a political economy dimension on food security and conflict to the actor-based livelihood framework. A case study of three hillsides in north Burundi provides an ethnographic basis for this hypothesis. While relying on a theoretical framework in which different combinations of social capital (bonding, bridging, and linking) account for a diverse range of outcomes, the findings offer empirical insights into how social capital portfolios adapt to a protracted crisis. It is argued that these social capital adaptations have the effect of changing livelihood policies, institutions, and processes (PIPs), and clarify the impact of the distribution of power and powerlessness on food security issues. In addition, they represent a solid way of integrating political economy concerns into the livelihood framework. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.

  5. Policies | High-Performance Computing | NREL

    Science.gov Websites

    Use Learn about policy governing user accountability, resource use, use by foreign nationals states. Data Security Learn about the data security policy, including data protection, data security retention policy, including project-centric and user-centric data. Shared Storage Usage Learn about a policy

  6. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  7. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  8. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  9. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  10. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  11. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  12. 32 CFR 2400.42 - Security Officer.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.42 Security...

  13. Health in All (Foreign) Policy: challenges in achieving coherence.

    PubMed

    Labonté, Ronald

    2014-06-01

    Health in All Policies (HiAP) approach is generally perceived as an intersectoral approach to national or sub-national public policy development, such that health outcomes are given full consideration by non-health sectors. Globalization, however, has created numerous 'inherently global health issues' with cross-border causes and consequences, requiring new forms of global governance for health. Although such governance often includes both state and non-state (private, civil society) actors in agenda setting and influence, different actors have differing degrees of power and authority and, ultimately, it is states that ratify intergovernmental covenants or normative declarations that directly or indirectly affect health. This requires public health and health promotion practitioners working within countries to give increased attention to the foreign policies of their national governments. These foreign policies include those governing national security, foreign aid, trade and investment as well as the traditional forms of diplomacy. A new term has been coined to describe how health is coming to be positioned in governments' foreign policies: global health diplomacy. To become adept at this nuanced diplomatic practice requires familiarity with the different policy frames by which health might be inserted into the foreign policy deliberations, and thence intergovernmental/global governance negotiations. This article discusses six such frames (security, trade, development, global public goods, human rights, ethical/moral reasoning) that have been analytically useful in assessing the potential for greater and more health-promoting foreign policy coherence: a 'Health in All (Foreign) Policies' approach. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  14. Planning for large epidemics and pandemics: challenges from a policy perspective.

    PubMed

    Jain, Vageesh; Duse, Adriano; Bausch, Daniel G

    2018-05-24

    Less than two decades into the 21st century, the world has already witnessed numerous large epidemics or pandemics. These events have highlighted inadequacies in both national and international capacity for outbreak prevention, detection, and response. Here, we review some of the major challenges from a policy perspective. The most important challenges facing policymakers include financing outbreak preparedness and response in a complex political environment with limited resources, coordinating response efforts among a growing and diverse range of national and international actors, accurately assessing national outbreak preparedness, addressing the shortfall in the global biomedical workforce, building surge capacity of both human and material resources, balancing investments in public health and curative services, building capacity for outbreak-related research and development, and reinforcing measures for infection prevention and control. In recent years, numerous epidemics and pandemics have caused not only considerable loss of life but also billions of dollars of economic loss. Although the events have served as a wake-up call and led to the implementation of relevant policies and counter-measures, such as the Global Health Security Agenda, many questions remain and much work to be done. Wise policies and approaches for outbreak control exist, but will require the political will to implement them.

  15. Secure Publish-Subscribe Protocols for Heterogeneous Medical Wireless Body Area Networks

    PubMed Central

    Picazo-Sanchez, Pablo; Tapiador, Juan E.; Peris-Lopez, Pedro; Suarez-Tangil, Guillermo

    2014-01-01

    Security and privacy issues in medical wireless body area networks (WBANs) constitute a major unsolved concern because of the challenges posed by the scarcity of resources in WBAN devices and the usability restrictions imposed by the healthcare domain. In this paper, we describe a WBAN architecture based on the well-known publish-subscribe paradigm. We present two protocols for publishing data and sending commands to a sensor that guarantee confidentiality and fine-grained access control. Both protocols are based on a recently proposed ciphertext policy attribute-based encryption (CP-ABE) scheme that is lightweight enough to be embedded into wearable sensors. We show how sensors can implement lattice-based access control (LBAC) policies using this scheme, which are highly appropriate for the eHealth domain. We report experimental results with a prototype implementation demonstrating the suitability of our proposed solution. PMID:25460814

  16. Health policy and the community safety net for individuals with intellectual disability.

    PubMed

    Pollack, Harold A

    2011-01-01

    This article explores social policy developments in the arena of intellectual and developmental disabilities. It begins by summarizing the challenges facing persons with intellectual disabilities and their caregivers in 1945. Families depended on a patchwork of over-crowded and under-funded large state institutions. Children with intellectual disabilities were marginalized from education and public services. Shame and stigma, along with the lack of community-based services, led many parents to institutionalize a child. The federal government provided almost no specific assistance for disabled individuals or to their families. Postwar America provided fertile ground for parents to act collectively through the emergence of the National Association of Retarded Children (NARC). Partly as a consequence of such organizing, the 1950s marked a surprising turning-point, in which the federal government expanded income support to disabled persons through measures such as Social Security's "Disabled Adult Child" program and, by the early 1970s, the advent of Supplemental Security Income (SSI). It also reviews the growth of Medicaid as the dominant payer of medical and social services at the boundaries between personal medical services, case management, education, and other social services. The article ends by summarizing current challenges in intellectual disability policy. It notes that the size, complexity, and expense of I/DD services poses inherent challenges, particularly to state and local governments in the current recession. Adjusting for inflation, 23 states actually reduced real spending on I/DD services between 2008 and 2009. Controlling for local conditions, politically conservative states enacted deeper cuts and spent a smaller fraction of state income on intellectual disability services than other states. Copyright © 2012 Wiley Periodicals, Inc.

  17. Health in the 5th 5-years Development Plan of Iran: Main Challenges, General Policies and Strategies

    PubMed Central

    Vosoogh Moghaddam, A; Damari, B; Alikhani, S; Salarianzedeh, MH; Rostamigooran, N; Delavari, A; Larijani, B

    2013-01-01

    Access to the right to the highest attainable level of health is a constitutional right that obliges governments and other players to take step to increase all individuals’ chances of obtaining good health. At the least, health and education are two crucial requirements for this as well. Iran’s vision 2025 is going to lead the country to a developed state with the highest rank of economic, scientific and technological status in the region. Enjoying health, welfare, food security, social security, equal opportunities, etc, are also considered as part of characteristics of Iranian society in 2025. Although health system of Iran has many achievements in providing health services specially for the poor following the Islamic Revolution of 1979, but the evidences gathered to develop the 5th 5-years economical, social and cultural plan (5th5YDP:2011–2015), listed a variety of main challenges in stewardship, financing, resources generation and service provision functions of the existing health system. Thus, to overcome the main challenges, about 11% of general policies of 5th5YDP are directly address health related issues with emphasizing on healthy human and comprehensive health approach with considering: Integration of policy making, planning, evaluation, supervision and public financing; Developing both quantity and quality of health insurance system and reducing out-of-pocket expenditures for health services to 30% by the end of the 5th plan. The strategies of 5th5YDP adopted by the parliament as an Act will change the health system fundamentally through tuning the main drivers; so, its implementation needs brave leaders, capable managers, motivated technical staff and social mobilization. PMID:23865015

  18. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  19. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  20. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  1. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  2. 32 CFR 2400.46 - Suggestions or complaints.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.46... Science and Technology Policy Information Security Program should do so in writing. This correspondence...

  3. Gulf Cooperation Council: search for security in the Persian Gulf

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kechichian, J.A.

    1985-01-01

    This study purports to analyze the conservative Arab monarchies' search for regional security in the Persian Gulf. It speculates on the GCC's future prospects as a vehicle of cooperation in the field of security. Threats to the member states of the GCC stem from the policies pursued by revolutionary Iran, Israel, the Soviet Union and its proxies, and a regime in Iraq. The proposition is developed that these sources of threat present an overwhelming challenge to the security and stability of GCC states. Second, it examines the capabilities of the GCC member states for coping with threats. Conceived broadly, bothmore » military and non-military capabilities are examined. Security relations of the GCC states with external powers as a means of enhancing their abilities to cope more effectively with both internal and external threats are examined. Particular attention is devoted to the domestic consequences of these special relations. Third, it discusses the GCC's reactions to perceived regional threats. These include the Iran-Iraq War, the Arab-Israeli conflict, the Soviet threat, and potential political sources of dissidence in member states. It is argued that although GCC states have adopted a number of joint policies, they did not respond to or initiate action on either the Iranian Revolution, the Palestine conflict, the Soviet occupation of Afghanistan, the Gulf war or the recent Israeli invasion of Lebanon.« less

  4. Infant nutrition in Saskatoon: barriers to infant food security.

    PubMed

    Partyka, Brendine; Whiting, Susan; Grunerud, Deanna; Archibald, Karen; Quennell, Kara

    2010-01-01

    We explored infant nutrition in Saskatoon by assessing current accessibility to all forms of infant nourishment, investigating challenges in terms of access to infant nutrition, and determining the use and effectiveness of infant nutrition programs and services. We also examined recommendations to improve infant food security in Saskatoon. Semi-structured community focus groups and stakeholder interviews were conducted between June 2006 and August 2006. Thematic analysis was used to identify themes related to infant feeding practices and barriers, as well as recommendations to improve infant food security in Saskatoon. Our study showed that infant food security is a concern among lower-income families in Saskatoon. Barriers that limited breastfeeding sustainability or nourishing infants through other means included knowledge of feeding practices, lack of breastfeeding support, access and affordability of infant formula, transportation, and poverty. Infant nutrition and food security should be improved by expanding education and programming opportunities, increasing breastfeeding support, and identifying acceptable ways to provide emergency formula. If infant food security is to be addressed successfully, discussion and change must occur in social policy and family food security contexts.

  5. Supporting Youth Transitioning out of Foster Care. Issue Brief 1: Education Programs. OPRE Report No. 2014-66

    ERIC Educational Resources Information Center

    Dworsky, Amy; Smithgall, Cheryl; Courtney, Mark E.

    2014-01-01

    Youth transitioning out of foster care and into adulthood need many supports to navigate the challenges they face. Over the past three decades, federal child welfare policy has significantly increased the availability of those supports. In 1999, the Foster Care Independence Act amended Title IV-E of the Social Security Act to create the Chafee…

  6. Microgrid Enabled Distributed Energy Solutions (MEDES) - Fort Bliss Military Reservation

    DTIC Science & Technology

    2014-04-01

    Security Act EPA Environmental Protection Agency EPAct05 Energy Policy Act of 2005 EPDF Enlisted Personnel Dining Facility EPEC El Paso Electric Company...Retrofitting the existing electrical infrastructure was a challenge, especially with the existing switchboard layout restricting the addition of motor ...operators (to allow for load shedding). The Lockheed Martin team installed as many motor operators as physically possible in the existing

  7. Violent Crime in Post-Civil War Guatemala: Causes and Policy Implications

    DTIC Science & Technology

    2015-03-01

    on field research and case studies in Honduras, Bolivia, and Argentina. Bailey’s Security Trap theory is comprehensive in nature and derived from... research question. The second phase uses empirical data and comparative case studies to validate or challenge selected arguments that potentially...Contextual relevancy, historical inference, Tools: Empirics and case conclusions empirical data studies Figme2. Sample Research Methodology E

  8. 17 CFR 200.735-2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Policy. 200.735-2 Section 200.735-2 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND... Members and Employees of the Commission § 200.735-2 Policy. (a) The Securities and Exchange Commission has...

  9. Social security reform in Latin America: policy challenges.

    PubMed

    Kay, Stephen J; Kritzer, Barbara E

    2002-01-01

    Over the last decade Latin American countries have served as the world's laboratory for pension systems based on individual retirement savings accounts. Some countries have adopted defined-contribution individual accounts as a replacement for state-run pension systems; other countries have embraced mixed systems of have made individual accounts optional and supplementary. This article outlines some of the most significant elements of recent Latin American pension reforms and examines some of the most serious policy challenges faced by governments implementing the new systems of individual accounts, including the need to reduce administrative costs, limit evasion, incorporate new categories of workers into the system, and improve competition in the pension fund industry. The authors conclude that there is no single Latin America model, and that reform itself has been and will continue to be an incremental process.

  10. Concepts for a standard based cross-organisational information security management system in the context of a nationwide EHR.

    PubMed

    Mense, Alexander; Hoheiser-Pförtner, Franz; Schmid, Martin; Wahl, Harald

    2013-01-01

    Working with health related data necessitates appropriate levels of security and privacy. Information security, meaning ensuring confidentiality, integrity, and availability, is more organizational, than technical in nature. It includes many organizational and management measures, is based on well-defined security roles, processes, and documents, and needs permanent adaption of security policies, continuously monitoring, and measures assessment. This big challenge for any organization leads to implementation of an information security management system (ISMS). In the context of establishing a regional or national electronic health record for integrated care (ICEHR), the situation is worse. Changing the medical information exchange from on-demand peer-to-peer connections to health information networks requires all organizations participating in the EHR system to have consistent security levels and to follow the same security guidelines and rules. Also, the implementation must be monitored and audited, establishing cross-organizational information security management systems (ISMS) based on international standards. This paper evaluates requirements and defines basic concepts for an ISO 27000 series-based cross-organizational ISMS in the healthcare domain and especially for the implementation of the nationwide electronic health record in Austria (ELGA).

  11. The New Era of Counterforce

    NASA Astrophysics Data System (ADS)

    Lieber, Keir

    Nuclear deterrence rests on the survivability of nuclear arsenals. For much of the nuclear age, counterforce disarming attacks those aimed at eliminating nuclear forces were nearly impossible because of the ability of potential victims to hide and protect their weapons. However, technological developments are eroding this foundation of nuclear deterrence. Advances rooted in the computer revolution have made nuclear forces around the world far more vulnerable than before. Specifically, two key approaches that countries have relied on to ensure arsenal survivability since the dawn of the nuclear age hardening and concealment have been undercut by leaps in weapons accuracy and a revolution in remote sensing. Various models, methods, and evidence demonstrate the emergence of new possibilities for counterforce disarming strikes. In short, the task of securing nuclear arsenals against attack is a far greater challenge than it was in the past. The new era of counterforce challenges the basis for confidence in contemporary deterrence stability, raises critical issues for national and international security policy, and sheds light on one of the enduring theoretical puzzles of the nuclear era: why international security competition has endured in the shadow of the nuclear revolution.

  12. The Energy-Water Nexus: Managing the Links between Energy and Water for a Sustainable Future

    NASA Astrophysics Data System (ADS)

    Hussey, Karen; Petit, Carine

    2010-05-01

    Water and energy are both indispensable inputs to modern economies but currently both resources are under threat owing to the impacts of an ever-increasing population and associated demand, unsustainable practices in agriculture and manufacturing, and the implications of a changing climate. However, it is where water and energy rely on each other that pose the most complex challenges for policy-makers. Water is needed for mining coal, drilling oil, refining gasoline, and generating and distributing electricity; and, conversely, vast amounts of energy are needed to pump, transport, treat and distribute water, particularly in the production of potable water through the use of desalination plants and waste water treatment plants. Despite the links, and the urgency in both sectors for security of supply, in existing policy frameworks energy and water policies are developed largely in isolation from one another. Worse still, some policies designed to encourage alternative energy supplies give little thought to the resultant consequences on water resources, and, similarly, policies designed to secure water supplies pay little attention to the resultant consequences on energy use. The development of new technologies presents both opportunities and challenges for managing the energy-water nexus but a better understanding of the links between energy and water is essential in any attempt to formulate policies for more resilient and adaptable societies. The energy-water nexus must be adequately integrated into policy and decision-making or governments run the risk of contradicting their efforts, and therefore failing in their objectives, in both sectors. A series of COST Exploratory Workshops, drawing on on-going research in the energy-water nexus from a number of international teams, identified the implications of the energy-water nexus on the development of (i) energy policies (ii) water resource management policies and (iii) climate adaptation and mitigation policies. A preliminary list of recommendations on how best to account for and integrate these impacts into policy and decision-making processes at various institutional levels was prepared and future research needs in the energy-water nexus were suggested as main outcomes. This presentation draws on the contributions to the COST water-energy-links exploratory workshops and the development of 12 case studies undertaken by researchers from Europe, the United States, Australia and China, which will be published in a Special Feature of Ecology and Society, mid-2010.

  13. Playing the role of a ‘boundary organisation’: getting smarter with networking

    PubMed Central

    2011-01-01

    Background This paper discusses the practices of organisations that cross the boundary between research and politics, to promote evidence-based policies and programmes. Methods It uses the experience of a network of organisations in Africa to describe the methodology, challenges and successes of efforts to promote utilisation of research on the inter-connections between HIV/AIDS, food security and nutrition in South Africa. It emphasises that crossing the boundary between science and politics can be done systematically and is inevitable for any attempt that seeks influence policy making. Results The paper reveals the complexity of the research-policy making interface and identifies key lessons for the practice of networking and engaging policy and decision-makers. Conclusion The concept of boundary organisation is a helpful means to understand the methodological underpinnings of efforts to get research into policy and practice and to understand the ‘messy’ process of doing so. PMID:21679378

  14. Playing the role of a 'boundary organisation': getting smarter with networking.

    PubMed

    Drimie, Scott; Quinlan, Tim

    2011-06-16

    This paper discusses the practices of organisations that cross the boundary between research and politics, to promote evidence-based policies and programmes. It uses the experience of a network of organisations in Africa to describe the methodology, challenges and successes of efforts to promote utilisation of research on the inter-connections between HIV/AIDS, food security and nutrition in South Africa. It emphasises that crossing the boundary between science and politics can be done systematically and is inevitable for any attempt that seeks influence policy making. The paper reveals the complexity of the research-policy making interface and identifies key lessons for the practice of networking and engaging policy and decision-makers. The concept of boundary organisation is a helpful means to understand the methodological underpinnings of efforts to get research into policy and practice and to understand the 'messy' process of doing so.

  15. Addressing China's grand challenge of achieving food security while ensuring environmental sustainability.

    PubMed

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C; Bailey, Mark; Gordon, Iain J; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-02-01

    China's increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies.

  16. In acceptance we trust? Conceptualising acceptance as a viable approach to NGO security management.

    PubMed

    Fast, Larissa A; Freeman, C Faith; O'Neill, Michael; Rowley, Elizabeth

    2013-04-01

    This paper documents current understanding of acceptance as a security management approach and explores issues and challenges non-governmental organisations (NGOs) confront when implementing an acceptance approach to security management. It argues that the failure of organisations to systematise and clearly articulate acceptance as a distinct security management approach and a lack of organisational policies and procedures concerning acceptance hinder its efficacy as a security management approach. The paper identifies key and cross-cutting components of acceptance that are critical to its effective implementation in order to advance a comprehensive and systematic concept of acceptance. The key components of acceptance illustrate how organisational and staff functions affect positively or negatively an organisation's acceptance, and include: an organisation's principles and mission, communications, negotiation, programming, relationships and networks, stakeholder and context analysis, staffing, and image. The paper contends that acceptance is linked not only to good programming, but also to overall organisational management and structures. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.

  17. Understanding policy persistence-The case of police drug detection dog policy in NSW, Australia.

    PubMed

    Hughes, Caitlin E; Ritter, Alison; Lancaster, Kari; Hoppe, Robert

    2017-06-01

    Significant research attention has been given to understanding the processes of drug policy reform. However, there has been surprisingly little analysis of the persistence of policy in the face of opposition and evidence of ineffectiveness. In this article we analysed just such a case - police drug detection dog policy in NSW, Australia. We sought to identify factors which may account for the continuation of this policy, in spite of counter-evidence and concerted advocacy. The analysis was conducted using the Advocacy Coalition Framework (ACF). We collated documents relating to NSW drug detection dog policy from 1995 to 2016, including parliamentary records (NSW Parliament Hansard), government and institutional reports, legislation, police procedures, books, media, and academic publications. Texts were then read, coded and classified against the core dimensions of the ACF, including subsystem actors and coalitions, their belief systems and resources and venues employed for policy debate. Three coalitions were identified as competing in the policy subsystem: security/law and order, civil liberties and harm reduction. Factors that aided policy stability were the continued dominance of the security/law and order coalition since they introduced the drug dog policy; a power imbalance enabling the ruling coalition to limit when and where the policy was discussed; and a highly adversarial policy subsystem. In this context even technical knowledge that dogs infringed civil liberties and increased risks of overdose were readily downplayed, leading to only incremental changes in implementation rather than policy cessation or wholesale revision. The analysis provides new insights into why the accumulation of new evidence and advocacy efforts can be insufficient to drive significant policy change. It poses a challenge for the evidence-based paradigm suggesting that in highly adversarial policy subsystems new evidence is unlikely to generate policy change without broader subsystem change, such as reducing the adversarial nature and/or providing new avenues for cross-coalition learning. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. The Role of Latin America’s Land and Water Resources for Global Food Security: Environmental Trade-Offs of Future Food Production Pathways

    PubMed Central

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D.; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity’s major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC’s agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)—a global dynamic partial equilibrium model of the agricultural sector—to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths. PMID:25617621

  19. The role of Latin America's land and water resources for global food security: environmental trade-offs of future food production pathways.

    PubMed

    Flachsbarth, Insa; Willaarts, Bárbara; Xie, Hua; Pitois, Gauthier; Mueller, Nathaniel D; Ringler, Claudia; Garrido, Alberto

    2015-01-01

    One of humanity's major challenges of the 21st century will be meeting future food demands on an increasingly resource constrained-planet. Global food production will have to rise by 70 percent between 2000 and 2050 to meet effective demand which poses major challenges to food production systems. Doing so without compromising environmental integrity is an even greater challenge. This study looks at the interdependencies between land and water resources, agricultural production and environmental outcomes in Latin America and the Caribbean (LAC), an area of growing importance in international agricultural markets. Special emphasis is given to the role of LAC's agriculture for (a) global food security and (b) environmental sustainability. We use the International Model for Policy Analysis of Agricultural Commodities and Trade (IMPACT)-a global dynamic partial equilibrium model of the agricultural sector-to run different future production scenarios, and agricultural trade regimes out to 2050, and assess changes in related environmental indicators. Results indicate that further trade liberalization is crucial for improving food security globally, but that it would also lead to more environmental pressures in some regions across Latin America. Contrasting land expansion versus more intensified agriculture shows that productivity improvements are generally superior to agricultural land expansion, from an economic and environmental point of view. Finally, our analysis shows that there are trade-offs between environmental and food security goals for all agricultural development paths.

  20. Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.

    PubMed

    Jandl, T

    1998-01-01

    This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.

  1. Personalized health care and health information technology policy: an exploratory analysis.

    PubMed

    Wald, Jonathan S; Shapiro, Michael

    2013-01-01

    Personalized healthcare (PHC) is envisioned to enhance clinical practice decision-making using new genome-driven knowledge that tailors diagnosis, treatment, and prevention to the individual patient. In 2012, we conducted a focused environmental scan and informal interviews with fifteen experts to anticipate how PHC might impact health Information Technology (IT) policy in the United States. Findings indicatedthat PHC has a variable impact on current clinical practice, creates complex questions for providers, patients, and policy-makers, and will require a robust health IT infrastructure with advanced data architecture, clinical decision support, provider workflow tools, and re-use of clinical data for research. A number of health IT challenge areas were identified, along with five policy areas including: interoperable clinical decision support, standards for patient values and preferences, patient engagement, data transparency, and robust privacy and security.

  2. 48 CFR 1804.470-2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... ADMINISTRATIVE MATTERS Safeguarding Classified Information Within Industry 1804.470-2 Policy. NASA IT security...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...

  3. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  4. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later than...

  5. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... must be submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 11...

  6. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  7. 75 FR 39582 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-09

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... telephone number of individuals planning to attend must be submitted to the Information Security Oversight...

  8. Assessing and Evaluating Department of Defense Efforts to Inform, Influence, and Persuade: Worked Example

    DTIC Science & Technology

    2017-01-01

    intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to...permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the...world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do

  9. Counter-Terrorism and the Use of Force in International Law

    DTIC Science & Technology

    2002-11-01

    authority of the Council to establish such tribunals was unsuccessfully challenged in an interlocutory appeal before the Appeals Chamber of the...see report 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT 18. NUMBER OF PAGES 107 19a. NAME OF RESPONSIBLE PERSON...State may resort to force as an instrument of national policy. Although States have conducted military counter-terrorist operations in the past, the

  10. Risk Management as Strategic Change in National Homeland Security Policy

    DTIC Science & Technology

    2007-09-01

    HSI is operated under contract by Analytic Services Inc., with oversight from DHS Science and Technology (S& T ). 94 Threat and risk analysis are...Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget...risk management to the nation’s critical infrastructure owners and operators . This paper explores the challenges involved in implementing the risk

  11. Fiscal Year 2010 U.S. Government Financial Statements: Federal Government Continues To Face Financial Management And Long-Term Fiscal Challenges

    DTIC Science & Technology

    2011-03-09

    effective oversight of federal government programs and policies. Over the years, certain material weaknesses in internal control over...ineffective process for preparing the consolidated financial statements. In addition to the material weaknesses underlying these major impediments, GAO...noted material weaknesses involving billions of dollars in improper payments, information security, and tax collection activities. With regard to the

  12. Strategic Information Warfare: Challenges for the United States.

    DTIC Science & Technology

    1998-05-01

    Professor Richard H. Shultz Jr. as Director of the International Security Studies Program at the Fletcher School, helped provide both the academic...of Information Warfare and Strategy at National Defense University; and Larry Rothenberg, Institute for Foreign Policy Analysis. Captain Richard P...War in the Information Age" in War in the Information Age. Robert L. Pfaltzgraff, Jr. and Richard P. Shultz, Jr., eds. London: Brassey’s, 1997

  13. Aligning American Higher Education with a Twenty-First-Century Public Agenda. Examining the National Purposes of American Higher Education: A Leadership Approach to Policy Reform

    ERIC Educational Resources Information Center

    Duderstadt, James J.

    2009-01-01

    Today higher education faces the challenge of reconsidering and realigning its public agenda to serve better an era in which educated people, the knowledge they produce, and the innovation and entrepreneurial skills they possess have become the keys to economic prosperity, national security, and social well-being. The imperatives of expanding…

  14. Asian Transnational Security Challenge: Emerging Trends, Regional Visions

    DTIC Science & Technology

    2010-10-01

    the official policy or position of the Defense Threat Reduction Agency, the Department of Defense, or the United States Government . This report...the terrorist threat as seen through Southeast Asian eyes. IDA drew on its extensive network of academic and government contacts across Asia to...Asia would advance both government and non- government efforts to develop a better understanding of the roots of the terrorist threat and its links

  15. The Shaping of Managers' Security Objectives through Information Security Awareness Training

    ERIC Educational Resources Information Center

    Harris, Mark A.

    2010-01-01

    Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…

  16. The Policy Trade-off Between Energy Security and Climate Change in the GCC States

    NASA Astrophysics Data System (ADS)

    Shahbek, Shaikha Ali

    Developing policies for energy security and climate change simultaneously can be very challenging as there is a trade-off. This research project strives to analyze the policies regarding the same that should be developed in the Gulf Co-operation Council (GCC) States which are; Saudi Arabia, Kuwait, Qatar, United Arab Emirates, Bahrain and Oman. Energy security is important in these countries because it is the prominent sector of their economies. Yet, the environment is being negatively impacted because of the energy production. There has been lot of international pressure on the GCC to divert its production and move towards clean energy production. It needs more research and development, as well as better economic diversification to maintain and improve the economic growth. Along with the literature review that has been used to study the cases and impacts of the GCC states, six in-depth interviews were conducted with professors, scholars and specialists in the environment and natural science fields to discuss about the GCC's situation. It has been alluded that the GCC states cannot be held solely responsible about the climate change because they are not the only energy producing nations in the world. Based on OPEC, there are 14 countries including the United States and China that also have prominent energy sectors. They should also be held accountable for the causes of environmental and climate change. This research provides recommendations for the GCC states to follow and apply in order to move forward with clean energy production, economic diversification and develop better policies.

  17. Nuclear rapprochement in Argentina and Brazil: Workshop summary

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    James E. Doyle

    1999-10-01

    On October 21 and 22, 1998, the Center for International Security Affairs at Los Alamos National Laboratory and the Center for Global Security and Cooperation at Science Applications International Corporation hosted the first of a series of work-shops on states that have chosen to roll back their pursuit of nuclear arms. The objective of the workshop series is to conduct a systematic evaluation of the roles played by U.S. nonproliferation policy in cases of nuclear rollback or restraint and to provide recommendations for future nonproliferation efforts based on lessons learned. Key attendees at the workshop included officials and former officialsmore » from the foreign ministries of Argentina and Brazil, and current and former officials from the U.S. Department of State, the Arms Control and Disarmament Agency (ACDA), and the Department of Energy (DOE). Scholars and independent researchers who have examined nuclear policy in Argentina and Brazil also participated. This workshop report includes important background information that helps set the stage for assessing nuclear policies in Argentina and Brazil. It describes national perspectives and areas of consensus and debate among the participants, particularly on the questions of lessons learned and their salience to proliferation challenges in other states. It also summarizes key questions and propositions regarding the roles played in these cases by U.S. nonproliferation policy.« less

  18. Health and foreign policy in question: the case of humanitarian action.

    PubMed

    Thieren, Michel

    2007-03-01

    Health has gained recognition as a foreign policy concern in recent years. Political leaders increasingly address global health problems within their international relations agendas. The confluence of health and foreign policy has opened these issues to analysis that helps clarify the tenets and determinants of this linkage, offering a new framework for international health policy. Yet as health remains profoundly bound to altruistic values, caution is required before generalizing about the positive outcomes of merging international health and foreign policy principles. In particular, the possible side-effects of this framework deserve further consideration. This paper examines the interaction of health and foreign policy in humanitarian action, where public health and foreign policy are often in direct conflict. Using a case-based approach, this analysis shows that health and foreign policy need not be at odds in this context, although there are situations where altruistic and interest-based values compete. The hierarchy of foreign policy functions must be challenged to avoid misuse of national authority where health interventions do not coincide with national security and domestic interests.

  19. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  20. E-Commerce and Security Governance in Developing Countries

    NASA Astrophysics Data System (ADS)

    Sanayei, Ali.; Rajabion, Lila

    Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.

  1. What are we assessing when we measure food security? A compendium and review of current metrics.

    PubMed

    Jones, Andrew D; Ngure, Francis M; Pelto, Gretel; Young, Sera L

    2013-09-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics.

  2. What Are We Assessing When We Measure Food Security? A Compendium and Review of Current Metrics12

    PubMed Central

    Jones, Andrew D.; Ngure, Francis M.; Pelto, Gretel; Young, Sera L.

    2013-01-01

    The appropriate measurement of food security is critical for targeting food and economic aid; supporting early famine warning and global monitoring systems; evaluating nutrition, health, and development programs; and informing government policy across many sectors. This important work is complicated by the multiple approaches and tools for assessing food security. In response, we have prepared a compendium and review of food security assessment tools in which we review issues of terminology, measurement, and validation. We begin by describing the evolving definition of food security and use this discussion to frame a review of the current landscape of measurement tools available for assessing food security. We critically assess the purpose/s of these tools, the domains of food security assessed by each, the conceptualizations of food security that underpin each metric, as well as the approaches that have been used to validate these metrics. Specifically, we describe measurement tools that 1) provide national-level estimates of food security, 2) inform global monitoring and early warning systems, 3) assess household food access and acquisition, and 4) measure food consumption and utilization. After describing a number of outstanding measurement challenges that might be addressed in future research, we conclude by offering suggestions to guide the selection of appropriate food security metrics. PMID:24038241

  3. Considerations When Including Students with Disabilities in Test Security Policies. NCEO Policy Directions. Number 23

    ERIC Educational Resources Information Center

    Lazarus, Sheryl; Thurlow, Martha

    2015-01-01

    Sound test security policies and procedures are needed to ensure test security and confidentiality, and to help prevent cheating. In this era when cheating on tests draws regular media attention, there is a need for thoughtful consideration of the ways in which possible test security measures may affect accessibility for some students with…

  4. [Public sector and social and health policy reforms. An inventory on the eve of the new millennium].

    PubMed

    Gerschman, S

    1999-01-01

    This study reflects on reforms in health systems and social policies within the framework of the so-called public sector reforms. The point of departure is a review of various explanations for the crisis in the Welfare State, present in the literature from the 1990s. Social policies, at the heart of the crisis, are heavily challenged. What we intend to demonstrate is that this argument plays a specific role, that of introducing neoliberal changes into economic policy, in which the economic tools used generate abstention by the state from the social sphere, deregulation of national economies in favor of the free market, and the fundamentally oversized role of the international financial market. Within this context we analyze the social security and health system reforms. The final part of the article deals with current difficulties in social policies, focusing the debate on a mapping of possible alternatives for developing social and health policies.

  5. Global impacts of U.S. bioenergy production and policy: A general equilibrium perspective

    NASA Astrophysics Data System (ADS)

    Evans, Samuel Garner

    The conversion of biomass to energy represents a promising pathway forward in efforts to reduce fossil fuel use in the transportation and electricity sectors. In addition to potential benefits, such as greenhouse gas reductions and increased energy security, bioenergy production also presents a unique set of challenges. These challenges include tradeoffs between food and fuel production, distortions in energy markets, and terrestrial emissions associated with changing land-use patterns. Each of these challenges arises from market-mediated responses to bioenergy production, and are therefore largely economic in nature. This dissertation directly addresses these opportunities and challenges by evaluating the economic impacts of U.S. bioenergy production and policy, focusing on both existing and future biomass-to-energy pathways. The analysis approaches the issue from a global, economy-wide perspective, reflecting two important facts. First, that large-scale bioenergy production connects multiple sectors of the economy due to the use of agricultural land resources for biomass production, and competition with fossil fuels in energy markets. Second, markets for both agricultural and energy commodities are highly integrated globally, causing domestic policies to have international effects. The reader can think of this work as being comprised of three parts. Part I provides context through an extensive review of the literature on the market-mediated effects of conventional biofuel production (Chapter 2) and develops a general equilibrium modeling framework for assessing the extent to which these phenomenon present a challenge for future bioenergy pathways (Chapter 3). Part II (Chapter 4) explores the economic impacts of the lignocellulosic biofuel production targets set in the U.S. Renewable Fuel Standard on global agricultural and energy commodity markets. Part III (Chapter 5) extends the analysis to consider potential inefficiencies associated with policy-induced competition for biomass between the electricity and transportation fuel sectors.

  6. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  7. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  8. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  9. 48 CFR 39.101 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ..., including consideration of security of resources, protection of privacy, national security and emergency... information technology, agencies shall include the appropriate information technology security policies and requirements, including use of common security configurations available from the National Institute of...

  10. New institutional mechanisms to bridge the information gap between climate science and public policy decisions

    NASA Astrophysics Data System (ADS)

    Rogers, W.; Gulledge, J. M.

    2010-12-01

    Many decision makers lack actionable scientific information needed to prepare for future challenges associated with climate change. Although the scope and quality of available scientific information has increased dramatically in recent years, this information does not always reach - or is not presented in a form that is useful to - decision makers who need it. The producer (i.e. scientists) community tends to be stovepiped, even though consumers (i.e. decision makers) often need interdisciplinary science and analysis. Consumers, who may also be stovepiped in various agencies or subject areas, may lack familiarity with or access to these separate communities, as well as the tools or time to navigate scientific information and disciplines. Closing the communication gap between these communities could be facilitated by institutionalizing processes designed for this purpose. We recommend a variety of mainstreaming policies within the consumer community, as well as mechanisms to generate a strong demand signal that will resonate more strongly with the producer community. We also recommend institutional reforms and methods of incentivizing policy-oriented scientific analysis within the producer community. Our recommendations focus on improving information flow to national security and foreign policy decision makers, but many are relevant to public policy writ large. Recommendations for Producers 1. The scientific community should formally encourage collaborations between natural and social scientists and reward publications in interdisciplinary outlets Incentives could include research funding and honorary awards recognizing service to public policy. 2. Academic merit review should reward research grants and publications targeted at interdisciplinary and/or policy-oriented audiences. Reforms of merit review may require new policies and engaged institutional leadership. Recommendations for Consumers 1. Congress should amend Title VI of the National Defense Education Act to encourage the development of multidisciplinary educational programs on the national security implications of climate change. 2. Federal agencies should establish funding programs to encourage producers to provide scientific information tailored to consumer needs. 3. The Department of State should appoint climate advisors to serve within the regional bureaus and on the policy and planning staff. 4. Federal agencies, the Department of Education, and the National Science Foundation should develop programs to stimulate new interdisciplinary research partnerships and training of a new generation of interdisciplinary climate change risk thinkers, assessors and managers. 5. Federal agencies should encourage Senior Executive Service decision makers to participate in science policy certi¬fication workshops and include science and technology policy as a core curricu¬lum component of the SES Federal Candidate Development Program. These recommendations are described in detail in a report published by the Center for a New American Security: Rogers, W. and J. Gulledge (2010) Lost in Translation: Closing the Gap Between Climate Science and National Security Policy (available online: http://cnas.org/node/4391)

  11. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  12. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  13. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  14. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  15. 32 CFR 2400.45 - Information Security Program Review.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Section 2400.45 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.45...

  16. Health Security and Risk Aversion.

    PubMed

    Herington, Jonathan

    2016-09-01

    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public health policy: (i) that security is intrinsically valuable, (ii) that it is necessary for social planning and (iii) that it is an appropriate response to decision-making in contexts of very limited information. Striking the right balance between securing and maximizing population health thus requires a substantive, and hitherto unrecognized, value judgment. Finally, I critically evaluate the current health security agenda in light of this new account of the concept and its relationship to the other aims of public health policy. © 2016 John Wiley & Sons Ltd.

  17. 32 CFR 148.5 - Identification of the security policy board.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Identification of the security policy board. Agencies...

  18. 32 CFR 148.5 - Idenfification of the security policy board.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Idenfification of the security policy board. Agencies...

  19. 32 CFR 148.5 - Identification of the security policy board.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Identification of the security policy board. Agencies...

  20. 32 CFR 148.5 - Idenfification of the security policy board.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Idenfification of the security policy board. Agencies...

  1. 32 CFR 148.5 - Identification of the security policy board.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., MILITARY AND CIVILIAN NATIONAL POLICY AND IMPLEMENTATION OF RECIPROCITY OF FACILITIES National Policy on Reciprocity of Use and Inspections of Facilities § 148.5 Identification of the security policy board. Agencies...

  2. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  3. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  4. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  5. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  6. 32 CFR 322.3 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Policy. 322.3 Section 322.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) PRIVACY PROGRAM NATIONAL SECURITY AGENCY/CENTRAL SECURITY SERVICES PRIVACY ACT PROGRAM § 322.3 Policy. (a) The National Security...

  7. Seasonal Difference in National School Lunch Program Participation and Its Impacts on Household Food Security.

    PubMed

    Huang, Jin; Kim, Youngmi; Barnidge, Ellen

    2016-11-20

    The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.

  8. Library and Archival Security: Policies and Procedures To Protect Holdings from Theft and Damage.

    ERIC Educational Resources Information Center

    Trinkaus-Randall, Gregor

    1998-01-01

    Firm policies and procedures that address the environment, patron/staff behavior, general attitude, and care and handling of materials need to be at the core of the library/archival security program. Discussion includes evaluating a repository's security needs, collections security, security in non-public areas, security in the reading room,…

  9. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... 10 Energy 4 2011-01-01 2011-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  10. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 10 Energy 4 2012-01-01 2012-01-01 false Policy. 706.10 Section 706.10 Energy DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in National Labor Relations Board Proceedings § 706.10 Policy. It is policy of DOE that NLRB cases falling...

  11. Computer Network Security: Best Practices for Alberta School Jurisdictions.

    ERIC Educational Resources Information Center

    Alberta Dept. of Education, Edmonton.

    This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…

  12. Homeland Security and Information.

    ERIC Educational Resources Information Center

    Relyea, Harold C.

    2002-01-01

    Reviews the development of two similar policy concepts, national security and internal security, before exploring the new phrase homeland security that has become popular since the September 11 terrorist attacks. Discusses the significance of each for information policy and practice. (Author/LRW)

  13. Secure public cloud platform for medical images sharing.

    PubMed

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  14. Diagnosing climate change impacts and identifying adaptation strategies by involving key stakeholder organisations and farmers in Sikkim, India: Challenges and opportunities.

    PubMed

    Azhoni, Adani; Goyal, Manish Kumar

    2018-06-01

    Narrowing the gap between research, policy making and implementing adaptation remains a challenge in many parts of the world where climate change is likely to severely impact water security. This research aims to narrow this gap by matching the adaptation strategies being framed by policy makers to that of the perspectives of development agencies, researchers and farmers in the Himalayan state of Sikkim in India. Our case study examined the perspectives of various stakeholders for climate change impacts, current adaptation strategies, knowledge gaps and adaptation barriers, particularly in the context of implementing the Sikkim State Action Plan on Climate Change through semi-structured interviews carried out with decision makers in the Sikkim State Government, researchers, consultants, local academia, development agencies and farmers. Using Stakeholders Network Analysis tools, this research unravels the complexities of perceiving climate change impacts, identifying strategies, and implementing adaptation. While farmers are less aware about the global phenomenon of climate change impacts for water security, their knowledge of the local conditions and their close interaction with the State Government Agriculture Department provides them opportunities. Although important steps are being initiated through the Sikkim State Action Plan on Climate Change it is yet to deliver effective means of adaptation implementation and hence, strengthening the networks of close coordination between the various implementing agencies will pay dividends. Knowledge gaps and the need for capacity building identified in this research, based on the understandings of key stakeholders are highly relevant to both the research community and for informing policy. Copyright © 2018 Elsevier B.V. All rights reserved.

  15. Diplomatic Security: State Department Should Better Manage Risks to Residences and Other Soft Targets Overseas

    DTIC Science & Technology

    2015-07-09

    Page ii GAO-15-700 Diplomatic Security Figure 2: Time Frames for Updates to Overseas Security Policy Board Residential Security...Standards since 2005 14 Abbreviations ARB Accountability Review Board DS Bureau of Diplomatic Security DS/C DS Directorate...Overseas Buildings Operations OSPB Overseas Security Policy Board RSO Regional Security Officer State Department of State This is a work of

  16. 77 FR 34411 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-11

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION National Industrial Security Program Policy Advisory... CFR 101-6, announcement is made for the following committee meeting. To discuss National Industrial Security Program policy matters. DATES: This meeting will be held on Wednesday, July 11, 2012 from 10:00 a...

  17. Under Secretary of Defense for Policy > Home

    Science.gov Websites

    Weapons of Mass Destruction Cyber Policy Space Policy ASD for International Security Affairs ASD for collapse content Assistant Secretary of Defense Robert Karem ASD for International Security Affairs Randall Assistant Secretary of Defense Katie Wheelbarger PDASD for International Security Affairs David Helvey PDASD

  18. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  19. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  20. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  1. 41 CFR 102-192.80 - How do we develop written security policies and plans?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... service and/or the Federal Protective Service to develop agency mail security policies and plans. The... written security policies and plans? 102-192.80 Section 102-192.80 Public Contracts and Property Management Federal Property Management Regulations System (Continued) FEDERAL MANAGEMENT REGULATION...

  2. Addressing Challenges in the Acquisition of Secure Software Systems With Open Architectures

    DTIC Science & Technology

    2012-04-30

    as a “broker” to market specific research topics identified by our sponsors to NPS graduate students. This three-pronged approach provides for a...breaks, and the day-ending socials. Many of our researchers use these occasions to establish new teaming arrangements for future research work. In the...software (CSS) and open source software (OSS). Federal government acquisition policy, as well as many leading enterprise IT centers, now encourage the use

  3. The Challenge of Drug Trafficking to Democratic Governance and Human Security in West Africa

    DTIC Science & Technology

    2013-05-01

    Washing ton, DC, as the Director of the Office of Environmental Policy; as Economic Officer in the Bu- reau of Econom ic and Business Affairs... Colombian cartels established links with Mexican syndicates after the United States significantly choked off the old Ca- ribbean drug...transportation corridor and forced the Colombians to start moving their drug loads across the southwest border of the United States.48 Mexican DTOs, including

  4. Price-Based Acquisition. Issues and Challenges for Defense Department Procurement of Weapon Systems

    DTIC Science & Technology

    2005-01-01

    government without excess non- value -added work. Again, however, the central issue is how can DoD determine whether the price is fair and reasonable without a...document THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND...contracting and to providing incentives for contractors so as to achieve the best value in defense procurement. iv Price-Based Acquisition This

  5. U.S. Policy and Strategy Toward Afghanistan After 2014

    DTIC Science & Technology

    2014-10-01

    Strategic Studies Institute (SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and...attainment accomplish the effect desired ( relates to objective)? • Feasibility—can the action be accomplished by the means available ( relates to concept...Acceptability—are the consequences of cost justified by the importance of the effect desired ( relates to resources/concept)?4 The challenge posed

  6. The Diplomacy of the Jaguar: French Airpower in Postcolonial African Conflicts

    DTIC Science & Technology

    2009-03-01

    turned back. Lorell, Airpower in Peripheral Conflict, 46. 32. Ibid., 48. 33. Ibid., 49. 34. Martel, Histoire Militaire de la France, 563. 35. Lorell...Airpower in Peripheral Conflict, 50. 36. Martel, Histoire Militaire de la France, 563. 37. Chipman, French Military Policy and African Security, 9. 38...Pro- longed Wars: A Post-Nuclear Challenge. Maxwell AFB, AL: Air University Press, March 2005. 39 Martel, André, ed. Histoire Militaire de la France

  7. Tactical Cyber: Building a Strategy for Cyber Support to Corps and Below

    DTIC Science & Technology

    2017-01-01

    freedom of maneuver.2 And the proliferation of social media , unmanned systems, and other informa- tion and communication technologies among adversaries and...effects through cyber operations 2.1.1. Deny/degrade/disrupt enemy communication that uses the “local Internet” and social media for C2 and propaganda...policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan

  8. Common object request broker architecture (CORBA)-based security services for the virtual radiology environment.

    PubMed

    Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K

    2000-05-01

    The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.

  9. 29 CFR 14.2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Labor SECURITY REGULATIONS Introduction to Security Regulations § 14.2 Policy. The interests of the...) Safeguarding national security information. Some official information within the Federal Government is directly..., therefore, be subject to security constraints, and limited in term of its distribution. (b) Exemption from...

  10. An Integrative Behavioral Model of Information Security Policy Compliance

    PubMed Central

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized. PMID:24971373

  11. An integrative behavioral model of information security policy compliance.

    PubMed

    Kim, Sang Hoon; Yang, Kyung Hoon; Park, Sunyoung

    2014-01-01

    The authors found the behavioral factors that influence the organization members' compliance with the information security policy in organizations on the basis of neutralization theory, Theory of planned behavior, and protection motivation theory. Depending on the theory of planned behavior, members' attitudes towards compliance, as well as normative belief and self-efficacy, were believed to determine the intention to comply with the information security policy. Neutralization theory, a prominent theory in criminology, could be expected to provide the explanation for information system security policy violations. Based on the protection motivation theory, it was inferred that the expected efficacy could have an impact on intentions of compliance. By the above logical reasoning, the integrative behavioral model and eight hypotheses could be derived. Data were collected by conducting a survey; 194 out of 207 questionnaires were available. The test of the causal model was conducted by PLS. The reliability, validity, and model fit were found to be statistically significant. The results of the hypotheses tests showed that seven of the eight hypotheses were acceptable. The theoretical implications of this study are as follows: (1) the study is expected to play a role of the baseline for future research about organization members' compliance with the information security policy, (2) the study attempted an interdisciplinary approach by combining psychology and information system security research, and (3) the study suggested concrete operational definitions of influencing factors for information security policy compliance through a comprehensive theoretical review. Also, the study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for the implement of information system security policies in organizations. Second, it proves that the need of education and training programs suppressing members' neutralization intention to violate information security policy should be emphasized.

  12. Addressing China’s grand challenge of achieving food security while ensuring environmental sustainability

    PubMed Central

    Lu, Yonglong; Jenkins, Alan; Ferrier, Robert C.; Bailey, Mark; Gordon, Iain J.; Song, Shuai; Huang, Jikun; Jia, Shaofeng; Zhang, Fusuo; Liu, Xuejun; Feng, Zhaozhong; Zhang, Zhibin

    2015-01-01

    China’s increasingly urbanized and wealthy population is driving a growing and changing demand for food, which might not be met without significant increase in agricultural productivity and sustainable use of natural resources. Given the past relationship between lack of access to affordable food and political instability, food security has to be given a high priority on national political agendas in the context of globalization. The drive for increased food production has had a significant impact on the environment, and the deterioration in ecosystem quality due to historic and current levels of pollution will potentially compromise the food production system in China. We discuss the grand challenges of not only producing more food but also producing it sustainably and without environmental degradation. In addressing these challenges, food production should be considered as part of an environmental system (soil, air, water, and biodiversity) and not independent from it. It is imperative that new ways of meeting the demand for food are developed while safeguarding the natural resources upon which food production is based. We present a holistic approach to both science and policy to ensure future food security while embracing the ambition of achieving environmental sustainability in China. It is a unique opportunity for China to be a role model as a new global player, especially for other emerging economies. PMID:26601127

  13. Plans of Mice and Men: From Bench Science to Science Policy

    PubMed Central

    Simon, Ian D.

    2011-01-01

    The transition from bench science to science policy is not always a smooth one, and my journey stretched as far as the unemployment line to the hallowed halls of the U.S. Capitol. While earning my doctorate in microbiology, I found myself more interested in my political activities than my experiments. Thus, my science policy career aspirations were born from merging my love of science with my interest in policy and politics. After receiving my doctorate, I accepted the Henry Luce Scholarship, which allowed me to live in South Korea for 1 year and delve into the field of science policy research. This introduction into science policy occurred at the South Korean think tank called the Science and Technology Policy Institute (STEPI). During that year, I used textbooks, colleagues, and hands-on research projects as my educational introduction into the social science of science and technology decision-making. However, upon returning to the United States during one of the worst job markets in nearly 80 years, securing a position in science policy proved to be very difficult, and I was unemployed for five months. Ultimately, it took more than a year from the end of the Luce Scholarship to obtain my next science policy position with the American Society for Microbiology Congressional Fellowship. This fellowship gave me the opportunity to work as the science and public health advisor to U.S. Senator Harry Reid. While there were significant challenges during my transition from the laboratory to science policy, those challenges made me tougher, more appreciative, and more prepared to move from working at the bench to working in the field of science policy. PMID:21966041

  14. Plans of mice and men: from bench science to science policy.

    PubMed

    Simon, Ian D

    2011-09-01

    The transition from bench science to science policy is not always a smooth one, and my journey stretched as far as the unemployment line to the hallowed halls of the U.S. Capitol. While earning my doctorate in microbiology, I found myself more interested in my political activities than my experiments. Thus, my science policy career aspirations were born from merging my love of science with my interest in policy and politics. After receiving my doctorate, I accepted the Henry Luce Scholarship, which allowed me to live in South Korea for 1 year and delve into the field of science policy research. This introduction into science policy occurred at the South Korean think tank called the Science and Technology Policy Institute (STEPI). During that year, I used textbooks, colleagues, and hands-on research projects as my educational introduction into the social science of science and technology decision-making. However, upon returning to the United States during one of the worst job markets in nearly 80 years, securing a position in science policy proved to be very difficult, and I was unemployed for five months. Ultimately, it took more than a year from the end of the Luce Scholarship to obtain my next science policy position with the American Society for Microbiology Congressional Fellowship. This fellowship gave me the opportunity to work as the science and public health advisor to U.S. Senator Harry Reid. While there were significant challenges during my transition from the laboratory to science policy, those challenges made me tougher, more appreciative, and more prepared to move from working at the bench to working in the field of science policy. Copyright © 2011.

  15. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, November 8, 2013. ISOO...

  16. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks

    PubMed Central

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant’s profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes. PMID:27337001

  17. CP-ABE Based Privacy-Preserving User Profile Matching in Mobile Social Networks.

    PubMed

    Cui, Weirong; Du, Chenglie; Chen, Jinchao

    2016-01-01

    Privacy-preserving profile matching, a challenging task in mobile social networks, is getting more attention in recent years. In this paper, we propose a novel scheme that is based on ciphertext-policy attribute-based encryption to tackle this problem. In our scheme, a user can submit a preference-profile and search for users with matching-profile in decentralized mobile social networks. In this process, no participant's profile and the submitted preference-profile is exposed. Meanwhile, a secure communication channel can be established between the pair of successfully matched users. In contrast to existing related schemes which are mainly based on the secure multi-party computation, our scheme can provide verifiability (both the initiator and any unmatched user cannot cheat each other to pretend to be matched), and requires few interactions among users. We provide thorough security analysis and performance evaluation on our scheme, and show its advantages in terms of security, efficiency and usability over state-of-the-art schemes.

  18. Building Community Resilience to Disasters: A Way Forward to Enhance National Health Security.

    PubMed

    Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S

    2011-01-01

    Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation.

  19. [Goals in the discussion of old age insurance - a sketch].

    PubMed

    Schmähl, W

    1980-01-01

    In the Federal Republic of Germany often the discussion on social policy deals with instruments, yet seldom with goals to be realised. Scientific work on goals for old-age security policy is just starting. In this article the importance of distinctly defined goals is shown for rational economic and social policy, for an assessment of the existing situation, for a goal oriented selection and formation of measures and for success control. With reference to distributive goals in old-age security policy it is exemplified in which way scientific work can be helpful in defining goals in an operationalised form. For this it is important to deal with several distributive aspects, which are often mixed in discussions. As measures in one area of economic and social policy cannot be taken isolated, in order to avoid unwanted consequences, it is necessary for old-age security policies too, to take into consideration a general system of economic and social policy goals. As an example, it must be stated that e.g. aspects of business cycle and growth policy have to be considered while constructing a system of old-age security. Finally, some other criteria for old-age security policies, such as transparence, political feasibility and practicability are mentioned.

  20. Required Security Screenings for Researchers: A Policy Analysis and Commentary

    ERIC Educational Resources Information Center

    Zucker, Andrew A.

    2011-01-01

    After the attacks of 9/11/2001 the federal government implemented new policies intended to protect people and institutions in the United States. A surprising policy requires education researchers conducting research under contract to the U.S. Department of Education (ED) to obtain security clearances, sometimes known as security screenings.…

  1. Snow Leopard Cloud: A Multi-national Education Training and Experimentation Cloud and Its Security Challenges

    NASA Astrophysics Data System (ADS)

    Cayirci, Erdal; Rong, Chunming; Huiskamp, Wim; Verkoelen, Cor

    Military/civilian education training and experimentation networks (ETEN) are an important application area for the cloud computing concept. However, major security challenges have to be overcome to realize an ETEN. These challenges can be categorized as security challenges typical to any cloud and multi-level security challenges specific to an ETEN environment. The cloud approach for ETEN is introduced and its security challenges are explained in this paper.

  2. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... submitted to the Information Security Oversight Office (ISOO) no later than Friday, July 12, 2013. ISOO will...

  3. Are social security policies for Chinese landless farmers really effective on health in the process of Chinese rapid urbanization? a study on the effect of social security policies for Chinese landless farmers on their health-related quality of life

    PubMed Central

    2014-01-01

    Background The continuing urbanization in China has resulted in a loss of land and rights among farmers. The social security of landless farmers has attracted considerable research attention. However, only few studies measure the health-related quality of life (HRQOL) of landless farmers by employing scientific standardized scales. By using five-dimensional European quality of life (EQ-5D) scales, this study measures the HRQOL of landless farmers from a new perspective and examines how the social security policies affect their HRQOL. Methods This study is based on a 2013 household survey that has been conducted among 1,500 landless famers who are residing in six resettlement areas in three cities within the Yangtze River Delta region, namely, Nanjing, Hangzhou, and Yangzhou. This study adopts EQ-5D scales to measure the HRQOL of these farmers. More than 50% of the respondents are in poor or non-serious health conditions, and over 50% are not satisfied with their current social security policies. The health conditions and social security policies are analyzed by multinomial regression analysis and the relationship between these two factors are analyzed via structural equation modeling (SEM). Results First, the descriptive statistical analysis shows that more than 50% of the respondents are in poor or non-serious health conditions, and that the largest proportion of these farmers are suffering from anxiety or depression, which is the most serious of the five dimensions. Second, multinomial regression analysis shows that the satisfaction of landless farmers with their social security policies improves their living conditions, particularly in their capacity for self-care, in their ability to perform daily activities, and in the reduction of pain, anxiety, and depression. Third, SEM model analysis shows that the satisfaction of landless farmers with their social security policies positively influences their HRQOL. Among the five dimensions of EQ-5D, daily activities produce the greatest influence on the HRQOL of landless farmers. As regards social security policies, the land acquisition compensation policy and the employment security policy produce the greatest and weakest influences on the HRQOL of landless farmers, respectively. Conclusions The rapid urbanization in China has deprived many farmers of their lands and of the benefits of urbanization. These farmers are often in a disadvantaged position in the land acquisition process. Statistic analysis in this paper shows that the satisfaction of landless farmers with their social security policies positively influences their HRQOL. The implementation and improvement of social security policies is very important for the long-term and sustainable development of these landless farmers. PMID:24433258

  4. Are social security policies for Chinese landless farmers really effective on health in the process of Chinese rapid urbanization? A study on the effect of social security policies for Chinese landless farmers on their health-related quality of life.

    PubMed

    Liang, Ying; Lu, Wanyi; Wu, Wei

    2014-01-15

    The continuing urbanization in China has resulted in a loss of land and rights among farmers. The social security of landless farmers has attracted considerable research attention. However, only few studies measure the health-related quality of life (HRQOL) of landless farmers by employing scientific standardized scales. By using five-dimensional European quality of life (EQ-5D) scales, this study measures the HRQOL of landless farmers from a new perspective and examines how the social security policies affect their HRQOL. This study is based on a 2013 household survey that has been conducted among 1,500 landless famers who are residing in six resettlement areas in three cities within the Yangtze River Delta region, namely, Nanjing, Hangzhou, and Yangzhou. This study adopts EQ-5D scales to measure the HRQOL of these farmers. More than 50% of the respondents are in poor or non-serious health conditions, and over 50% are not satisfied with their current social security policies. The health conditions and social security policies are analyzed by multinomial regression analysis and the relationship between these two factors are analyzed via structural equation modeling (SEM). First, the descriptive statistical analysis shows that more than 50% of the respondents are in poor or non-serious health conditions, and that the largest proportion of these farmers are suffering from anxiety or depression, which is the most serious of the five dimensions. Second, multinomial regression analysis shows that the satisfaction of landless farmers with their social security policies improves their living conditions, particularly in their capacity for self-care, in their ability to perform daily activities, and in the reduction of pain, anxiety, and depression. Third, SEM model analysis shows that the satisfaction of landless farmers with their social security policies positively influences their HRQOL. Among the five dimensions of EQ-5D, daily activities produce the greatest influence on the HRQOL of landless farmers. As regards social security policies, the land acquisition compensation policy and the employment security policy produce the greatest and weakest influences on the HRQOL of landless farmers, respectively. The rapid urbanization in China has deprived many farmers of their lands and of the benefits of urbanization. These farmers are often in a disadvantaged position in the land acquisition process. Statistic analysis in this paper shows that the satisfaction of landless farmers with their social security policies positively influences their HRQOL. The implementation and improvement of social security policies is very important for the long-term and sustainable development of these landless farmers.

  5. Airborne biological hazards and urban transport infrastructure: current challenges and future directions.

    PubMed

    Nasir, Zaheer Ahmad; Campos, Luiza Cintra; Christie, Nicola; Colbeck, Ian

    2016-08-01

    Exposure to airborne biological hazards in an ever expanding urban transport infrastructure and highly diverse mobile population is of growing concern, in terms of both public health and biosecurity. The existing policies and practices on design, construction and operation of these infrastructures may have severe implications for airborne disease transmission, particularly, in the event of a pandemic or intentional release of biological of agents. This paper reviews existing knowledge on airborne disease transmission in different modes of transport, highlights the factors enhancing the vulnerability of transport infrastructures to airborne disease transmission, discusses the potential protection measures and identifies the research gaps in order to build a bioresilient transport infrastructure. The unification of security and public health research, inclusion of public health security concepts at the design and planning phase, and a holistic system approach involving all the stakeholders over the life cycle of transport infrastructure hold the key to mitigate the challenges posed by biological hazards in the twenty-first century transport infrastructure.

  6. The Psychology of Working Theory.

    PubMed

    Duffy, Ryan D; Blustein, David L; Diemer, Matthew A; Autin, Kelsey L

    2016-03-01

    In the current article, we build on research from vocational psychology, multicultural psychology, intersectionality, and the sociology of work to construct an empirically testable Psychology of Working Theory (PWT). Our central aim is to explain the work experiences of all individuals, but particularly people near or in poverty, people who face discrimination and marginalization in their lives, and people facing challenging work-based transitions for which contextual factors are often the primary drivers of the ability to secure decent work. The concept of decent work is defined and positioned as the central variable within the theory. A series of propositions is offered concerning (a) contextual predictors of securing decent work, (b) psychological and economic mediators and moderators of these relations, and (c) outcomes of securing decent work. Recommendations are suggested for researchers seeking to use the theory and practical implications are offered concerning counseling, advocacy, and public policy. (c) 2016 APA, all rights reserved).

  7. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.

    PubMed

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-07-24

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient.

  8. Sustainable Food Security in the Mountains of Pakistan: Towards a Policy Framework.

    PubMed

    Rasul, Golam; Hussain, Abid

    2015-01-01

    The nature and causes of food and livelihood security in mountain areas are quite different to those in the plains. Rapid socioeconomic and environmental changes added to the topographical constraints have exacerbated the problem of food insecurity in the Hindu Kush-Himalayan (HKH) region. In Pakistan, food insecurity is significantly higher in the mountain areas than in the plains as a result of a range of biophysical and socioeconomic factors. The potential of mountain niche products such as fruit, nuts, and livestock has remained underutilized. Moreover, the opportunities offered by globalization, market integration, remittances, and non-farm income have not been fully tapped. This paper analyzes the opportunities and challenges of food security in Pakistan's mountain areas, and outlines a framework for addressing the specific issues in terms of four different types of area differentiated by agro-ecological potential and access to markets, information, and institutional services.

  9. Use of the Trusted Computer System Evaluation Criteria (TCSEC) for Complex, Evolving, Multipolicy Systems.

    DTIC Science & Technology

    1994-07-01

    incorporate the Bell-La Padula rules for implementing the DoD security policy. The policy from which we begin here is the organization’s operational...security policy, which assumes the Bell-La Padula model and assigns the required security variables to elements of the system. A way to ensure a

  10. EMRlog method for computer security for electronic medical records with logic and data mining.

    PubMed

    Martínez Monterrubio, Sergio Mauricio; Frausto Solis, Juan; Monroy Borja, Raúl

    2015-01-01

    The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system.

  11. EMRlog Method for Computer Security for Electronic Medical Records with Logic and Data Mining

    PubMed Central

    Frausto Solis, Juan; Monroy Borja, Raúl

    2015-01-01

    The proper functioning of a hospital computer system is an arduous work for managers and staff. However, inconsistent policies are frequent and can produce enormous problems, such as stolen information, frequent failures, and loss of the entire or part of the hospital data. This paper presents a new method named EMRlog for computer security systems in hospitals. EMRlog is focused on two kinds of security policies: directive and implemented policies. Security policies are applied to computer systems that handle huge amounts of information such as databases, applications, and medical records. Firstly, a syntactic verification step is applied by using predicate logic. Then data mining techniques are used to detect which security policies have really been implemented by the computer systems staff. Subsequently, consistency is verified in both kinds of policies; in addition these subsets are contrasted and validated. This is performed by an automatic theorem prover. Thus, many kinds of vulnerabilities can be removed for achieving a safer computer system. PMID:26495300

  12. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in... within the scope of the Labor Management Relations Act at the various DOE installations should be... published decisions. This policy does not preclude adoption of special arrangements which may be required...

  13. 50 CFR 540.1 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 50 Wildlife and Fisheries 9 2011-10-01 2011-10-01 false Policy. 540.1 Section 540.1 Wildlife and Fisheries MARINE MAMMAL COMMISSION INFORMATION SECURITY § 540.1 Policy. It is the policy of the Marine... security information. [44 FR 55381, Sept. 26, 1979] ...

  14. 50 CFR 540.1 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 50 Wildlife and Fisheries 7 2010-10-01 2010-10-01 false Policy. 540.1 Section 540.1 Wildlife and Fisheries MARINE MAMMAL COMMISSION INFORMATION SECURITY § 540.1 Policy. It is the policy of the Marine... security information. [44 FR 55381, Sept. 26, 1979] ...

  15. Health Information Security in Hospitals: the Application of Security Safeguards.

    PubMed

    Mehraeen, Esmaeil; Ayatollahi, Haleh; Ahmadi, Maryam

    2016-02-01

    A hospital information system has potentials to improve the accessibility of clinical information and the quality of health care. However, the use of this system has resulted in new challenges, such as concerns over health information security. This paper aims to assess the status of information security in terms of administrative, technical and physical safeguards in the university hospitals. This was a survey study in which the participants were information technology (IT) managers (n=36) who worked in the hospitals affiliated to the top ranked medical universities (university A and university B). Data were collected using a questionnaire. The content validity of the questionnaire was examined by the experts and the reliability of the questionnaire was determined using Cronbach's coefficient alpha (α=0.75). The results showed that the administrative safeguards were arranged at a medium level. In terms of the technical safeguards and the physical safeguards, the IT managers rated them at a strong level. According to the results, among three types of security safeguards, the administrative safeguards were assessed at the medium level. To improve it, developing security policies, implementing access control models and training users are recommended.

  16. The cyber security threat stops in the boardroom.

    PubMed

    Scully, Tim

    The attitude that 'it won't happen to me' still prevails in the boardrooms of industry when senior executives consider the threat of targeted cyber intrusions. Not much has changed in the commercial world of cyber security over the past few years; hackers are not being challenged to find new ways to steal companies' intellectual property and confidential information. The consequences of even major security breaches seem not to be felt by the leaders of victim companies. Why is this so? Surely IT security practitioners are seeking new ways to detect and prevent targeted intrusions into companies' networks? Are the consequences of targeted intrusions so insignificant that the captains of industry tolerate them? Or do only others feel the pain of their failure? This paper initially explores the failure of cyber security in industry and contends that, while industry leaders should not be alone in accepting responsibility for this failure, they must take the initiative to make life harder for cyber threat actors. They cannot wait for government leadership on policy, strategy or coordination. The paper then suggests some measures that a CEO can adopt to build a new corporate approach to cyber security.

  17. BULGARIA’S MULTI-VECTOR FOREIGN POLICY APPROACH TO SECURITY CHALLENGES IN EASTERN EUROPE

    DTIC Science & Technology

    2017-04-06

    withdraw from the South Stream natural gas pipeline project which could turn Bulgaria into a leading gas hub in the Balkans. Amid Ukrainian Crisis, the EU...Corporation. Micco, Pasquale De. July 2015. Changing Pipelines , Shifting Strategies: Gas in South-eastern Europe, and the Implications for Ukraine. In...catastrophe. In support of this strategic approach, this paper finds a theoretical explanation in the realist school of study and presents an analysis of the

  18. Egypt: Security, Political, and Islamist Challenges

    DTIC Science & Technology

    2007-09-01

    vehicles used had been traced to Greater Cairo, and that Mubarak was withholding critique of al-Qa’ida in these attacks.121 After the attacks, 12,000...American film producers shot here], they don’t care about us . And if we weren’t cheap labor or better than the [topographical] maps, neither the...military strategy with emphasis on geostrategic analysis. The mission of SSI is to use independent analysis to conduct strategic studies that develop policy

  19. Understanding food security issues in remote Western Australian Indigenous communities.

    PubMed

    Pollard, Christina M; Nyaradi, Anett; Lester, Matthew; Sauer, Kay

    2014-08-01

    Food insecurity in remote Western Australian (WA) Indigenous communities. This study explored remote community store managers' views on issues related to improving food security in order to inform health policy. A census of all remote WA Indigenous community store managers was conducted in 2010. Telephone interviews sought managers' perceptions of community food insecurity, problems with their store, and potential policy options for improving the supply, accessibility, affordability and consumption of nutritious foods. Descriptive analyses were conducted using SPSS for Windows version 17.0. Managers stated that freight costs and irregular deliveries contributed to high prices and a limited range of foods. Poor store infrastructure, compromised cold chain logistics, and commonly occurring power outages affected food quality. Half of the managers said there was hunger in their community because people did not have enough money to buy food. The role of nutritionists beyond a clinical and educational role was not understood. Food security interventions in remote communities need to take into consideration issues such as freight costs, transport and low demand for nutritious foods. Store managers provide important local knowledge regarding the development and implementation of food security interventions. SO WHAT? Agencies acting to address the issue of food insecurity in remote WA Indigenous communities should heed the advice of community store managers that high food prices, poor quality and limited availability are mainly due to transport inefficiencies and freight costs. Improving healthy food affordability in communities where high unemployment and low household income abound is fundamental to improving food security, yet presents a significant challenge.

  20. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    NASA Astrophysics Data System (ADS)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.

  1. A Study of the Effect of Information Security Policies on Information Security Breaches in Higher Education Institutions

    ERIC Educational Resources Information Center

    Waddell, Stanie Adolphus

    2013-01-01

    Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…

  2. 17 CFR 239.17c - Form N-6, registration statement for separate accounts organized as unit investment trusts that...

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... insurance policies. Form N-6 shall be used for registration under the Securities Act of 1933 of securities... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form N-6, registration... policies. 239.17c Section 239.17c Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION...

  3. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... 47 Telecommunication 5 2010-10-01 2010-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  4. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 47 Telecommunication 5 2011-10-01 2011-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  5. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 47 Telecommunication 5 2012-10-01 2012-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  6. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 47 Telecommunication 5 2013-10-01 2013-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  7. 47 CFR 202.1 - Policies.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 47 Telecommunication 5 2014-10-01 2014-10-01 false Policies. 202.1 Section 202.1 Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND EMERGENCY... Office of Science and Technology Policy is the single point of authority within the Federal Government...

  8. States of Cybersecurity: Electricity Distribution System Discussions

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Pena, Ivonne; Ingram, Michael; Martin, Maurice

    State and local entities that oversee the reliable, affordable provision of electricity are faced with growing and evolving threats from cybersecurity risks to our nation's electricity distribution system. All-hazards system resilience is a shared responsibility among electric utilities and their regulators or policy-setting boards of directors. Cybersecurity presents new challenges and should be a focus for states, local governments, and Native American tribes that are developing energy-assurance plans to protect critical infrastructure. This research sought to investigate the implementation of governance and policy at the distribution utility level that facilitates cybersecurity preparedness to inform the U.S. Department of Energy (DOE),more » Office of Energy Policy and Systems Analysis; states; local governments; and other stakeholders on the challenges, gaps, and opportunities that may exist for future analysis. The need is urgent to identify the challenges and inconsistencies in how cybersecurity practices are being applied across the United States to inform the development of best practices, mitigations, and future research and development investments in securing the electricity infrastructure. By examining the current practices and applications of cybersecurity preparedness, this report seeks to identify the challenges and persistent gaps between policy and execution and reflect the underlying motivations of distinct utility structures as they play out at the local level. This study aims to create an initial baseline of cybersecurity preparedness within the distribution electricity sector. The focus of this study is on distribution utilities not bound by the cybersecurity guidelines of the North American Electric Reliability Corporation (NERC) to examine the range of mechanisms taken by state regulators, city councils that own municipal utilities, and boards of directors of rural cooperatives.« less

  9. Distributed policy based access to networked heterogeneous ISR data sources

    NASA Astrophysics Data System (ADS)

    Bent, G.; Vyvyan, D.; Wood, David; Zerfos, Petros; Calo, Seraphin

    2010-04-01

    Within a coalition environment, ad hoc Communities of Interest (CoI's) come together, perhaps for only a short time, with different sensors, sensor platforms, data fusion elements, and networks to conduct a task (or set of tasks) with different coalition members taking different roles. In such a coalition, each organization will have its own inherent restrictions on how it will interact with the others. These are usually stated as a set of policies, including security and privacy policies. The capability that we want to enable for a coalition operation is to provide access to information from any coalition partner in conformance with the policies of all. One of the challenges in supporting such ad-hoc coalition operations is that of providing efficient access to distributed sources of data, where the applications requiring the data do not have knowledge of the location of the data within the network. To address this challenge the International Technology Alliance (ITA) program has been developing the concept of a Dynamic Distributed Federated Database (DDFD), also know as a Gaian Database. This type of database provides a means for accessing data across a network of distributed heterogeneous data sources where access to the information is controlled by a mixture of local and global policies. We describe how a network of disparate ISR elements can be expressed as a DDFD and how this approach enables sensor and other information sources to be discovered autonomously or semi-autonomously and/or combined, fused formally defined local and global policies.

  10. At the crossroads: new paradigms of food security, public health nutrition and school food.

    PubMed

    Ashe, Leah M; Sonnino, Roberta

    2013-06-01

    Public health nutrition sits at the nexus of a global crisis in food, environmental and health systems that has generated - along with numerous other problems - an urgent and changing problem of food insecurity. The 'new' food insecurity, however, is different from the old: it is bimodal, encompassing issues of both under- and over-consumption, hunger and obesity, quantity and quality; it has assumed a decidedly urban dimension; and it implicates rich and poor countries alike. The complexity of the expressions of this challenge requires new approaches to public health nutrition and food policy that privilege systemic, structural and environmental factors over individual and mechanistic ones. In this context, the current paper argues that school food systems rise with buoyant potential as promising intervention sites: they are poised to address both modes of the food security crisis; integrate systemic, structural and environmental with behavioural approaches; and comprise far-reaching, system-wide efforts that influence the wider functioning of the food system. Based on a discussion of Bogotá and other pioneering policies that explicitly aim to create a broader food system with long-term foundations for good public health and food security, the paper suggests a new research and action agenda that gives special attention to school food in urban contexts.

  11. Russian Stance in the Caucasus and the National Security Strategy of Georgia

    DTIC Science & Technology

    2005-06-01

    12, 2005) 10 Marcel de Haas, “The Development of Russia’s Security Policy, 1992-2002,” in: Russian Military Reform 1992-2002, ed. Anne C. Aldis...positive tendencies in the world.14 12Marcel de Haas, “The Development of Russia’s Security Policy, 1992-2002,” in: Russian Military Reform 1992...Development of Russia’s Security Policy, 1992-2002,” in: Russian Military Reform 1992-2002, ed. Anne C. Aldis, Roger N. McDermott, 13- 18 (London, Portland

  12. Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

    ERIC Educational Resources Information Center

    Mutchler, Leigh Ann

    2012-01-01

    The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…

  13. Policy in Conflict: The Struggle Between Environmental Policy and Homeland Security Goals

    DTIC Science & Technology

    2013-09-01

    security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S. oil dollars may be...sustainable energy security by reducing consumption in the most important petroleum consuming sector, that of automobile transportation. Some U.S...39  A.  POLICY CHOICES............................................................................. 39  B.  WHY IS THIS PROBLEM IMPORTANT

  14. Access and authorisation in a Glocal e-Health Policy context.

    PubMed

    Scott, Richard E; Jennett, Penny; Yeo, Maryann

    2004-03-31

    Challenges to the development of appropriate yet adaptable policy and tools for security of the individual patient electronic health record (EHR) are proving to be significant. Compounding this is the unique capability of e-health to transgress all existing geo-political and other barriers. Initiatives to develop and advance policy, standards, and tools in relation to EHR access control and authorisation management must address this capability. Currently policy development initiatives take place largely in an isolated manner. This jeopardises the potential of e-health because decisions made in one jurisdiction might hamper, even prevent, an e-health opportunity in another. This paper places access and authorisation issues in an overall policy context through describing current Canadian initiatives. The National Initiative for Telehealth (NIFTE) Guidelines project is developing a framework of national guidelines for telehealth. The Policy and Peer Permission (PPP) project is developing a unique tool that provides persistent protection of data. The new corporate body 'Infoway' is developing a pan-Canadian electronic health record solution. Finally, the Glocal e-Health Policy initiative is developing a tool with which to identify and describe the inter-relationships of e-health issues amongst policy levels, themes, and actors.

  15. One health security: an important component of the global health security agenda.

    PubMed

    Gronvall, Gigi; Boddie, Crystal; Knutsson, Rickard; Colby, Michelle

    2014-01-01

    The objectives of the Global Health Security Agenda (GHSA) will require not only a "One Health" approach to counter natural disease threats against humans, animals, and the environment, but also a security focus to counter deliberate threats to human, animal, and agricultural health and to nations' economies. We have termed this merged approach "One Health Security." It will require the integration of professionals with expertise in security, law enforcement, and intelligence to join the veterinary, agricultural, environmental, and human health experts essential to One Health and the GHSA. Working across such different professions, which occasionally have conflicting aims and different professional cultures, poses multiple challenges, but a multidisciplinary and multisectoral approach is necessary to prevent disease threats; detect them as early as possible (when responses are likely to be most effective); and, in the case of deliberate threats, find who may be responsible. This article describes 2 project areas that exemplify One Health Security that were presented at a workshop in January 2014: the US government and private industry efforts to reduce vulnerabilities to foreign animal diseases, especially foot-and-mouth disease; and AniBioThreat, an EU project to counter deliberate threats to agriculture by raising awareness and implementing prevention and response policies and practices.

  16. 78 FR 30800 - Reopening of Comment Periods for Certain Proposed Rulemaking Releases and Policy Statements...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-23

    ..., among other things: (1) The registration and comprehensive oversight of security-based swap dealers and... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 240, 242, and 249 [Release No. 34-69491; File Nos... Releases and Policy Statements Applicable to Security-Based Swaps AGENCY: Securities and Exchange...

  17. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and... information contained in those systems. Each system's level of security shall protect the integrity...

  18. 32 CFR 155.4 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Policy. 155.4 Section 155.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.4 Policy. It is DoD policy that: (a) All proceedings provided for by this part shall...

  19. 32 CFR 155.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Policy. 155.4 Section 155.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.4 Policy. It is DoD policy that: (a) All proceedings provided for by this part shall...

  20. 32 CFR 155.4 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Policy. 155.4 Section 155.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.4 Policy. It is DoD policy that: (a) All proceedings provided for by this part shall...

  1. 32 CFR 155.4 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Policy. 155.4 Section 155.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY DEFENSE INDUSTRIAL PERSONNEL SECURITY CLEARANCE PROGRAM § 155.4 Policy. It is DoD policy that: (a) All proceedings provided for by this part shall...

  2. 17 CFR 202.9 - Small entity enforcement penalty reduction policy.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... penalty reduction policy. 202.9 Section 202.9 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION INFORMAL AND OTHER PROCEDURES § 202.9 Small entity enforcement penalty reduction policy. The Commission's policy with respect to whether to reduce or assess civil money penalties against a small entity...

  3. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ...)(i) Standard: Security management process. Implement policies and procedures to prevent, detect... this subpart for the entity. (3)(i) Standard: Workforce security. Implement policies and procedures to...) Standard: Information access management. Implement policies and procedures for authorizing access to...

  4. 45 CFR 164.308 - Administrative safeguards.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ...)(i) Standard: Security management process. Implement policies and procedures to prevent, detect... this subpart for the entity. (3)(i) Standard: Workforce security. Implement policies and procedures to...) Standard: Information access management. Implement policies and procedures for authorizing access to...

  5. Student Conduct Administrator Knowledge of the Statistical Reporting Obligations of the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act

    ERIC Educational Resources Information Center

    DeBowes, Michael Matthew

    2014-01-01

    The "Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act" (the "Clery Act") is a consumer right-to-know law originally passed by Congress in 1900. The law requires colleges and universities receiving federal student aid to publish annually their security-related policies and crime statistics. The…

  6. Awareness-Enabled Coordination

    DTIC Science & Technology

    2006-04-01

    contextualization, policy, team coordination. 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY ...CLASSIFICATION OF THIS PAGE 19. SECURITY CLASSIFICATION 20. LIMITATION OF ABSTRACT OF ABSTRACT UNCLASSIFIED UNCLASSIFIED UL NSN 7540-01-280... netowrk . Federal Austin FBI DHS CBP BobMary Carol John Alice 1 5 Texas NJ 3 4 1 2 3 4 Xavier Yanni 5 6 2 1 2 4 3 Policy & resource flow n Policies

  7. National Aviation Security Policy, Strategy, and Mode-Specific Plans: Background and Considerations for Congress

    DTIC Science & Technology

    2009-02-02

    aviation security . The approach to aviation security was largely shaped by past events, such as the bombing of Pan Am flight 103 in December 1988, rather...community. Following the September 11, 2001, attacks, U.S. aviation security policy and strategy was closely linked to the changes called for in the...have been considered security sensitive thus limiting public discourse on the DHS strategy for aviation security . However, in June 2006 President

  8. Access control based on attribute certificates for medical intranet applications.

    PubMed

    Mavridis, I; Georgiadis, C; Pangalos, G; Khair, M

    2001-01-01

    Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy.

  9. Mass and Elite Views on Nuclear Security: US National Security Surveys 1993-1999

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    HERRON,KERRY G.; JENKINS-SMITH,HANK C.; HUGHES,SCOTT D.

    This is the fourth report in an ongoing series of studies examining how US perspectives about nuclear security are evolving in the post-Cold War era. In Volume 1 the authors present findings from a nationwide telephone survey of randomly selected members of the US general public conducted from 13 September to 14 October 1999. Results are compared to findings from previous surveys in this series conducted in 1993, 1995, and 1997, and trends are analyzed. Key areas of investigation reported in Volume 1 include evolving perceptions of nuclear weapons risks and benefits, preferences for related policy and spending issues, andmore » views about three emerging issue areas: deterrent utility of precision guided munitions; response options to attacks in which mass casualty weapons are used; and expectations about national missile defenses. In this volume they relate respondent beliefs about nuclear security to perceptions of nuclear risks and benefits and to policy preferences. They develop causal models to partially explain key preferences, and they employ cluster analysis to group respondents into four policy relevant clusters characterized by similar views and preferences about nuclear security within each cluster. Systematic links are found among respondent demographic characteristics, perceptions of nuclear risks and benefits, policy beliefs, and security policy and spending preferences. In Volume 2 they provide analysis of in-depth interviews with fifty members of the US security policy community.« less

  10. Provincial Reconstruction Teams in Afghanistan: An Innovative Instrument of International Crisis Management Being Put to the Test

    DTIC Science & Technology

    2008-01-01

    the official policy or position of the George C. Marshall European Center for Security Studies, the U.S. Department of Defense, the German Ministry... The Framework Conditions for the Deployment of PRTs 1.1 New Challenges in Crisis Management 1.2 Positioning of PRTs within International Operations...Afghanistan have led to a surge in civilian activities provided by the armed forces and have caused an increased debate on the legitimacy , principles

  11. Keeping the Routine, Routine: The Operational Risks of Challenging Chinese Excessive Maritime Claims

    DTIC Science & Technology

    2004-02-09

    China Turned Away U.S. Research Ship in International Waters" Stars and Stripes, 20 May 2001, <http:// ww2 .pstripes.osd.mil/01/may01/ed052001d.html...and are not necessarily endorsed by the NWC or the Department of the Navy. 14. ABSTRACT The United States asserts that China claims rights, territory...of the Law of the Sea, but is fundamentally about national security and national policy. 15. SUBJECT TERMS UNCLOS, Excessive Maritime Claims, China

  12. The old age health security in rural China: where to go?

    PubMed

    Dai, Baozhen

    2015-11-04

    The huge number of rural elders and the deepening health problems (e.g. growing threats of infectious diseases and chronic diseases etc.) place enormous pressure on old age health security in rural China. This study aims to provide information for policy-makers to develop effective measures for promoting rural elders' health care service access by examining the current developments and challenges confronted by the old age health security in rural China. Search resources are electronic databases, web pages of the National Bureau of Statistics of China and the National Health and Family Planning Commission of China on the internet, China Population and Employment Statistics Yearbook, China Civil Affairs' Statistical Yearbook and China Health Statistics Yearbooks etc. Articles were identified from Elsevier, Wiley, EBSCO, EMBASE, PubMed, SCI Expanded, ProQuest, and National Knowledge Infrastructure of China (CNKI) which is the most informative database in Chinese. Search terms were "rural", "China", "health security", "cooperative medical scheme", "social medical assistance", "medical insurance" or "community based medical insurance", "old", or "elder", "elderly", or "aged", "aging". Google scholar was searched with the same combination of keywords. The results showed that old age health security in rural China had expanded to all rural elders and substantially improved health care service utilization among rural elders. Increasing chronic disease prevalence rates, pressing public health issues, inefficient rural health care service provision system and lack of sufficient financing challenged the old age health security in rural China. Increasing funds from the central and regional governments for old age health security in rural China will contribute to reducing urban-rural disparities in provision of old age health security and increasing health equity among rural elders between different regions. Meanwhile, initiating provider payment reform may contribute to improving the efficiency of rural health care service provision system and promoting health care service access among rural elders.

  13. Protecting genomic data analytics in the cloud: state of the art and opportunities.

    PubMed

    Tang, Haixu; Jiang, Xiaoqian; Wang, Xiaofeng; Wang, Shuang; Sofia, Heidi; Fox, Dov; Lauter, Kristin; Malin, Bradley; Telenti, Amalio; Xiong, Li; Ohno-Machado, Lucila

    2016-10-13

    The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously evaluated for their ability to support the analysis of human genomic data in an efficient and cost-effective manner. With respect to public cloud environments, there are concerns about the inadvertent exposure of human genomic data to unauthorized users. In analyses involving multiple institutions, there is additional concern about data being used beyond agreed research scope and being prcoessed in untrused computational environments, which may not satisfy institutional policies. To systematically investigate these issues, the NIH-funded National Center for Biomedical Computing iDASH (integrating Data for Analysis, 'anonymization' and SHaring) hosted the second Critical Assessment of Data Privacy and Protection competition to assess the capacity of cryptographic technologies for protecting computation over human genomes in the cloud and promoting cross-institutional collaboration. Data scientists were challenged to design and engineer practical algorithms for secure outsourcing of genome computation tasks in working software, whereby analyses are performed only on encrypted data. They were also challenged to develop approaches to enable secure collaboration on data from genomic studies generated by multiple organizations (e.g., medical centers) to jointly compute aggregate statistics without sharing individual-level records. The results of the competition indicated that secure computation techniques can enable comparative analysis of human genomes, but greater efficiency (in terms of compute time and memory utilization) are needed before they are sufficiently practical for real world environments.

  14. 39 CFR 267.2 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...

  15. 39 CFR 267.2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...

  16. 39 CFR 267.2 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...

  17. 39 CFR 267.2 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...

  18. 39 CFR 267.2 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... STATES POSTAL SERVICE ORGANIZATION AND ADMINISTRATION PROTECTION OF INFORMATION § 267.2 Policy..., and integrity of official records containing sensitive or national security information, it is the policy of the Postal Service to maintain definitive and uniform information security safeguards. These...

  19. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  20. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  1. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  2. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  3. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  4. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  5. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  6. 32 CFR 2400.40 - Responsibility.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.40 Responsibility...

  7. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  8. 32 CFR 2400.44 - Custodians.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.44 Custodians...

  9. Changing Homeland Security: The Year in Review - 2008

    DTIC Science & Technology

    2009-01-01

    new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar

  10. Global CLEWs model - A novel application of OSeMOSYS

    NASA Astrophysics Data System (ADS)

    Avgerinopoulos, Georgios; Pereira Ramos, Eunice; Howells, Mark

    2017-04-01

    Over the past years, studies that analyse Nexus issues from a holistic point of view and not energy, land or water separately have been gaining momentum. This project aims at giving insights into global issues through the application and the analysis of a global scale OSeMOSYS model. The latter -which is based on a fully open and amendable code- has been used successfully in the latest years as it has been the producing fully accessible energy models suitable for capacity building and policy making suggestions. This study develops a CLEWs (climate, land, energy and water) model with the objective of interrogating global challenges (e.g. increasing food demand) and international trade features, with policy priorities on food security, resource efficiency, low-carbon energy and climate change mitigation, water availability and vulnerability to water stress and floods, water quality, biodiversity and ecosystem services. It will for instance assess (i) the impact of water constraints on food security and human development (clean water for human use; industrial and energy water demands), as well as (ii) the impact of climate change on aggravating or relieving water problems.

  11. Nutrition and food security policy in the Islamic Republic of Iran: situation analysis and roadmap towards 2021.

    PubMed

    Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo

    2018-05-03

    All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).

  12. 29 CFR 14.2 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 29 Labor 1 2011-07-01 2011-07-01 false Policy. 14.2 Section 14.2 Labor Office of the Secretary of Labor SECURITY REGULATIONS Introduction to Security Regulations § 14.2 Policy. The interests of the... Information Act (5 U.S.C. 552) and in the current public information policies of the executive branch. (a...

  13. 29 CFR 14.2 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 29 Labor 1 2012-07-01 2012-07-01 false Policy. 14.2 Section 14.2 Labor Office of the Secretary of Labor SECURITY REGULATIONS Introduction to Security Regulations § 14.2 Policy. The interests of the... Information Act (5 U.S.C. 552) and in the current public information policies of the executive branch. (a...

  14. 29 CFR 14.2 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 29 Labor 1 2014-07-01 2013-07-01 true Policy. 14.2 Section 14.2 Labor Office of the Secretary of Labor SECURITY REGULATIONS Introduction to Security Regulations § 14.2 Policy. The interests of the... Information Act (5 U.S.C. 552) and in the current public information policies of the executive branch. (a...

  15. Measuring Security Effectiveness and Efficiency at U.S. Commercial Airports

    DTIC Science & Technology

    2013-03-01

    formative program evaluation and policy analysis to investigate current airport security programs. It identifies innovative public administration and...policy-analysis tools that could provide potential benefits to airport security . These tools will complement the System Based Risk Management framework if

  16. 12 CFR 403.1 - General policies and definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information requires, in the interest of national security, protection against unauthorized disclosure... SAFEGUARDING OF NATIONAL SECURITY INFORMATION § 403.1 General policies and definitions. (a) This regulation of..., declassification, and safeguarding of national security information and material of the United States. This...

  17. Motives for European Union Common Security and Defense Policy Mission Selection

    DTIC Science & Technology

    2011-03-01

    2 Jolyon Howorth, Security and Defence Policy in the European Union (Basingstoke: Plagrave Macmillan, 2007), 34–35. 3 Giovanni ...Lieber and Alexander 2005). Such “conceptual stretching” ( Sartori 1970) renders “balancing” indistinguishable from “normal diplomatic friction...The Shape of Things to Come,” 511. 55 Giovanni Grevi, Damian Helly, and Daniel Keohane, eds. European Security and Defense Policy: The First Ten Years

  18. National Aviation Security Policy, Strategy, and Mode-Specific Plans: Background and Considerations for Congress

    DTIC Science & Technology

    2008-01-02

    aviation security . The approach to aviation security was largely shaped by past events, such as the bombing of Pan Am flight 103 in December 1988, rather...2001 attacks, U.S. aviation security policy and strategy was closely linked to the changes called for in the Aviation and Transportation Security Act...sensitive thus limiting public discourse on the DHS strategy for aviation security . However, in June 2006 President Bush directed the DHS to establish and

  19. 48 CFR 3042.1502 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Performance Information 3042.1502 Policy. (a) Components shall use the Contractor Performance System (CPS) for... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Policy. 3042.1502 Section 3042.1502 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY...

  20. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  1. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  2. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  3. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  4. 47 CFR 202.0 - Objectives.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... services based on national policy/direction. (4) The capability to execute a telecommunications recovery plan based on national policy/guidance. (c) Notwithstanding any provision regarding NS/EP Planning and...

  5. Infusing Aging and Public Policy Content into Gerontology Courses: Collaborative Learning Methods To Teach about Social Security and Medicare.

    ERIC Educational Resources Information Center

    Cianciolo, Patricia K.; Henderson, Tammy L.

    2003-01-01

    Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…

  6. Using K-12 Lessons Learned about How to Balance Accessibility and Test Security to Inform Licensure, Credentialing, and Certification Exam Policies

    ERIC Educational Resources Information Center

    Lazarus, Sheryl S.; van den Heuvel, Jill R.; Thurlow, Martha L.

    2017-01-01

    This paper explores how to balance test security and accessibility on licensure, credentialing, and certification exams. It examines K-12 test security policies related to educational assessments across states to discover lessons learned about how to meet accessibility needs of individuals with disabilities while minimizing test security risks. It…

  7. Framework for Flexible Security in Group Communications

    NASA Technical Reports Server (NTRS)

    McDaniel, Patrick; Prakash, Atul

    2006-01-01

    The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.

  8. An E-Hospital Security Architecture

    NASA Astrophysics Data System (ADS)

    Tian, Fang; Adams, Carlisle

    In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients' privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.

  9. Making Ends Meet After Prison

    PubMed Central

    Harding, David J.; Wyse, Jessica J.B.; Dobson, Cheyney; Morenoff, Jeffrey D.

    2014-01-01

    Former prisoners are at high risk of economic insecurity due to the challenges they face in finding employment and to the difficulties of securing and maintaining public assistance while incarcerated. This study examines the processes through which former prisoners attain economic security, examining how they meet basic material needs and achieve upward mobility over time. It draws on unique qualitative data from in-depth, unstructured interviews with a sample of former prisoners followed over a two to three year period to assess how subjects draw upon a combination of employment, social supports, and public benefits to make ends meet. Findings reveal considerable struggle among our subjects to meet even minimal needs for shelter and food, although economic security and stability could be attained when employment or public benefits were coupled with familial social support. Sustained economic security was rarely achieved absent either strong social support or access to long-term public benefits. However, a select few were able to leverage material support and social networks into trajectories of upward mobility and economic independence. Policy implications are discussed. PMID:25584015

  10. 75 FR 69688 - Agency Information Collection Activities: Regulation on Agency Protests

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ... Protests AGENCY: Office of Chief Procurement Officer, Acquisition Policy and Legislation Office, DHS... Department of Homeland Security, Office of Chief Procurement Officer, Acquisition Policy and Legislation..., Acquisition Policy and Legislation Office, DHS Attn.: Camara Francis, Department of Homeland Security, Office...

  11. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in... within the scope of the Labor Management Relations Act at the various DOE installations should be conducted in normal fashion whereever possible, on the basis of open hearings, unclassified records and...

  12. 10 CFR 706.10 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies and Procedures in... within the scope of the Labor Management Relations Act at the various DOE installations should be conducted in normal fashion whereever possible, on the basis of open hearings, unclassified records and...

  13. 32 CFR 2700.11 - Basic policy.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... government information with the need to protect certain national security information from disclosure, these... Defense Other Regulations Relating to National Defense OFFICE FOR MICRONESIAN STATUS NEGOTIATIONS SECURITY INFORMATION REGULATIONS Original Classification § 2700.11 Basic policy. (a) General. It is the policy of OMSN...

  14. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  15. 47 CFR 202.2 - Criteria and guidance.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...

  16. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  17. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  18. 47 CFR 202.2 - Criteria and guidance.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...

  19. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  20. 47 CFR 202.2 - Criteria and guidance.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...

  1. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  2. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  3. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  4. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  5. 32 CFR 2400.43 - Heads of offices.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.43 Heads of...

  6. 32 CFR 2400.41 - Office Review Committee.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Office of Science and Technology Policy Information Security Program Management § 2400.41 Office Review...

  7. 47 CFR 202.2 - Criteria and guidance.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... Telecommunication OFFICE OF SCIENCE AND TECHNOLOGY POLICY AND NATIONAL SECURITY COUNCIL NATIONAL SECURITY AND... can best be accomplished by centralized policy development, planning, and broad direction. Detailed... policies, procedures and responsibilities as described in parts 211 and 213 of this chapter. (c) The Nation...

  8. Security breaches: tips for assessing and limiting your risks.

    PubMed

    Coons, Leeanne R

    2011-01-01

    As part of their compliance planning, medical practices should undergo a risk assessment to determine any vulnerability within the practice relative to security breaches. Practices should also implement safeguards to limit their risks. Such safeguards include facility access controls, information and electronic media management, use of business associate agreements, and education and enforcement. Implementation of specific policies and procedures to address security incidents is another critical step that medical practices should take as part of their security incident prevention plan. Medical practices should not only develop policies and procedures to prevent, detect, contain, and correct security violations, but should make sure that such policies and procedures are actually implemented in their everyday operations.

  9. Behavioral dimensions of food security

    PubMed Central

    Timmer, C. Peter

    2012-01-01

    The empirical regularities of behavioral economics, especially loss aversion, time inconsistency, other-regarding preferences, herd behavior, and framing of decisions, present significant challenges to traditional approaches to food security. The formation of price expectations, hoarding behavior, and welfare losses from highly unstable food prices all depends on these behavioral regularities. At least when they are driven by speculative bubbles, market prices for food staples (and especially for rice, the staple food of over 2 billion people) often lose their efficiency properties and the normative implications assigned by trade theory. Theoretical objections to government efforts to stabilize food prices, thus, have reduced saliency, although operational, financing, and implementation problems remain important, even critical. The experience of many Asian governments in stabilizing their rice prices over the past half century is drawn on in this paper to illuminate both the political mandates stemming from behavioral responses of citizens and operational problems facing efforts to stabilize food prices. Despite the theoretical problems with free markets, the institutional role of markets in economic development remains. All policy instruments must operate compatibly with prices in markets. During policy design, especially for policies designed to alter market prices, incentive structures need to be compatible with respect to both government capacity (bureaucratic and budgetary) and empirical behavior on the part of market participants who will respond to planned policy changes. A new theoretical underpinning to political economy analysis is needed that incorporates this behavioral perspective, with psychology, sociology, and anthropology all likely to make significant contributions. PMID:20855628

  10. Behavioral dimensions of food security.

    PubMed

    Timmer, C Peter

    2012-07-31

    The empirical regularities of behavioral economics, especially loss aversion, time inconsistency, other-regarding preferences, herd behavior, and framing of decisions, present significant challenges to traditional approaches to food security. The formation of price expectations, hoarding behavior, and welfare losses from highly unstable food prices all depends on these behavioral regularities. At least when they are driven by speculative bubbles, market prices for food staples (and especially for rice, the staple food of over 2 billion people) often lose their efficiency properties and the normative implications assigned by trade theory. Theoretical objections to government efforts to stabilize food prices, thus, have reduced saliency, although operational, financing, and implementation problems remain important, even critical. The experience of many Asian governments in stabilizing their rice prices over the past half century is drawn on in this paper to illuminate both the political mandates stemming from behavioral responses of citizens and operational problems facing efforts to stabilize food prices. Despite the theoretical problems with free markets, the institutional role of markets in economic development remains. All policy instruments must operate compatibly with prices in markets. During policy design, especially for policies designed to alter market prices, incentive structures need to be compatible with respect to both government capacity (bureaucratic and budgetary) and empirical behavior on the part of market participants who will respond to planned policy changes. A new theoretical underpinning to political economy analysis is needed that incorporates this behavioral perspective, with psychology, sociology, and anthropology all likely to make significant contributions.

  11. Access Control based on Attribute Certificates for Medical Intranet Applications

    PubMed Central

    Georgiadis, Christos; Pangalos, George; Khair, Marie

    2001-01-01

    Background Clinical information systems frequently use intranet and Internet technologies. However these technologies have emphasized sharing and not security, despite the sensitive and private nature of much health information. Digital certificates (electronic documents which recognize an entity or its attributes) can be used to control access in clinical intranet applications. Objectives To outline the need for access control in distributed clinical database systems, to describe the use of digital certificates and security policies, and to propose the architecture for a system using digital certificates, cryptography and security policy to control access to clinical intranet applications. Methods We have previously developed a security policy, DIMEDAC (Distributed Medical Database Access Control), which is compatible with emerging public key and privilege management infrastructure. In our implementation approach we propose the use of digital certificates, to be used in conjunction with DIMEDAC. Results Our proposed access control system consists of two phases: the ways users gain their security credentials; and how these credentials are used to access medical data. Three types of digital certificates are used: identity certificates for authentication; attribute certificates for authorization; and access-rule certificates for propagation of access control policy. Once a user is identified and authenticated, subsequent access decisions are based on a combination of identity and attribute certificates, with access-rule certificates providing the policy framework. Conclusions Access control in clinical intranet applications can be successfully and securely managed through the use of digital certificates and the DIMEDAC security policy. PMID:11720951

  12. The Long Way From Government Open Data to Mobile Health Apps: Overcoming Institutional Barriers in the US Federal Government.

    PubMed

    Mergel, Ines

    2014-12-23

    Government agencies in the United States are creating mobile health (mHealth) apps as part of recent policy changes initiated by the White House's Digital Government Strategy. The objective of the study was to understand the institutional and managerial barriers for the implementation of mHealth, as well as the resulting adoption pathways of mHealth. This article is based on insights derived from qualitative interview data with 35 public managers in charge of promoting the reuse of open data through Challenge.gov, the platform created to run prizes, challenges, and the vetting and implementation of the winning and vendor-created apps. The process of designing apps follows three different pathways: (1) entrepreneurs start to see opportunities for mobile apps, and develop either in-house or contract out to already vetted Web design vendors; (2) a top-down policy mandates agencies to adopt at least two customer-facing mobile apps; and (3) the federal government uses a policy instrument called "Prizes and Challenges", encouraging civic hackers to design health-related mobile apps using open government data from HealthData.gov, in combination with citizen needs. All pathways of the development process incur a set of major obstacles that have to be actively managed before agencies can promote mobile apps on their websites and app stores. Beyond the cultural paradigm shift to design interactive apps and to open health-related data to the public, the managerial challenges include accessibility, interoperability, security, privacy, and legal concerns using interactive apps tracking citizen.

  13. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implementedmore » a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.« less

  14. Welfare, Liberty, and Security for All? U.S. Sex Education Policy and the 1996 Title V Section 510 of the Social Security Act.

    PubMed

    Lerner, Justin E; Hawkins, Robert L

    2016-07-01

    When adolescents delay (meaning they wait until after middle school) engaging in sexual intercourse, they use condoms at higher rates and have fewer sexual partners than those who have sex earlier, thus resulting in a lower risk for unintended pregnancies and sexually transmitted infections. The 1996 Section 510 of Title V of the Social Security Act (often referred to as A-H) is a policy that promotes abstinence-only-until-marriage education (AOE) within public schools. Using Stone's (2012) policy analysis framework, this article explores how A-H limits welfare, liberty, and security among adolescents due to the poor empirical outcomes of AOE policy. We recommend incorporating theory-informed comprehensive sex education in addition to theory-informed abstinence education that utilizes Fishbein and Ajzen's (2010) reasoned action model within schools in order to begin to address adolescent welfare, liberty, and security.

  15. 75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-01-06

    ... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...

  16. Judge says leading viatical firm violated securities laws.

    PubMed

    1995-09-22

    A Federal judge has agreed with the Securities and Exchange Commission (SEC) in its suit against Life Partners, a leading viatical settlement company. According to the SEC, Life Partners buys insurance policies from persons living with AIDS in its own name and then sells interests in these policies to investors. The SEC alleges that these interests fall under the Federal securities laws. Life Partners contends that it acts solely as an agent on behalf of investors, and therefore securities laws do not apply. The judge's injunction requires Life Partners to transfer its insurance policies to an independent agent until the case is resolved.

  17. Verification of Security Policy Enforcement in Enterprise Systems

    NASA Astrophysics Data System (ADS)

    Gupta, Puneet; Stoller, Scott D.

    Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

  18. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs.

    PubMed

    González-Tablas, Ana I; Tapiador, Juan E

    2016-05-11

    We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then augmented with attributes capturing the features of each entity together with user-defined tags. We then adapt available graph-based similarity metrics to find the closest app to a new one to be deployed, with the aim of reusing, and possibly adapting, its security policy. We illustrate our approach through a detailed smartphone ecosystem case study. Our results suggest that the scheme can provide users with a reasonably good policy that is consistent with the user's security preferences implicitly captured by policies already in place.

  19. Bootstrapping Security Policies for Wearable Apps Using Attributed Structural Graphs

    PubMed Central

    González-Tablas, Ana I.; Tapiador, Juan E.

    2016-01-01

    We address the problem of bootstrapping security and privacy policies for newly-deployed apps in wireless body area networks (WBAN) composed of smartphones, sensors and other wearable devices. We introduce a framework to model such a WBAN as an undirected graph whose vertices correspond to devices, apps and app resources, while edges model structural relationships among them. This graph is then augmented with attributes capturing the features of each entity together with user-defined tags. We then adapt available graph-based similarity metrics to find the closest app to a new one to be deployed, with the aim of reusing, and possibly adapting, its security policy. We illustrate our approach through a detailed smartphone ecosystem case study. Our results suggest that the scheme can provide users with a reasonably good policy that is consistent with the user’s security preferences implicitly captured by policies already in place. PMID:27187385

  20. A Framework for an Institutional High Level Security Policy for the Processing of Medical Data and their Transmission through the Internet

    PubMed Central

    Pangalos, George

    2001-01-01

    Background The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. Objective To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. Methods We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. Results We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. Conclusions The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented. PMID:11720956

  1. A framework for an institutional high level security policy for the processing of medical data and their transmission through the Internet.

    PubMed

    Ilioudis, C; Pangalos, G

    2001-01-01

    The Internet provides many advantages when used for interaction and data sharing among health care providers, patients, and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality, integrity, and availability of information. It is therefore essential that Health Care Establishments processing and exchanging medical data use an appropriate security policy. To develop a High Level Security Policy for the processing of medical data and their transmission through the Internet, which is a set of high-level statements intended to guide Health Care Establishment personnel who process and manage sensitive health care information. We developed the policy based on a detailed study of the existing framework in the EU countries, USA, and Canada, and on consultations with users in the context of the Intranet Health Clinic project. More specifically, this paper has taken into account the major directives, technical reports, law, and recommendations that are related to the protection of individuals with regard to the processing of personal data, and the protection of privacy and medical data on the Internet. We present a High Level Security Policy for Health Care Establishments, which includes a set of 7 principles and 45 guidelines detailed in this paper. The proposed principles and guidelines have been made as generic and open to specific implementations as possible, to provide for maximum flexibility and adaptability to local environments. The High Level Security Policy establishes the basic security requirements that must be addressed to use the Internet to safely transmit patient and other sensitive health care information. The High Level Security Policy is primarily intended for large Health Care Establishments in Europe, USA, and Canada. It is clear however that the general framework presented here can only serve as reference material for developing an appropriate High Level Security Policy in a specific implementation environment. When implemented in specific environments, these principles and guidelines must also be complemented by measures, which are more specific. Even when a High Level Security Policy already exists in an institution, it is advisable that the management of the Health Care Establishment periodically revisits it to see whether it should be modified or augmented.

  2. The Value of a European Security and Defense Policy

    DTIC Science & Technology

    2007-05-08

    Union, Theory in International Affairs, US Foreign and Security Policy, Crisis Management, Crisis Response, 16. SECURITY CLASSIFICATION OF: 17...1 2. The importance of theory in...will examine which paradigm of international relations is most suited to explain current developments in the EU and which theory in international

  3. Increasing opportunities for the productive engagement of older adults: a response to population aging.

    PubMed

    Gonzales, Ernest; Matz-Costa, Christina; Morrow-Howell, Nancy

    2015-04-01

    "Productive aging" puts forward the fundamental view that the capacity of older adults must be better developed and utilized in activities that make economic contributions to society-working, caregiving, volunteering. It is suggested that productive engagement can lead to multiple positive ends: offsetting fiscal strains of a larger older population, contributing to the betterment of families and civil society, and maintaining the health and economic security of older adults. Advocates claim that outdated social structures and discriminatory behaviors limit participation of older adults in these important social roles as well as prevent the optimization of outcomes for older adults, families, and society. We ask two important questions: (a) How can we shape policies and programs to optimally engage the growing resources of an aging population for the sake of society and older adults themselves? and (b) How can policies pertaining to productive engagement reduce health and economic disparities? We answer these questions by first describing the current state of engagement in each of the three productive activities and summarize some current policies and programs that affect engagement. Next we highlight challenges that cross-cut productive engagement. Finally, we provide policy recommendations to address these challenges. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  4. [Review of food policy approaches: from food security to food sovereignty (2000-2013)].

    PubMed

    López-Giraldo, Luis Alirio; Franco-Giraldo, Álvaro

    2015-07-01

    Food policies have attracted special interest due to the global food crisis in 2008 and promotion of the Millennium Development Goals, leading to approaches by different fields. This thematic review aims to describe the main theoretical and methodological approaches to food security and food sovereignty policies. A search was performed in databases of scientific journals from 2000 to 2013. 320 complete articles were selected from a total of 2,699. After reading the articles to apply the inclusion criteria, 55 items were maintained for analysis. In conclusion, with the predominance of food security as a guiding policy, food sovereignty has emerged as a critical response to be included in designing and researching food policies. Food policies are essential for achieving public health goals. Public health should thus take a leading role in linking and orienting such policies.

  5. The policy and science of soil change - a Victorian perspective

    NASA Astrophysics Data System (ADS)

    Fisher, Jane; Crawford, Michael C.

    2015-07-01

    Understanding and managing soil change is an important component of maintaining soil health and soil security which is important for the future of agricultural productivity in Victoria. Historically, soil policy in Victoria has been dealt with on the basis of a single issue. With the emergence of farming systems thinking, and the concept of soil health and soil security, a more holistic approach is now being taken. A seven-step policy framework has been developed that promotes dialogue between scientist and policy makers. The questions it asks (what is the problem and how can it be solved?) clarify the role of government investment, and developing partnerships between science and policy, enables early identification of potential policy problems and development of appropriate policy interventions to manage soil change and ultimately soil health, soil security and soil productivity.

  6. POLICY VARIATION, LABOR SUPPLY ELASTICITIES, AND A STRUCTURAL MODEL OF RETIREMENT

    PubMed Central

    MANOLI, DAY; MULLEN, KATHLEEN J.; WAGNER, MATHIS

    2015-01-01

    This paper exploits a combination of policy variation from multiple pension reforms in Austria and administrative data from the Austrian Social Security Database. Using the policy changes for identification, we estimate social security wealth and accrual elasticities in individuals’ retirement decisions. Next, we use these elasticities to estimate a dynamic programming model of retirement decisions. Finally, we use the estimated model to examine the labor supply and welfare consequences of potential social security reforms. PMID:26472916

  7. 32 CFR 117.54 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Agency Central Security Service (NSA/CSS) Policy Manual 3-16, “Control of Communications Security Material” (available to authorized users of SIPRNET at www.iad.nsa.smil.mil/resources/library/nsa_office_of_policy_section/pdf/NSA_CSS_MAN-3-16_080505.pdf). (b) Adversely affecting the performance of classified...

  8. 32 CFR 321.14 - DSS implementation policies.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2014-07-01 2014-07-01 false DSS implementation policies. 321.14 Section 321...

  9. 32 CFR 321.14 - DSS implementation policies.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2013-07-01 2013-07-01 false DSS implementation policies. 321.14 Section 321...

  10. 32 CFR 321.14 - DSS implementation policies.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2012-07-01 2012-07-01 false DSS implementation policies. 321.14 Section 321...

  11. Qualitative Assessment of Smoke-Free Policy Implementation in Low-Income Housing: Enhancing Resident Compliance.

    PubMed

    Anthony, Jodi; Goldman, Roberta; Rees, Vaughan W; Frounfelker, Rochelle L; Davine, Jessica; Keske, Robyn R; Brooks, Daniel R; Geller, Alan C

    2018-01-01

    As public housing agencies and other low-income housing providers adopt smoke-free policies, data are needed to inform implementation approaches that support compliance. Focused ethnography used including qualitative interviews with staff, focus groups with residents, and property observations. Four low-income housing properties in Massachusetts, 12 months postpolicy adoption. Individual interviews (n = 17) with property staff (managers, resident service coordinators, maintenance, security, and administrators) and focus groups with resident smokers (n = 28) and nonsmokers (n = 47). Informed by the social-ecological model: intrapersonal, interpersonal, organizational, and community factors relating to compliance were assessed. Utilized MAXQDA in a theory-driven immersion/crystallization analytic process with cycles of raw data examination and pattern identification until no new themes emerged. Self-reported secondhand smoke exposure (SHSe) was reduced but not eliminated. Challenges included relying on ambivalent maintenance staff and residents to report violations, staff serving as both enforcers and smoking cessation counsellors, and inability to enforce on nights and weekends. Erroneous knowledge of the policy, perception that SHSe is not harmful to neighbors, as well as believing that smokers were losing their autonomy and being unfairly singled out when other resident violations were being unaddressed, hindered policy acceptance among resident smokers. The greatest challenge to compliance was the lack of allowable outdoor smoking areas that may have reduced the burden of the policy on smokers. Smoke-free policy implementation to support compliance could be enhanced with information about SHSe for smokers and nonsmokers, cessation support from external community partners, discussion forums for maintenance staff, resident inclusion in decision-making, and framing the policy as part of a broader wellness initiative.

  12. Food Security Under Shifting Economic, Demographic, and Climatic Conditions (Invited)

    NASA Astrophysics Data System (ADS)

    Naylor, R. L.

    2013-12-01

    Global demand for food, feed, and fuel will continue to rise in a more populous and affluent world. Meeting this demand in the future will become increasingly challenging with global climate change; when production shocks stemming from climate variability are added to the new mean climate state, food markets could become more volatile. This talk will focus on the interacting market effects of demand and supply for major food commodities, with an eye on climate-related supply trends and shocks. Lessons from historical patterns of climate variability (e.g., ENSO and its global teleconnections) will be used to infer potential food security outcomes in the event of abrupt changes in the mean climate state. Domestic food and trade policy responses to crop output and price volatility in key producing and consuming nations, such as export bans and import tariffs, will be discussed as a potentially major destabilizing force, underscoring the important influence of uncertainty in achieving--or failing to achieve--food security.

  13. m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.

    PubMed

    Miao, Yinbin; Ma, Jianfeng; Liu, Ximeng; Wei, Fushan; Liu, Zhiquan; Wang, Xu An

    2016-11-01

    Online personal health record (PHR) is more inclined to shift data storage and search operations to cloud server so as to enjoy the elastic resources and lessen computational burden in cloud storage. As multiple patients' data is always stored in the cloud server simultaneously, it is a challenge to guarantee the confidentiality of PHR data and allow data users to search encrypted data in an efficient and privacy-preserving way. To this end, we design a secure cryptographic primitive called as attribute-based multi-keyword search over encrypted personal health records in multi-owner setting to support both fine-grained access control and multi-keyword search via Ciphertext-Policy Attribute-Based Encryption. Formal security analysis proves our scheme is selectively secure against chosen-keyword attack. As a further contribution, we conduct empirical experiments over real-world dataset to show its feasibility and practicality in a broad range of actual scenarios without incurring additional computational burden.

  14. A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing

    PubMed Central

    Fan, Kai; Wang, Junxiong; Wang, Xin; Li, Hui; Yang, Yintang

    2017-01-01

    With the rapid development of big data and Internet of things (IOT), the number of networking devices and data volume are increasing dramatically. Fog computing, which extends cloud computing to the edge of the network can effectively solve the bottleneck problems of data transmission and data storage. However, security and privacy challenges are also arising in the fog-cloud computing environment. Ciphertext-policy attribute-based encryption (CP-ABE) can be adopted to realize data access control in fog-cloud computing systems. In this paper, we propose a verifiable outsourced multi-authority access control scheme, named VO-MAACS. In our construction, most encryption and decryption computations are outsourced to fog devices and the computation results can be verified by using our verification method. Meanwhile, to address the revocation issue, we design an efficient user and attribute revocation method for it. Finally, analysis and simulation results show that our scheme is both secure and highly efficient. PMID:28737733

  15. Building Community Resilience to Disasters

    PubMed Central

    Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S.

    2011-01-01

    Abstract Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation. PMID:28083162

  16. Security Policy for a Generic Space Exploration Communication Network Architecture

    NASA Technical Reports Server (NTRS)

    Ivancic, William D.; Sheehe, Charles J.; Vaden, Karl R.

    2016-01-01

    This document is one of three. It describes various security mechanisms and a security policy profile for a generic space-based communication architecture. Two other documents accompany this document- an Operations Concept (OpsCon) and a communication architecture document. The OpsCon should be read first followed by the security policy profile described by this document and then the architecture document. The overall goal is to design a generic space exploration communication network architecture that is affordable, deployable, maintainable, securable, evolvable, reliable, and adaptable. The architecture should also require limited reconfiguration throughout system development and deployment. System deployment includes subsystem development in a factory setting, system integration in a laboratory setting, launch preparation, launch, and deployment and operation in space.

  17. Social Security Ruling, SSR 99-2p.; titles II and XVI; evaluating cases involving chronic fatigue syndrome (CFS). Social Security Administration. Notice of Social Security ruling.

    PubMed

    1999-04-30

    In accordance with 20 CFR 402.35(b)(1), the Commissioner of Social Security gives notice of Social Security Ruling, SSR 99-2p. This Ruling clarifies disability policy for the evaluation and adjudication of disability claims involving Chronic Fatigue Syndrome (CFS). This Ruling explains that, when it is accompanied by appropriate medical signs or laboratory findings, CFS is a medically determinable impairment that can be the basis for a finding of "disability." This Ruling ensures that all adjudicators will use the same policies and procedures in evaluating disability claims involving CFS, and provides a consolidated statement of these policies and procedures.

  18. Security measures required for HIPAA privacy.

    PubMed

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  19. 75 FR 33811 - Office of the National Coordinator for Health Information Technology; HIT Policy Committee's...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-15

    ... DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the National Coordinator for Health Information Technology; HIT Policy Committee's Privacy & Security Tiger Team Meeting; Notice of Meeting AGENCY: Office of... of Committee: HIT Policy Committee's Privacy & Security Tiger Team. General Function of the Committee...

  20. 32 CFR 159.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Policy. 159.4 Section 159.4 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE SECURITY PRIVATE SECURITY CONTRACTORS OPERATING IN CONTINGENCY OPERATIONS § 159.4 Policy. (a) Consistent with the requirements of paragraph (a)(2) of section 862...

  1. Evaluating Options for Civil Space Situational Awareness (SSA)

    NASA Astrophysics Data System (ADS)

    Lal, B.; Carioscia, S. A.

    In recent years, the number of active satellites and human-made orbital space debris has increased dramatically. An expansion of activities in space, as is currently being proposed by many commercial and international entities, is expected to further exacerbate this challenge. The 18th Space Control Squadron under the Department of Defense (DOD) United States Strategic Command provides space situational awareness (SSA) services to users outside the national security community at no cost. International and commercial users demand better SSA service than is currently feasible, and the demand comes at a time when DOD is under pressure to better prepare for and respond to growing space-based threats to national security. Concerned about the possibility of overextending across conflicting missions in a fiscally constrained environment, some DOD officials have publicly noted a desire to move SSA services not related to national security out of DOD purview. Responding to a request from the Federal Aviation Administration (FAA) Office of Commercial Space Transportation (AST), researchers at the Science and Technology Policy Institute (STPI) identified and evaluated potential approaches for providing SSA services for civil and commercial operations in space. In this paper, we summarize the report [1] and present the pros and cons of four approaches to the provision of civil SSA services in the United States: (1) maintaining status quo through continued provision by DOD; (2) provision by a civil government entity; (3) industry self-provision; and (4) provision by an international organization. Within the second approach, assuming the provision of SSA by a civil agency, STPI further identified and discussed four options: (1) civil agency service capability embedded within DOD; (2) independent civil service capability, using DOD software and systems; (3) independent civil service capability, using commercial software and systems; and (4) the government certifies non-governmental entities (NGEs) to provide service capability. All of these approaches keep military and national security SSA services within DOD. Selecting which approach or option to proceed with depends on the determination of the role of government in the domain as well as consideration of other policy challenges.

  2. From biodefence to biosecurity: the Obama administration's strategy for countering biological threats.

    PubMed

    Koblentz, Gregory D

    2012-01-01

    The Seventh Review Conference of the Biological Weapons Convention (BWC), the first international treaty to outlaw an entire class of weapons, was held in Geneva in December 2011. On 7 December, Secretary of State Hillary Clinton became the highest-ranking US government official to address a BWC meeting. Secretary Clinton told the assembled delegation that ‘we view the risk of bioweapons attack as both a serious national security challenge and a foreign policy priority’. At the same time, she warned that a large-scale disease outbreak ‘could cripple an already fragile global economy’. Secretary Clinton's speech reflected a new understanding that the range of biological threats to international security has expanded from state-sponsored biological warfare programmes to include biological terrorism, dual-use research and naturally occurring infectious diseases such as pandemics. Recognizing these changes, President Barack Obama released a new national strategy for countering biological threats in 2009. This strategy represents a shift in thinking away from the George W. Bush administration's focus on biodefence, which emphasized preparing for and responding to biological weapon attacks, to the concept of biosecurity, which includes measures to prevent, prepare for and respond to naturally occurring and man-made biological threats. The Obama administration's biosecurity strategy seeks to reduce the global risk of naturally occurring and deliberate disease outbreaks through prevention, international cooperation, and maximizing synergies between health and security. The biosecurity strategy is closely aligned with the Obama administration's broader approach to foreign policy, which emphasizes the pragmatic use of smart power, multilateralism and engagement to further the national interest. This article describes the Obama administration's biosecurity strategy; highlights elements of continuity and change from the policies of the Bush administration; discusses how it fits into Obama's broader foreign policy agenda; and analyses critical issues that will have to be addressed in order to implement the strategy successfully.

  3. A Semantic Based Policy Management Framework for Cloud Computing Environments

    ERIC Educational Resources Information Center

    Takabi, Hassan

    2013-01-01

    Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…

  4. 77 FR 2293 - Federal Open Market Committee; Domestic Policy Directive of December 13, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-01-17

    ..., Treasury securities with remaining maturities of approximately 6 years to 30 years with a total face value... total face value of $400 billion. The Committee also directs the Desk to maintain its existing policies... mortgage-backed securities in order to maintain the total face value of domestic securities at...

  5. Security Personnel Practices and Policies in U.S. Hospitals: Findings From a National Survey.

    PubMed

    Schoenfisch, Ashley L; Pompeii, Lisa A

    2016-06-27

    Concerns of violence in hospitals warrant examination of current hospital security practices. Cross-sectional survey data were collected from members of a health care security and safety association to examine the type of personnel serving as security in hospitals, their policies and practices related to training and weapon/restraint tool carrying/use, and the broader context in which security personnel work to maintain staff and patient safety, with an emphasis on workplace violence prevention and mitigation. Data pertaining to 340 hospitals suggest security personnel were typically non-sworn officers directly employed (72%) by hospitals. Available tools included handcuffs (96%), batons (56%), oleoresin capsicum products (e.g., pepper spray; 52%), hand guns (52%), conducted electrical weapons (e.g., TASERs®; 47%), and K9 units (12%). Current workplace violence prevention policy components, as well as recommendations to improve hospital security practices, aligned with Occupational Safety and Health Administration guidelines. Comprehensive efforts to address the safety and effectiveness of hospital security personnel should consider security personnel's relationships with other hospital work groups and hospitals' focus on patients' safety and satisfaction. © 2016 The Author(s).

  6. Protecting the Ozone Shield: A New Public Policy

    DTIC Science & Technology

    1991-04-01

    Public Policy Issue; Alterna- 11 tives; Risk Management; Clean Air Act; Global Warming 16. PRICE CODE 17. SECURITY CLASSIFICATION 𔄂. SECURITY...pattern of global warming , commonly known as "the greenhouse effect. 1 OVERVIEW OF THE OZONE DEPLETION PUBLIC POLICY ISSUE In 1974, two atmospheric...inhabitants from the harmful effects of increased UVb radiation and global warming . Another dilemma surrounds this public policy issue since the first

  7. Good governance for nutrition in the Philippines: elements, experiences, and lessons learned.

    PubMed

    Solon, Florentino S

    2006-12-01

    Malnutrition is a multifactorial problem that needs a multisectoral solution. This article reviews the role of good governance in nutrition programs, citing the Philippines as an example. In the Philippines, these efforts are reflected in the partnership between the public and private sectors in the establishment of the country's capability in research, policy-making, and program implementation. The establishment of the different public institutions engaged in research and policy-making is discussed, highlighting the role of political will through legislation. The evolving tasks of the nutrition program are discussed by citing the tasks in two eras. In the 1970s, the challenges were limited national nutrition data, man-power, tools, and health infrastructure. The public and private institutions were able to respond by legislating national nutrition surveys and dedicated nutrition workers in each village. The challenges in the current era are improved implementation of health programs, given the devolution of health services, and the gathering of an evidence base to further strengthen and refine the strategies of supplementation, fortification, breastfeeding, and food security. In responding to these challenges, multisectoral solutions and collaboration are critical in providing an evidence base to formulate policy. The role of the private sector, with the Nutrition Center of the Philippines used as an example, is that of a supportive and collaborative partner in good governance. Finally, the lessons learned from the past decades of implementing a national nutrition program, given changes in political and economic circumstances, are summarized.

  8. Water security and the science agenda

    NASA Astrophysics Data System (ADS)

    Wheater, Howard S.; Gober, Patricia

    2015-07-01

    The freshwater environment is facing unprecedented global pressures. Unsustainable use of surface and groundwater is ubiquitous. Gross pollution is seen in developing economies, nutrient pollution is a global threat to aquatic ecosystems, and flood damage is increasing. Droughts have severe local consequences, but effects on food can be global. These current pressures are set in the context of rapid environmental change and socio-economic development, population growth, and weak and fragmented governance. We ask what should be the role of the water science community in addressing water security challenges. Deeper understanding of aquatic and terrestrial environments and their interactions with the climate system is needed, along with trans-disciplinary analysis of vulnerabilities to environmental and societal change. The human dimension must be fully integrated into water science research and viewed as an endogenous component of water system dynamics. Land and water management are inextricably linked, and thus more cross-sector coordination of research and policy is imperative. To solve real-world problems, the products of science must emerge from an iterative, collaborative, two-way exchange with management and policy communities. Science must produce knowledge that is deemed to be credible, legitimate, and salient by relevant stakeholders, and the social process of linking science to policy is thus vital to efforts to solve water problems. The paper shows how a large-scale catchment-based observatory can be used to practice trans-disciplinary science integration and address the Anthropocene's water problems.

  9. Environment, Renewable Energy and Reduced Carbon Emissions

    NASA Technical Reports Server (NTRS)

    Sen, S.; Khazanov, G.; Kishimoto, Y.

    2011-01-01

    Increased energy security and reduced carbon emissions pose significant challenges for science and technology. However, they also create substantial opportunities for innovative research and development. In this review paper, we highlight some of the key opportunities and mention public policies that are needed to enable the efforts and to maximize the probability of their success. Climate is among the uttermost nonlinear behaviors found around us. As recent studies showed the possible effect of cosmic rays on the Earth's climate, we investigate how complex interactions between the planet and its environment can be responsible for climate anomalies.

  10. Security for Justice. Israel and Palestine: Diverging Perceptions of the Middle East Conflict Since the Beginning of the Second Intifada and Their Influence on the Peace Process

    DTIC Science & Technology

    2006-11-01

    Liberation Organization” in Bahgat Korany and Ali E. Hillal Dessouki, The Foreign Policies of Arab States. The Challenge of Change, Westview press 1991, pp...Middle East, London and NY, Routledge 1992, or Bahgat Korany and Ali E. Dessouki, op. cit. - 17 - This, they hope, would then make them responsible...Spring 2004), p.170. 69 In Israel there are a number of peace groups such as Givat Haviva, Peace Child Israel, The David Project, Gush Shalom and

  11. 48 CFR 1804.470-3 - IT security requirements.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... the provisioning of services or products (e.g., research and development, engineering, manufacturing... Policies are available at the NASA IT Security Policy Web site at: http://www.nasa.gov/offices/ocio...

  12. Echoes of Bedford: a 20-year social psychology memoir on participatory action research hatched behind bars.

    PubMed

    Fine, Michelle

    2013-11-01

    Responding to Martin Luther King Jr.'s 1968 address at the American Psychological Association calling for a psychology that would educate Whites about racial injustice, this article challenges the widening epistemological gap between those who suffer from inequality and those who conduct social policy research on inequality. In this 20-year memoir on the echoes of a single piece of participatory policy research, Changing Minds: The Impact of College in a Maximum-Security Prison (Fine et al., 2001), readers are invited to explore how deep critical participation by a collaborative team of university and prisoner researchers has facilitated theoretical and methodological complexity, enhanced contextual and construct validity, thickened commitments to ethics and action, and fueled the political sustainability and generalizability of the findings over time and space.

  13. Current Developments and Prospects for the Future: French Security Policy in a Changing World

    DTIC Science & Technology

    1991-06-01

    GROUP SUBGROUP France , French Security Policy, Franco-German relations, NATO, French economy, Charles do Gaulle, Francois Mitterrand, European Community...concludes that the Gaullist myth of grandeur and independence can no longer be sustained . French security must now be achieved by strengthening ties...Gaulle. The thesis concludes that the Gaullist myth of grandeur and independence can no longer be sustained . French security must now be achieved by

  14. How Colombian Interagency Cooperation Reestablished Security and Strengthened Democracy

    DTIC Science & Technology

    2010-03-23

    2002, the electorate voted in President Alvaro Uribe , who implemented a new strategy: the Democratic Security and Defense Policy (DSDP). Before Uribe ... Alvaro Uribe became president of the nation. From the start, the main goal for Uribe’s government was to make Colombia a secure country. He defined... Alvaro Uribe , Achievements of the Democratic security and Defense Policy, UN 61 debate, 21 Sep-2006, http://www.un.org/webcast/ga/61/pdfs

  15. Model Policy for Security and Safety Committee.

    ERIC Educational Resources Information Center

    Perillo, Stephen E.

    The starting point of an effective school safety program is the development of a written policy statement that reflects the school board's belief in safety for its students and that is widely publicized to the staff and community. A sample safety/security policy is provided that lists, first, the superintendent's responsibilities in establishing a…

  16. Five challenges to reconcile agricultural land use and forest ecosystem services in Southeast Asia.

    PubMed

    Carrasco, L R; Papworth, S K; Reed, J; Symes, W S; Ickowitz, A; Clements, T; Peh, K S-H; Sunderland, T

    2016-10-01

    Southeast Asia possesses the highest rates of tropical deforestation globally and exceptional levels of species richness and endemism. Many countries in the region are also recognized for their food insecurity and poverty, making the reconciliation of agricultural production and forest conservation a particular priority. This reconciliation requires recognition of the trade-offs between competing land-use values and the subsequent incorporation of this information into policy making. To date, such reconciliation has been relatively unsuccessful across much of Southeast Asia. We propose an ecosystem services (ES) value-internalization framework that identifies the key challenges to such reconciliation. These challenges include lack of accessible ES valuation techniques; limited knowledge of the links between forests, food security, and human well-being; weak demand and political will for the integration of ES in economic activities and environmental regulation; a disconnect between decision makers and ES valuation; and lack of transparent discussion platforms where stakeholders can work toward consensus on negotiated land-use management decisions. Key research priorities to overcome these challenges are developing easy-to-use ES valuation techniques; quantifying links between forests and well-being that go beyond economic values; understanding factors that prevent the incorporation of ES into markets, regulations, and environmental certification schemes; understanding how to integrate ES valuation into policy making processes, and determining how to reduce corruption and power plays in land-use planning processes. © 2016 Society for Conservation Biology.

  17. Cloud Surprises Discovered in Moving NASA EOSDIS Applications into Amazon Web Services… and #6 Will Shock You!

    NASA Astrophysics Data System (ADS)

    McLaughlin, B. D.; Pawloski, A. W.

    2017-12-01

    NASA ESDIS has been moving a variety of data ingest, distribution, and science data processing applications into a cloud environment over the last 2 years. As expected, there have been a number of challenges in migrating primarily on-premises applications into a cloud-based environment, related to architecture and taking advantage of cloud-based services. What was not expected is a number of issues that were beyond purely technical application re-architectures. From surprising network policy limitations, billing challenges in a government-based cost model, and obtaining certificates in an NASA security-compliant manner to working with multiple applications in a shared and resource-constrained AWS account, these have been the relevant challenges in taking advantage of a cloud model. And most surprising of all… well, you'll just have to wait and see the "gotcha" that caught our entire team off guard!

  18. A multi-domain trust management model for supporting RFID applications of IoT

    PubMed Central

    Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate. PMID:28708855

  19. A multi-domain trust management model for supporting RFID applications of IoT.

    PubMed

    Wu, Xu; Li, Feng

    2017-01-01

    The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system, in which trust establishment among entities from heterogeneous domains without past interaction or prior agreed policy, is a challenge. The current trust management mechanisms in the literature do not meet the specific requirements in multi-domain RFID systems. Therefore, this paper analyzes the special challenges on trust management in multi-domain RFID systems, and identifies the implications and the requirements of the challenges on the solutions to the trust management of multi-domain RFID systems. A multi-domain trust management model is proposed, which provides a hierarchical trust management framework include a diversity of trust evaluation and establishment approaches. The simulation results and analysis show that the proposed method has excellent ability to deal with the trust relationships, better security, and higher accuracy rate.

  20. 77 FR 31015 - Federal Open Market Committee; Domestic Policy Directive of April 24-25, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-24

    ..., Treasury securities with remaining maturities of approximately 6 years to 30 years with a total face value... total face value of $400 billion. The Committee also directs the Desk to maintain its existing policies... mortgage-backed securities in order to maintain the total face value of domestic securities at...

  1. Toward a Theory of Employee Compliance with Information Security Policies: A Grounded Theory Methodology

    ERIC Educational Resources Information Center

    Sikolia, David Wafula

    2013-01-01

    User non-compliance with information security policies in organizations due to negligence or ignorance is reported as a key data security problem for organizations. The violation of the confidentiality, integrity and availability of organizational data has led to losses in millions of dollars for organizations in terms of money and time spent…

  2. Safety and Security at School: A Pedagogical Perspective

    ERIC Educational Resources Information Center

    de Waal, Elda; Grosser, M. M.

    2009-01-01

    Education law and policy currently focus on broader physical aspects of safety and security at schools, as well as, for example, on pedagogical insecurity such as is caused by discriminatory teaching, but law and policy have yet to pay attention to the overall and far-reaching pedagogical safety and security of learners. By means of a descriptive…

  3. United States national security policy making and Vietnam

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Davidson, M.W.

    1985-01-01

    The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to groundmore » combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.« less

  4. Fortresses and Icebergs: The Evolution of the Transatlantic Defense Market and the Implications for U.S. National Security Policy. Volume 1: Study Findings and Recommendations

    DTIC Science & Technology

    2009-01-01

    The United States needs a new model of “globalized” national security for this changing world: we must realign longstanding policies away from go...at the center of our approach to ensuring our future security. … Now, when we most need to re-examine our Transatlantic security model, this new two...address the globalized threats we face, our gov- ernment is already reorienting the capabilities of our national security forces to a new bal- ance

  5. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  6. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  7. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  8. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  9. 32 CFR 2400.19 - Declassification by the Director of the Information Security Oversight Office.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... National Defense OFFICE OF SCIENCE AND TECHNOLOGY POLICY REGULATIONS TO IMPLEMENT E.O. 12356; OFFICE OF SCIENCE AND TECHNOLOGY POLICY INFORMATION SECURITY PROGRAM Declassification and Downgrading § 2400.19...

  10. Trends in Global Nutrition Policy and Implications for Japanese Development Policy.

    PubMed

    Nomura, Marika; Takahashi, Kenzo; Reich, Michael R

    2015-12-01

    Although the issue of nutrition was long underrepresented in the global health agenda, it regained international attention with the introduction of the Scaling Up Nutrition (SUN) framework. A historical review of global nutrition policies over 4 decades illustrates the evolution of nutrition policy themes and the challenges confronted by SUN. This study reviews major events in global nutrition policy from the 1970s to the SUN movement around 2010 to illustrate the dynamics of global agenda setting for nutrition policy along with implications for the government of Japan. The events are categorized according to each decade's nutrition paradigm: nutrition and its socioeconomic features in the 1970s, nutrition and community programs in the 1980s, nutrition as a political issue in the 1990s, and nutrition and evidence in the 2000s. This study identified 2 findings: First, the arguments that led to a global consensus on nutrition policy generated paradigm shifts in core ideas, and second, in response to these paradigm shifts, global nutrition policies have changed significantly over time. With regard to Japan, this analysis concludes that the government of Japan can take a greater initiative in the global health community as supporter of SUN by strategically developing a combination of financial, political, and practical approaches to improve global nutrition policy through the concepts of Universal Health Coverage and Human Security. © The Author(s) 2015.

  11. Graphs for information security control in software defined networks

    NASA Astrophysics Data System (ADS)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  12. The future of health IT innovation and informatics: a report from AMIA's 2010 policy meeting

    PubMed Central

    McGowan, Julie J; Cusack, Caitlin M

    2012-01-01

    While much attention has been paid to the short-term impact that widespread adoption of health information technology (health IT) will have on the healthcare system, there is a corresponding need to look at the long-term effects that extant policies may have on health IT system resilience, innovation, and related ethical, social/legal issues. The American Medical Informatics Association's 2010 Health Policy Conference was convened to further the national discourse on the issues surrounding these longer-term considerations. Conference participants self-selected into three broad categories: resilience in healthcare and health IT; ethical, legal, and social challenges; and innovation, adoption, and sustainability. The discussions about problem areas lead to findings focusing on the lack of encouragement for long-term IT innovation that may result from current health IT policies; the potential impact of uneven adoption of health IT based on the exclusions of the current financial incentives; the weaknesses of contingency and risk mitigation planning that threaten system resilience; and evolving standards developed in response to challenges relating to the security, integrity, and availability of electronic health information. This paper discusses these findings and also offers recommendations that address the interwoven topics of innovation, resilience, and adoption. The goal of this paper is to encourage public and private sector organizations that have a role in shaping health information policy to increase attention to developing a national strategy that assures that health IT innovation and resilience are not impeded by shorter-term efforts to implement current approaches emphasizing adoption and meaningful use of electronic health records. PMID:22037887

  13. Food and nutrition labelling in Thailand: a long march from subsistence producers to international traders

    PubMed Central

    Rimpeekool, Wimalin; Seubsman, Sam-ang; Banwell, Cathy; Kirk, Martyn; Yiengprugsawan, Vasoontara; Sleigh, Adrian

    2015-01-01

    This paper reviews the evolution of Thai food and nutrition label policies and Thailand’s international role relating to food product safety and standards. The historical record has been interpreted to identify future trends and challenges related to food labelling. These challenges are arising in Thailand and many similar emerging economies. Thailand has a good reputation in world food markets and is now becoming a global leader in food production and export. It has become deeply involved with regulations and standards applied by World Trade Organization and Codex Alimentarius while serving its own population with a safe and secure food supply. For consumers considering Thai food products, food labels can provide useful nutrition information and help build trust. Thais began a century ago with policies and laws to enhance food safety and to protect Thai consumers. During the lengthy journey from national to global standards Thai food labels have evolved and now contribute to international food labelling policies. This contribution comes from the perspective of a leading middle income south-east Asian food producer now trading with high income countries around the world. The story of that journey – a case study for many other countries in a similar situation – has not previously been told. This article provides information for policy makers dealing with food labelling, embedding trends and tensions for one middle income food exporter in a long history. Information captured here should be helpful for other middle income countries, especially those with limited records. This strategic knowledge will enable better decisions for future policies. PMID:26538793

  14. The future of health IT innovation and informatics: a report from AMIA's 2010 policy meeting.

    PubMed

    McGowan, Julie J; Cusack, Caitlin M; Bloomrosen, Meryl

    2012-01-01

    While much attention has been paid to the short-term impact that widespread adoption of health information technology (health IT) will have on the healthcare system, there is a corresponding need to look at the long-term effects that extant policies may have on health IT system resilience, innovation, and related ethical, social/legal issues. The American Medical Informatics Association's 2010 Health Policy Conference was convened to further the national discourse on the issues surrounding these longer-term considerations. Conference participants self-selected into three broad categories: resilience in healthcare and health IT; ethical, legal, and social challenges; and innovation, adoption, and sustainability. The discussions about problem areas lead to findings focusing on the lack of encouragement for long-term IT innovation that may result from current health IT policies; the potential impact of uneven adoption of health IT based on the exclusions of the current financial incentives; the weaknesses of contingency and risk mitigation planning that threaten system resilience; and evolving standards developed in response to challenges relating to the security, integrity, and availability of electronic health information. This paper discusses these findings and also offers recommendations that address the interwoven topics of innovation, resilience, and adoption. The goal of this paper is to encourage public and private sector organizations that have a role in shaping health information policy to increase attention to developing a national strategy that assures that health IT innovation and resilience are not impeded by shorter-term efforts to implement current approaches emphasizing adoption and meaningful use of electronic health records.

  15. Russia’s National Interests in the Transcaucasus and the U.S. Policy: Implications for Armenian National Security

    DTIC Science & Technology

    2006-03-01

    Transition, 156. 106 Quoted in Jacob W. Kipp, “War Scare in the Caucasus: Redefining the Threat and the War on Terrorism,” in Russian Military Reform , ed...Garden, 232. 109 Marcel de Haas, “The Development of Russia’s Security Policy,” in Russian Military Reform , ed. Anne C. Aldis and Roger N. McDermott...2003). de Haas, Marcel. “The Development of Russia’s Security Policy,” in Russian Military Reform , ed. Anne C. Aldis and Roger N. McDermott, 3-21

  16. Study of the Use of Ada in Trusted Computing Bases (TCBs) to be Certified at, or Below, the B3 Level

    DTIC Science & Technology

    1989-04-01

    of th . Each M class, fran Cl throh B3, is described. nTe tor ajor steadings of TcBs, Security policy , Acxntability, Ass-ranre, and D Mnt.Iticn, am...the system’s security policy . Data - Information with a specific physical representation. Discreticnary A C Itrol - A means of restricting access to...including hardware firmware, and software - the cambination of which is responsible for enforcing a security policy . A TCB consists of one or more

  17. Cost-Benefit Analysis of Confidentiality Policies for Advanced Knowledge Management Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    May, D

    Knowledge Discovery (KD) processes can create new information within a Knowledge Management (KM) system. In many domains, including government, this new information must be secured against unauthorized disclosure. Applying an appropriate confidentiality policy achieves this. However, it is not evident which confidentiality policy to apply, especially when the goals of sharing and disseminating knowledge have to be balanced with the requirements to secure knowledge. This work proposes to solve this problem by developing a cost-benefit analysis technique for examining the tradeoffs between securing and sharing discovered knowledge.

  18. Food security in a perfect storm: using the ecosystem services framework to increase understanding

    PubMed Central

    Poppy, G. M.; Chiotha, S.; Eigenbrod, F.; Harvey, C. A.; Honzák, M.; Hudson, M. D.; Jarvis, A.; Madise, N. J.; Schreckenberg, K.; Shackleton, C. M.; Villa, F.; Dawson, T. P.

    2014-01-01

    Achieving food security in a ‘perfect storm’ scenario is a grand challenge for society. Climate change and an expanding global population act in concert to make global food security even more complex and demanding. As achieving food security and the millennium development goal (MDG) to eradicate hunger influences the attainment of other MDGs, it is imperative that we offer solutions which are complementary and do not oppose one another. Sustainable intensification of agriculture has been proposed as a way to address hunger while also minimizing further environmental impact. However, the desire to raise productivity and yields has historically led to a degraded environment, reduced biodiversity and a reduction in ecosystem services (ES), with the greatest impacts affecting the poor. This paper proposes that the ES framework coupled with a policy response framework, for example Driver-Pressure-State-Impact-Response (DPSIR), can allow food security to be delivered alongside healthy ecosystems, which provide many other valuable services to humankind. Too often, agro-ecosystems have been considered as separate from other natural ecosystems and insufficient attention has been paid to the way in which services can flow to and from the agro-ecosystem to surrounding ecosystems. Highlighting recent research in a large multi-disciplinary project (ASSETS), we illustrate the ES approach to food security using a case study from the Zomba district of Malawi. PMID:24535394

  19. Food security in a perfect storm: using the ecosystem services framework to increase understanding.

    PubMed

    Poppy, G M; Chiotha, S; Eigenbrod, F; Harvey, C A; Honzák, M; Hudson, M D; Jarvis, A; Madise, N J; Schreckenberg, K; Shackleton, C M; Villa, F; Dawson, T P

    2014-04-05

    Achieving food security in a 'perfect storm' scenario is a grand challenge for society. Climate change and an expanding global population act in concert to make global food security even more complex and demanding. As achieving food security and the millennium development goal (MDG) to eradicate hunger influences the attainment of other MDGs, it is imperative that we offer solutions which are complementary and do not oppose one another. Sustainable intensification of agriculture has been proposed as a way to address hunger while also minimizing further environmental impact. However, the desire to raise productivity and yields has historically led to a degraded environment, reduced biodiversity and a reduction in ecosystem services (ES), with the greatest impacts affecting the poor. This paper proposes that the ES framework coupled with a policy response framework, for example Driver-Pressure-State-Impact-Response (DPSIR), can allow food security to be delivered alongside healthy ecosystems, which provide many other valuable services to humankind. Too often, agro-ecosystems have been considered as separate from other natural ecosystems and insufficient attention has been paid to the way in which services can flow to and from the agro-ecosystem to surrounding ecosystems. Highlighting recent research in a large multi-disciplinary project (ASSETS), we illustrate the ES approach to food security using a case study from the Zomba district of Malawi.

  20. Boundary‐spanning actors in complex adaptive governance systems: The case of multisectoral nutrition

    PubMed Central

    Gervais, Suzanne; Hafeez‐ur‐Rehman, Hajra; Sanou, Dia; Tumwine, Jackson

    2017-01-01

    Abstract A growing literature highlights complexity of policy implementation and governance in global health and argues that the processes and outcomes of policies could be improved by explicitly taking this complexity into account. Yet there is a paucity of studies exploring how this can be achieved in everyday practice. This study documents the strategies, tactics, and challenges of boundary‐spanning actors working in 4 Sub‐Saharan Africa countries who supported the implementation of multisectoral nutrition as part of the African Nutrition Security Partnership in Burkina Faso, Mali, Ethiopia, and Uganda. Three action researchers were posted to these countries during the final 2 years of the project to help the government and its partners implement multisectoral nutrition and document the lessons. Prospective data were collected through participant observation, end‐line semistructured interviews, and document analysis. All 4 countries made significant progress despite a wide range of challenges at the individual, organizational, and system levels. The boundary‐spanning actors and their collaborators deployed a wide range of strategies but faced significant challenges in playing these unconventional roles. The study concludes that, under the right conditions, intentional boundary spanning can be a feasible and acceptable practice within a multisectoral, complex adaptive system in low‐ and middle‐income countries. PMID:29024002

  1. 76 FR 67731 - Federal Open Market Committee; Domestic Policy Directive of September 20 and 21, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-02

    ..., Treasury securities with remaining maturities of approximately 6 years to 30 years with a total face value... total face value of $400 billion. The Committee also directs the Desk to maintain its existing policy of...- backed securities in order to maintain the total face value of domestic securities at approximately $2.6...

  2. Sports Venue Security: Public Policy Options for Sear 4-5 Events

    DTIC Science & Technology

    2014-06-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited SPORTS VENUE...Thesis 4. TITLE AND SUBTITLE SPORTS VENUE SECURITY: PUBLIC POLICY OPTIONS FOR SEAR 4–5 EVENTS 5. FUNDING NUMBERS 6. AUTHOR(S) James M. Gehring...DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Although the United States made considerable advances in improving sport venue security

  3. 17 CFR 200.13b - Director of the Office of Public Affairs, Policy Evaluation, and Research.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Public Affairs, Policy Evaluation, and Research. 200.13b Section 200.13b Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General...

  4. Beyond the Poverty of National Security: Toward a Critical Human Security Perspective in Educational Policy

    ERIC Educational Resources Information Center

    Means, Alexander J.

    2014-01-01

    This article examines the intersecting logics of human capital and national security underpinning the corporate school reform movement in the United States. Taking a 2012 policy report by the Council on Foreign Relations as an entry point, it suggests that these logics are incoherent not only on their own narrow instrumental terms, but also more…

  5. Efforts to secure universal access to HIV/AIDS treatment: a comparison of BRICS countries.

    PubMed

    Sun, Jing; Boing, Alexandra Crispim; Silveira, Marysabel P T; Bertoldi, Andréa D; Ziganshina, Liliya E; Khaziakhmetova, Veronica N; Khamidulina, Rashida M; Chokshi, Maulik R; McGee, Shelley; Suleman, Fatima

    2014-02-01

    This article illustrates how the BRICS countries have been building their focused leadership, making important high level commitment and national policy changes, and improving their health systems, in addressing the HIV/AIDS epidemics in respective settings. Specific aspects are focused on efforts of creating public provisions to secure universal access to ARVs from the aspects of active responsive system and national program, health system strengthening, fostering local production of ARVs, supply chain management, and information system strengthening. Challenges in each BRICS country are analyzed respectively. The most important contributors to the success of response to HIV/AIDS include: creating legal basis for healthcare as a fundamental human right; political commitment to necessary funding for universal access and concrete actions to secure equal quality care; comprehensive system to secure demands that all people in need are capable of accessing prevention, treatment and care; active community involvement; decentralization of the management system considering the local settings; integration of treatment and prevention; taking horizontal approach to strengthen health systems; fully use of the TRIPS flexibility; and regular monitoring and evaluation to serve evidence based decision making. © 2013 Chinese Cochrane Center, West China Hospital of Sichuan University and Wiley Publishing Asia Pty Ltd.

  6. 48 CFR 1804.470-2 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 1804.470-2 Federal Acquisition Regulations System NATIONAL AERONAUTICS AND SPACE ADMINISTRATION GENERAL...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...

  7. 48 CFR 1804.470-2 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 1804.470-2 Federal Acquisition Regulations System NATIONAL AERONAUTICS AND SPACE ADMINISTRATION GENERAL...) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements...

  8. 14 CFR 1203.600 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.600 Policy. Information shall be declassified or downgraded as soon as national security considerations permit. NASA reviews of classified information shall be coordinated with...

  9. Social Security for Composers and Free Lances.

    ERIC Educational Resources Information Center

    Rossel-Majdan, Karl

    1982-01-01

    Internationally, cultural policies are tending toward increased socioeconomic and legal support for creative artists. Austrian cultural policies which encourage art and cultural professional organizations, increased copyright protection, and greater social security for free-lance artists are discussed. (AM)

  10. 14 CFR 1203.600 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM Declassification and Downgrading § 1203.600 Policy. Information shall be declassified or downgraded as soon as national security considerations permit. NASA reviews of classified information shall be coordinated with...

  11. 48 CFR 3004.470-2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... unclassified information. MD 4300.1, entitled Information Technology Systems Security, and the DHS Sensitive Systems Handbook, prescribe the policies and procedures on security for Information Technology resources... ACQUISITION REGULATION (HSAR) GENERAL ADMINISTRATIVE MATTERS Safeguarding Classified and Sensitive Information...

  12. 49 CFR 806.2 - Applicability.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... SECURITY INFORMATION POLICY AND GUIDELINES, IMPLEMENTING REGULATIONS § 806.2 Applicability. This rule supplements Executive Order 12065 within the Board with regard to national security information. It establishes general policies and certain procedures for the classification and declassification of information...

  13. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  14. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  15. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  16. 48 CFR 339.7101 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... 339.7101 Federal Acquisition Regulations System HEALTH AND HUMAN SERVICES SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Information Security Management 339.7101 Policy. HHS is responsible for implementing an information security program to ensure that its information systems and...

  17. Extending key sharing: how to generate a key tightly coupled to a network security policy

    NASA Astrophysics Data System (ADS)

    Kazantzidis, Matheos

    2006-04-01

    Current state of the art security policy technologies, besides the small scale limitation and largely manual nature of accompanied management methods, are lacking a) in real-timeliness of policy implementation and b) vulnerabilities and inflexibility stemming from the centralized policy decision making; even if, for example, a policy description or access control database is distributed, the actual decision is often a centralized action and forms a system single point of failure. In this paper we are presenting a new fundamental concept that allows implement a security policy by a systematic and efficient key distribution procedure. Specifically, we extend the polynomial Shamir key splitting. According to this, a global key is split into n parts, any k of which can re-construct the original key. In this paper we present a method that instead of having "any k parts" be able to re-construct the original key, the latter can only be reconstructed if keys are combined as any access control policy describes. This leads into an easily deployable key generation procedure that results a single key per entity that "knows" its role in the specific access control policy from which it was derived. The system is considered efficient as it may be used to avoid expensive PKI operations or pairwise key distributions as well as provides superior security due to its distributed nature, the fact that the key is tightly coupled to the policy, and that policy change may be implemented easier and faster.

  18. Leveraging the water-energy-food nexus for a sustainability transition: Institutional and policy design choices in a fragmented world (Invited)

    NASA Astrophysics Data System (ADS)

    Aggarwal, R.

    2013-12-01

    Given the critical - but often subtle - feedbacks between water, energy, and food security, a nexus approach that integrates management and governance across sectors and scales is increasingly being advocated in research and policy circles. As a first step, such an approach calls for an integrated multi-disciplinary assessment of the externalities across sectors and tradeoffs involved in enhancing security in one sector on the other sectors. Recent research efforts have focused on understanding these tradeoffs, say, through estimating the energy costs of expanding irrigation for greater food security; or estimating the embodied land and water costs in increased energy production. While such efforts have increased awareness about the inter-connectedness of such issues, the fundamental question of how such an understanding influences decision-making and how it can lead to coordinated action towards a transition to more sustainable pathways still remains largely unanswered. The long legacy of sectoral organization of political and bureaucratic structures has led to a fragmentary policy and institutional landscape, on which cross-sectoral public action and coordination poses several challenges. Moreover, poorly defined property rights, imperfect or absent markets, and uncertainty about resource dynamics imply that economic signals about relative scarcity in one sector are not necessarily clear to decision makers in the other sectors. In this study, we examine these issues related to water-energy food nexus in the context of semi-arid groundwater irrigated regions of western and southern India. Using a social-ecological systems framework, we begin by characterizing some of the key inter-dependencies among food, water, and energy at the farm household, village and state level. We then examine the factors that influence decision-making at these levels, and the extent to which these decisions internalize the externalities. Specifically, we examine the role of energy pricing and rationing policy on groundwater withdrawals and type of crops grown. Finally, we examine several emerging examples of innovative policies and institutions that have leveraged the synergies among sectors. Although these examples do not necessarily provide optimal solutions, these provide some clues as to how decision- making within individual sectors can be influenced through institutional and policy design to transition towards more sustainable pathways in a second best world. We conclude by exploring what lessons these cases might hold for navigating these tradeoffs in other contexts.

  19. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2013-07-01 2013-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  20. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2011-07-01 2011-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  1. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2014-07-01 2014-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  2. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2012-07-01 2012-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  3. 33 CFR 104.305 - Vessel Security Assessment (VSA) requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... security; (ii) Structural integrity; (iii) Personnel protection systems; (iv) Procedural policies; (v... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Vessel Security Assessment (VSA... SECURITY MARITIME SECURITY MARITIME SECURITY: VESSELS Vessel Security Assessment (VSA) § 104.305 Vessel...

  4. Evaluating local policy adoption campaigns in California: Tobacco Retail License (TRL) adoption.

    PubMed

    Satterlund, Travis D; Treiber, Jeanette; Haun, Sue; Cassady, Diana

    2014-06-01

    As part of its state-wide "denormalization" campaign, the California Tobacco Control Program has funded local tobacco control projects to secure tobacco retail licenses (TRLs) in their communities. TRL policies generate funding by requiring tobacco retailers within a jurisdiction to obtain a license, which is in addition to the state license that tobacco retailers are legally required to purchase to sell tobacco products. The funding provided by TRLs enables local law enforcement to carry out inspection and enforcement operations. This paper examines the unique processes by which local project campaigns attempt to get TRL policies adopted in communities across the State of California. Twenty-two local projects submitted final evaluation reports pertaining to the adoption of TRLs, and the reports from these projects form the basis of the analysis. Successful campaigns tended to include the following strategies: (1) determining policy readiness; (2) gathering local data; (3) identifying and working with a "champion"; (4) building relationships with local law enforcement agencies and decision makers; and (5) educating community and decision makers. The major challenges faced by local projects included budget cuts and staffing issues, concern about creating an unfavorable environment for business by imposing more regulations and fees, and complaints about using law enforcement resources for tobacco control in light of more "pressing" public safety issues. These challenges proved difficult for local projects to overcome, and also highlight the need for projects to create and carry out strong but flexible tactical plans that incorporate the aforementioned strategies.

  5. European Energy Policy and Its Effects on Gas Security

    NASA Astrophysics Data System (ADS)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  6. Airport Managers' Perspectives on Security and Safety Management Systems in Aviation Operations: A Multiple Case Study

    NASA Astrophysics Data System (ADS)

    Brown, Willie L., Jr.

    Global terrorism continues to persist despite the great efforts of various countries to protect and safely secure their citizens. As airports form the entry and exit ports of a country, they are one of the most vulnerable locations to terror attacks. Managers of international airports constantly face similar challenges in developing and implementing airport security protocols. Consequently, the technological advances of today have brought both positive and negative impacts on security and terrorism of airports, which are mostly managed by the airport managers. The roles of the managers have greatly increased over the years due to technological advances. The developments in technology have had different roles in security, both in countering terrorism and, at the same time, increasing the communication methods of the terrorists. The purpose of this qualitative multiple case study was to investigate the perspectives of airport managers with regard to societal security and social interactions in the socio-technical systems of the National Terrorism Advisory System (NTAS). Through the data gained regarding managers' perception and experiences, the researcher hoped to enable the development of security measures and policies that are appropriate for airports as socio-technical systems. The researcher conducted interviews with airport managers to gather relevant data to fulfill the rationale of the study. Ten to twelve airport managers based in three commercial aviation airports in Maryland, United States participated in the study. The researcher used a qualitative thematic analysis procedure to analyze the data responses of participants in the interview sessions.

  7. Power politics: National energy strategies of the nuclear newly independent states of Armenia, Lithuania and Ukraine

    NASA Astrophysics Data System (ADS)

    Sabonis-Chafee, Theresa Marie

    The successor states of Armenia, Lithuania and Ukraine arrived at independence facing extraordinary challenges in their energy sectors. Each state was a net importer, heavily dependent on cheap energy supplies, mostly from Russia. Each state also inherited a nuclear power complex over which it had not previously exercised full control. In the time period 1991--1996, each state attempted to impose coherence on the energy sector, selecting a new course for the pieces it had inherited from a much larger, highly integrated energy structure. Each state attempted to craft national energy policies in the midst of severe supply shocks and price shocks. Each state developed institutions to govern its nuclear power sector. The states' challenges were made even greater by the fact that they had few political or economic structures necessary for energy management, and sought to create those structures at the same time. This dissertation is a systematic, non-quantitative examination of how each state's energy policies developed during the 1991--1996 time period. The theoretical premise of the analysis (drawn from Statist realism) is that systemic variables---regional climate and energy vulnerability---provide the best explanations for the resulting energy policy decisions. The dependent variable is defined as creation and reform of energy institutions. The independent variables include domestic climate, regional climate, energy vulnerability and transnational assistance. All three states adopted rhetoric and legislation declaring energy a strategic sector. The evidence suggests that two of the states, Armenia and Lithuania, which faced tense regional climates and high levels of energy vulnerability, succeeded in actually treating energy strategically, approaching energy as a matter of national security or "high politics." The third state, Ukraine, failed to do so. The evidence presented suggests that the systemic variables (regional climate and energy vulnerability) provided a more favorable environment for Ukraine, one in which the state attempted reform of the sector, but not as a concerted national security issue.

  8. Privacy and anonymity in the information society - challenges for the European Union.

    PubMed

    Tsoukalas, Ioannis A; Siozos, Panagiotis D

    2011-03-01

    Electronic information is challenging traditional views on property and privacy. The explosion of digital data, driven by novel web applications, social networking, and mobile devices makes data security and the protection of privacy increasingly difficult. Furthermore, biometric data and radiofrequency identification applications enable correlations that are able to trace our cultural, behavioral, and emotional states. The concept of privacy in the digital realm is transformed and emerges as one of the biggest risks facing today's Information Society. In this context, the European Union (EU) policy-making procedures strive to adapt to the pace of technological advancement. The EU needs to improve the existing legal frameworks for privacy and data protection. It needs to work towards a "privacy by education" approach for the empowerment of "privacy-literate" European digital citizens.

  9. 75 FR 51609 - Classified National Security Information Program for State, Local, Tribal, and Private Sector...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-23

    ... within that agency. Sec. 2. Policy Direction. With policy guidance from the National Security Advisor and... of other agencies and representatives of SLTPS entities, as nominated by any Committee member and...

  10. 10 CFR 706.1 - Purpose.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS General § 706.1 Purpose. The purpose of this part is to set forth Department of Energy, hereinafter “DOE,” security policies and practices in the area of labor-management relations. ...

  11. Cyber security risk management: public policy implications of correlated risk, imperfect ability to prove loss, and observability of self-protection.

    PubMed

    Oğüt, Hulisi; Raghunathan, Srinivasan; Menon, Nirup

    2011-03-01

    The correlated nature of security breach risks, the imperfect ability to prove loss from a breach to an insurer, and the inability of insurers and external agents to observe firms' self-protection efforts have posed significant challenges to cyber security risk management. Our analysis finds that a firm invests less than the social optimal levels in self-protection and in insurance when risks are correlated and the ability to prove loss is imperfect. We find that the appropriate social intervention policy to induce a firm to invest at socially optimal levels depends on whether insurers can verify a firm's self-protection levels. If self-protection of a firm is observable to an insurer so that it can design a contract that is contingent on the self-protection level, then self-protection and insurance behave as complements. In this case, a social planner can induce a firm to choose the socially optimal self-protection and insurance levels by offering a subsidy on self-protection. We also find that providing a subsidy on insurance does not provide a similar inducement to a firm. If self-protection of a firm is not observable to an insurer, then self-protection and insurance behave as substitutes. In this case, a social planner should tax the insurance premium to achieve socially optimal results. The results of our analysis hold regardless of whether the insurance market is perfectly competitive or not, implying that solely reforming the currently imperfect insurance market is insufficient to achieve the efficient outcome in cyber security risk management. © 2010 Society for Risk Analysis.

  12. 17 CFR 147.1 - General policy considerations, purpose and scope of rules relating to open Commission meetings.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false General policy considerations, purpose and scope of rules relating to open Commission meetings. 147.1 Section 147.1 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION OPEN COMMISSION MEETINGS § 147.1 General policy considerations, purpose and scope of rules...

  13. Research review of nongovernmental organizations' security policies for humanitarian programs in war, conflict, and postconflict environments.

    PubMed

    Rowley, Elizabeth; Burns, Lauren; Burnham, Gilbert

    2013-06-01

    To identify the most and least commonly cited security management messages that nongovernmental organizations (NGOs) are communicating to their field staff, to determine the types of documentation that NGOs most often use to communicate key security messages, and to distinguish the points of commonality and divergence across organizations in the content of key security messages. The authors undertook a systematic review of available security policies, manuals, and training materials from 20 international humanitarian NGOs using the InterAction Minimum Operating Security Standards as the basis for a review framework. The most commonly cited standards include analytical security issues such as threat and risk assessment processes and guidance on acceptance, protection, and deterrence approaches. Among the least commonly cited standards were considering security threats to national staff during staffing decision processes, incorporating security awareness into job descriptions, and ensuring that national staff security issues are addressed in trainings. NGO staff receive security-related messages through multiple document types, but only 12 of the 20 organizations have a distinct security policy document. Points of convergence across organizations in the content of commonly cited standards were found in many areas, but differences in security risk and threat assessment guidance may undermine communication between aid workers about changes in local security environments. Although the humanitarian community has experienced significant progress in the development of practical staff security guidance during the past 10 years, gaps remain that can hinder efforts to garner needed resources, clarify security responsibilities, and ensure that the distinct needs of national staff are recognized and addressed.

  14. History of U.S. Nuclear Weapons Doctrine and a Path Forward

    NASA Astrophysics Data System (ADS)

    Chyba, Christopher

    2007-04-01

    During the Cold War, the United States considered a number of approaches for living in a world with nuclear weapons, including disarmament, preventive war, the incorporation of nuclear weapons into military strategy, passive and active defense, and deterrence. With the failure of early approaches to disarmament, and the rejection of preventive war against the Soviet Union (and later, China), deterrence became central to key nuclear relationships, though arms control continued to play an important role. The nuclear nonproliferation treaty made preventing the further spread of nuclear weapons another central component of U.S. policy. The Bush Administration has tried to devise a new policy for the post-Cold War period. Their approach has three salient pillars. First, it is characterized by an overall skepticism toward multilateral agreements, on the grounds that bad actors will not obey them, that agreements can lead to a false sense of security, and that such agreements are too often a way for the Lilliputians of the world to tie down Gulliver. The March 2005 U.S. National Defense Strategy declared that U.S. strength ``will continue to be challenged by those who employ a strategy of the weak, using international fora, judicial processes and terrorism.'' Second, the Bush Administration declared its intention to maintain a military dominance so great that other states simply would not try to catch up. The 2002 National Security Strategy states that ``Our forces will be strong enough to dissuade potential adversaries from pursuing a military build-up in hopes of surpassing, or equaling, the power of the United States.'' Third, the 2002 National Security Strategy (reaffirmed by the 2006 National Security Strategy) moved preventive war (which the strategies called ``preemptive war'') to a central position, rather than deterrence and nonproliferation. In part this was because of the claim that certain ``rogue'' states, and terrorist groups, were not deterrable. This talk will sketch this history, discuss the approach of the Bush Administration in more detail and assess its successes and failures, and suggest the lines of a new approach to U.S. nuclear weapons policy for the coming decades. This approach will follow that outlined in George Bunn and Christopher Chyba (eds.), ``U.S. Nuclear Weapons Policy: Confronting Today's Threats'' (Brookings, 2006, 340 pp.).

  15. Contemporary United States Foreign Policy Towards Indonesia

    DTIC Science & Technology

    2004-01-01

    regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national

  16. Looming Discontinuities in U.S. Military Strategy and Defense Planning: Colliding RMAs Necessitate a New Strategy

    DTIC Science & Technology

    2011-01-01

    CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute, a federally funded...Marine Corps, the defense agencies, and the defense Intelligence Community. For more information on the International Security and Defense Policy

  17. An Open Framework for Low-Latency Communications across the Smart Grid Network

    ERIC Educational Resources Information Center

    Sturm, John Andrew

    2011-01-01

    The recent White House (2011) policy paper for the Smart Grid that was released on June 13, 2011, "A Policy Framework for the 21st Century Grid: Enabling Our Secure Energy Future," defines four major problems to be solved and the one that is addressed in this dissertation is Securing the Grid. Securing the Grid is referred to as one of…

  18. An integrated water-energy-food-livelihoods approach for assessing environmental livelihood security

    NASA Astrophysics Data System (ADS)

    Biggs, E. M.; Duncan, J.; Boruff, B.; Bruce, E.; Neef, A.; McNeill, K.; van Ogtrop, F. F.; Haworth, B.; Duce, S.; Horsley, J.; Pauli, N.; Curnow, J.; Imanari, Y.

    2015-12-01

    Environmental livelihood security refers to the challenges of maintaining global food security and universal access to freshwater and energy to sustain livelihoods and promote inclusive economic growth, whilst sustaining key environmental systems' functionality, particularly under variable climatic regimes. Environmental security is a concept complementary to sustainable development, and considers the increased vulnerability people have to certain environmental stresses, such as climatic change. Bridging links between the core component concepts of environmental security is integral to future human security, and in an attempt to create this bridge, the nexus approach to human protection has been created, where water resource availability underpins food, water and energy security. The water-energy-food nexus has an influential role in attaining human security, yet little research has made the link between the nexus and livelihoods. In this research we provide a critical appraisal of the synergies between water-energy-food nexus framings and sustainable livelihoods approaches, both of which aim to promote sustainable development. In regions where livelihoods are dependent on environmental conditions, the concept of sustainable development is critical for ensuring future environmental and human security. Given our appraisal we go on to develop an integrated framework for assessing environmental livelihood security of multiscale and multi-level systems. This framework provides a tangible approach for assessing changes in the water-energy-food-livelihood indicators of a system. Examples of where system applications may occur are discussed for the Southeast Asia and Oceania region. Our approach will be particularly useful for policy-makers to inform evidence-based decision-making, especially in localities where climate change increases the vulnerability of impoverished communities and extenuates environmental livelihood insecurity.

  19. The availability and affordability of long-term care for disabled older people in China: The issues related to inequalities in social security benefits.

    PubMed

    Lei, Peng; Feng, Zhixin; Wu, Zhuochun

    2016-01-01

    China is experiencing increasing pressure from issues relating to an ageing population. The rationality of different eligibility criteria of the benefits within the social security system has been widely challenged; however, to date, no previous study has explored its association with the availability and affordability of long-term care (LTC). This study evaluates the availability and affordability of Long-Term Care (LTC) services for disabled older people (aged 65 and above) in China, with special attention to the differences among groups in receipt of specific social security benefits. The data of availability and affordability of LTC services for disabled older people is from a nationally representative sample Chinese Longitudinal Healthy Longevity Survey (CLHLS). Three different social security benefits were identified and their effects on the long-term care services for disabled older people were explored. The overall proportions of disabled older people who have only limited or no available or affordable LTC services were remarkably high, especially for those who have moderate or no social security benefits. Compared to those who are entitled to generous social security benefits, older people who have no social security benefits are 18.45 times more likely to be unable to afford health care expenses. The findings imply that policy makers in China could focus on the LTC needs for the social security and socioeconomically disadvantaged (who have limited or no social security benefits and in low household income) disabled older people which could reduce the gap between them and those who are entitled to generous social security benefits. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  20. Aviation Security: Background and Policy Options for Screening and Securing Air Cargo

    DTIC Science & Technology

    2008-02-25

    today, employees with unescorted access privileges to security identification display areas ( SIDAs ) may access secured areas and aircraft without...where all-cargo aircraft are loaded and unloaded, as security identification display areas ( SIDAs ). This effectively elevates the required security

  1. 76 FR 8753 - Final Information Quality Guidelines Policy

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-02-15

    ... DEPARTMENT OF HOMELAND SECURITY Final Information Quality Guidelines Policy AGENCY: Department of Homeland Security. ACTION: Notice and request for public comment on Final Information Quality Guidelines. SUMMARY: These guidelines should be used to ensure and maximize the quality of disseminated information...

  2. 32 CFR 187.4 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... further foreign policy and national security interests while at the same time taking into consideration important environmental concerns. (b) The Department of Defense acts with care in the global commons because... be through the Assistant Secretary of Defense (International Security Affairs). (e) Executive Order...

  3. 7 CFR 1962.2 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of the Department of Agriculture (Continued) RURAL HOUSING SERVICE, RURAL BUSINESS-COOPERATIVE... REGULATIONS (CONTINUED) PERSONAL PROPERTY Servicing and Liquidation of Chattel Security § 1962.2 Policy. Chattel security, EO property and note only loans will be serviced to accomplish the loan objectives and...

  4. Finasteride Reduces the Risk of Low-Grade Prostate Cancer in Men 55 and Older

    MedlinePlus

    ... the researchers gathered using data from the Social Security Death Index (SSDI) from the time the trial ... Websites POLICIES Accessibility Comment Policy Disclaimer FOIA Privacy & Security Reuse & Copyright Syndication Services Website Linking U.S. Department ...

  5. Specifying and Verifying Organizational Security Properties in First-Order Logic

    NASA Astrophysics Data System (ADS)

    Brandt, Christoph; Otten, Jens; Kreitz, Christoph; Bibel, Wolfgang

    In certain critical cases the data flow between business departments in banking organizations has to respect security policies known as Chinese Wall or Bell-La Padula. We show that these policies can be represented by formal requirements and constraints in first-order logic. By additionally providing a formal model for the flow of data between business departments we demonstrate how security policies can be applied to a concrete organizational setting and checked with a first-order theorem prover. Our approach can be applied without requiring a deep formal expertise and it therefore promises a high potential of usability in the business.

  6. Creating a data resource: what will it take to build a medical information commons?

    PubMed

    Deverka, Patricia A; Majumder, Mary A; Villanueva, Angela G; Anderson, Margaret; Bakker, Annette C; Bardill, Jessica; Boerwinkle, Eric; Bubela, Tania; Evans, Barbara J; Garrison, Nanibaa' A; Gibbs, Richard A; Gentleman, Robert; Glazer, David; Goldstein, Melissa M; Greely, Hank; Harris, Crane; Knoppers, Bartha M; Koenig, Barbara A; Kohane, Isaac S; La Rosa, Salvatore; Mattison, John; O'Donnell, Christopher J; Rai, Arti K; Rehm, Heidi L; Rodriguez, Laura L; Shelton, Robert; Simoncelli, Tania; Terry, Sharon F; Watson, Michael S; Wilbanks, John; Cook-Deegan, Robert; McGuire, Amy L

    2017-09-22

    National and international public-private partnerships, consortia, and government initiatives are underway to collect and share genomic, personal, and healthcare data on a massive scale. Ideally, these efforts will contribute to the creation of a medical information commons (MIC), a comprehensive data resource that is widely available for both research and clinical uses. Stakeholder participation is essential in clarifying goals, deepening understanding of areas of complexity, and addressing long-standing policy concerns such as privacy and security and data ownership. This article describes eight core principles proposed by a diverse group of expert stakeholders to guide the formation of a successful, sustainable MIC. These principles promote formation of an ethically sound, inclusive, participant-centric MIC and provide a framework for advancing the policy response to data-sharing opportunities and challenges.

  7. A systematic literature review on security and privacy of electronic health record systems: technical perspectives.

    PubMed

    Rezaeibagha, Fatemeh; Win, Khin Than; Susilo, Willy

    Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. Our inclusion criteria were full articles that dealt with the security and privacy of technical implementations of EHR systems published in English in peer-reviewed journals and conference proceedings between 1998 and 2013; 55 selected studies were reviewed in detail. We analysed the review results using two International Organization for Standardization (ISO) standards (29100 and 27002) in order to consolidate the study findings. Using this process, we identified 13 features that are essential to security and privacy in EHRs. These included system and application access control, compliance with security requirements, interoperability, integration and sharing, consent and choice mechanism, policies and regulation, applicability and scalability and cryptography techniques. This review highlights the importance of technical features, including mandated access control policies and consent mechanisms, to provide patients' consent, scalability through proper architecture and frameworks, and interoperability of health information systems, to EHR security and privacy requirements.

  8. Homeland Security. Management Challenges Facing Federal Leadership

    DTIC Science & Technology

    2002-12-01

    Security Management Challenges Facing Federal Leadership 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT...including attention to management practices and key success factors. HOMELAND SECURITY Management Challenges Facing Federal Leadership www.gao.gov/cgi...significant management and coordination challenges if it is to provide this leadership and be successful in preventing and responding to any future

  9. Across the Atlantic cooperation to address international challenges in eHealth and health IT: managing toward a common goal.

    PubMed

    Friedman, Charles P; Iakovidis, Ilias; Debenedetti, Laurent; Lorenzi, Nancy M

    2009-11-01

    Countries on both sides of the Atlantic Ocean have invested in health information and communication technologies. Since eHealth challenges cross borders a European Union-United States of America conference on public policies relating to health IT and eHealth was held October 20-21, 2008 in Paris, France. The conference was organized around the four themes: (1) privacy and security, (2) health IT interoperability, (3) deployment and adoption of health IT, and (4) Public Private Collaborative Governance. The four key themes framed the discussion over the two days of plenary sessions and workshops. Key findings of the conference were organized along the four themes. (1) Privacy and security: Patients' access to their own data and key elements of a patient identification management framework were discussed. (2) Health IT interoperability: Three significant and common interoperability challenges emerged: (a) the need to establish common or compatible standards and clear guidelines for their implementation, (b) the desirability for shared certification criteria and (c) the need for greater awareness of the importance of interoperability. (3) Deployment and adoption of health IT: Three major areas of need emerged: (a) a shared knowledge base and assessment framework, (b) public-private collaboration and (c) and effective organizational change strategies. (4) Public Private Collaborative Governance: Sharing and communication are central to success in this area. Nations can learn from one another about ways to develop harmonious, effective partnerships. Three areas that were identified as highest priority for collaboration included: (1) health data security, (2) developing effective strategies to ensure healthcare professionals' acceptance of health IT tools, and (3) interoperability.

  10. Emerging Challenges in the China-US Strategic Military Relationship

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Jacobson, E.; Goldstein, P.

    The Emerging Challenges in the China-­US Strategic Military Relationship workshop, held at Lawrence Livermore National Laboratory’s Center for Global Security Research (CGSR) on March 28th and 29th, 2017, sought to identify and explore key factors in the evolving bilateral relationship with an emphasis on security issues. Participants broadly agreed that while the US-­China relationship remains stable, particularly in the nuclear domain, the overall relationship is trending negatively. As the People’s Republic of China (PRC) continues to experience economic and technological growth, its military strength is also increasing. This increase in military strength as well as Chinese actions in the regionmore » have led to increasing uneasiness amongst the United States and its allies. At the same time, it appears that China views the downturn in bilateral relations as the fault of the United States; in particular, former President Obama’s rebalance policy, and the discussions of and deployment of the Terminal High Altitude Area Defense (THAAD) system. Concern was expressed regarding the overall stability of the US-­China military relationship, and it was noted that strategic stability is less stable than before due to conventional balance shifts and the increased risks of escalation.« less

  11. The Long Way From Government Open Data to Mobile Health Apps: Overcoming Institutional Barriers in the US Federal Government

    PubMed Central

    2014-01-01

    Background Government agencies in the United States are creating mobile health (mHealth) apps as part of recent policy changes initiated by the White House’s Digital Government Strategy. Objective The objective of the study was to understand the institutional and managerial barriers for the implementation of mHealth, as well as the resulting adoption pathways of mHealth. Methods This article is based on insights derived from qualitative interview data with 35 public managers in charge of promoting the reuse of open data through Challenge.gov, the platform created to run prizes, challenges, and the vetting and implementation of the winning and vendor-created apps. Results The process of designing apps follows three different pathways: (1) entrepreneurs start to see opportunities for mobile apps, and develop either in-house or contract out to already vetted Web design vendors; (2) a top-down policy mandates agencies to adopt at least two customer-facing mobile apps; and (3) the federal government uses a policy instrument called “Prizes and Challenges”, encouraging civic hackers to design health-related mobile apps using open government data from HealthData.gov, in combination with citizen needs. All pathways of the development process incur a set of major obstacles that have to be actively managed before agencies can promote mobile apps on their websites and app stores. Conclusions Beyond the cultural paradigm shift to design interactive apps and to open health-related data to the public, the managerial challenges include accessibility, interoperability, security, privacy, and legal concerns using interactive apps tracking citizen. PMID:25537314

  12. Sweden After the Cold War: Implications for US Regional Strategies

    DTIC Science & Technology

    1993-09-01

    transient threats to common interests rather than formal alliance structures." [Ref. 3:p. 9] Such was the case in the recent Gulf War. But as Colonel...European Union, Sweden will participate fully in the common security and foreign policy which was laid down in the Maastricht Treaty... A "policy of...34defense policy": The EC is developing in the direction for a European Union, with a common security and foreign policy, and possibly a common

  13. Japanese Prime Minister Shinzo Abe’s Two Administrations: Successes and Failures of Domestic and Security Policies

    DTIC Science & Technology

    2016-12-01

    administrations, Abe’s unrivaled political performance within the Liberal Democratic Party (LDP), the weakness of opposition parties, and an economic...political success and failure, domestic policy, security policy, pragmatism, political environment, normalization, Liberal Democratic Party (LDP) 15...level, political influence from former administrations, Abe’s unrivaled political performance within the Liberal Democratic Party (LDP), the weakness

  14. Analysis of Government Policies to Support Sustainable Domestic Defense Industries

    DTIC Science & Technology

    2015-06-01

    arms- industry. Syrian civil war . n.d. Retrieved June 10, 2015, from http://www.britannica.com/event/Syrian-Civil- War United Nations Commission on...perhaps the most significant variable is the government. Because governments are both buyers and suppliers of national security, government policies...are both buyers and suppliers of national security, government policies are often designed by governments to support and regulate their domestic

  15. Federated Tensor Factorization for Computational Phenotyping

    PubMed Central

    Kim, Yejin; Sun, Jimeng; Yu, Hwanjo; Jiang, Xiaoqian

    2017-01-01

    Tensor factorization models offer an effective approach to convert massive electronic health records into meaningful clinical concepts (phenotypes) for data analysis. These models need a large amount of diverse samples to avoid population bias. An open challenge is how to derive phenotypes jointly across multiple hospitals, in which direct patient-level data sharing is not possible (e.g., due to institutional policies). In this paper, we developed a novel solution to enable federated tensor factorization for computational phenotyping without sharing patient-level data. We developed secure data harmonization and federated computation procedures based on alternating direction method of multipliers (ADMM). Using this method, the multiple hospitals iteratively update tensors and transfer secure summarized information to a central server, and the server aggregates the information to generate phenotypes. We demonstrated with real medical datasets that our method resembles the centralized training model (based on combined datasets) in terms of accuracy and phenotypes discovery while respecting privacy. PMID:29071165

  16. Evaluation of multi-level social learning for sustainable landscapes: perspective of a development initiative in Bergslagen, Sweden.

    PubMed

    Axelsson, Robert; Angelstam, Per; Myhrman, Lennart; Sädbom, Stefan; Ivarsson, Milis; Elbakidze, Marine; Andersson, Kenneth; Cupa, Petr; Diry, Christian; Doyon, Frederic; Drotz, Marcus K; Hjorth, Arne; Hermansson, Jan Olof; Kullberg, Thomas; Lickers, F Henry; McTaggart, Johanna; Olsson, Anders; Pautov, Yurij; Svensson, Lennart; Törnblom, Johan

    2013-03-01

    To implement policies about sustainable landscapes and rural development necessitates social learning about states and trends of sustainability indicators, norms that define sustainability, and adaptive multi-level governance. We evaluate the extent to which social learning at multiple governance levels for sustainable landscapes occur in 18 local development initiatives in the network of Sustainable Bergslagen in Sweden. We mapped activities over time, and interviewed key actors in the network about social learning. While activities resulted in exchange of experiences and some local solutions, a major challenge was to secure systematic social learning and make new knowledge explicit at multiple levels. None of the development initiatives used a systematic approach to secure social learning, and sustainability assessments were not made systematically. We discuss how social learning can be improved, and how a learning network of development initiatives could be realized.

  17. Land system change and food security: towards multi-scale land system solutions☆

    PubMed Central

    Verburg, Peter H; Mertz, Ole; Erb, Karl-Heinz; Haberl, Helmut; Wu, Wenbin

    2013-01-01

    Land system changes are central to the food security challenge. Land system science can contribute to sustainable solutions by an integrated analysis of land availability and the assessment of the tradeoffs associated with agricultural expansion and land use intensification. A land system perspective requires local studies of production systems to be contextualised in a regional and global context, while global assessments should be confronted with local realities. Understanding of land governance structures will help to support the development of land use policies and tenure systems that assist in designing more sustainable ways of intensification. Novel land systems should be designed that are adapted to the local context and framed within the global socio-ecological system. Such land systems should explicitly account for the role of land governance as a primary driver of land system change and food production. PMID:24143158

  18. [Rethinking how health is promoted in the Colombian general health-related social security system (Sistema General de Seguridad Social en Salud)].

    PubMed

    Eslava-Castañeda, Juan C

    2006-12-01

    This article takes stock of how promoting health (PH) (promoción de la salud - PS) has been understood within an international setting and gives three meanings for promotion: as general policy orientation, as a set of actions and as a special dimension of sanitary work. Interest expressed in giving it a specific basis distinguishing it from prevention, transcending educational work, has emerged from the subtle differences established from such different ways of coming to terms with PH. After recognising the challenge posed by PH in the field of health, the text succinctly describes how discourse regarding PH has been introduced in Colombia and discusses how an attempt has been made to be more precise regarding its place in the general health-related social security system. Efforts currently being made in Colombia regarding making PH become a reality within the Colombian health system are then mentioned.

  19. 10 CFR 706.13 - Clearance of counsel.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... even though the record is to be unclassified. Clearance of counsel makes possible their participation in any closed discussions needed preparatory to making an unclassified record. Each party is...

  20. 10 CFR 706.13 - Clearance of counsel.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... DEPARTMENT OF ENERGY SECURITY POLICIES AND PRACTICES RELATING TO LABOR-MANAGEMENT RELATIONS Security Policies... even though the record is to be unclassified. Clearance of counsel makes possible their participation in any closed discussions needed preparatory to making an unclassified record. Each party is...

Top