Role of farmer group institutions in increasing farm production and household food security
NASA Astrophysics Data System (ADS)
Rahmadanih; Bulkis, S.; Arsyad, M.; Amrullah, A.; Viantika, N. M.
2018-05-01
Food productions and food security are still becomes serious issue in agriculture development. The research objectives are (1) Examining the role of Farmer Group in increasing farm production and (2) Analyzing the role of Farmer Group in relationship with the household food security. The research was conducted in Soppeng District, South Sulawesi, Indonesia by taking unit of analysis at household level of Farmer Group members. Sample were 6 farmer groups, consisting of 365 households. The Results showed that the Farmer Group has a good role as a production, collaboration and market unit to increase farming production (score 2.3-2.6), but haven’t much impact to increase household food security. Rice production are 4.2 – 6.2 tons per hectare and household food security level are “low and marginal food secure” (mean score 4 and 6). Nevertheless, the role of Farmer Group showed a positive relationship with the level of household food security. So, it is necessarry to increase the role of Farmer Group in order to increase income and household food security based on Farmer Group’s needs and potencies through facilitation of (a) seed and water/irrigation availability, (b) preparing organization rules (AD/ART) and (c) appropriate training and education of food and nutrition.
2016-05-26
research questions consist of three groups . The first group addresses an analysis of PfP. The second group determines contemporary US and UK strategy...The second group of research questions focuses upon current US, UK security cooperation initiatives and the specific policy objectives they...Ambition, Austerity and the Case for Rethinking UK Military Spending.” Oxford Research Group . Last modified May 13, 2015. Accessed September 17, 2015
2009-04-01
terrorist social networks are quite vulnerable to penetration and exploitation by indigenous personnel working in the communities where the groups operate...LEVERAGING INDIGENOUS SECURITY FORCES by Mack-Jan H. Spencer, Maj, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the...4. TITLE AND SUBTITLE Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces 5a. CONTRACT
Usage of insecure E-mail services among researchers with different scientific background.
Solić, Kresimir; Grgić, Krešimir; Ilakovac, Vesna; Zagar, Drago
2011-08-01
Free web‑based e-mail services are considered to have more security flaws than institutional ones, but they are frequently used among scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the insecure free e-mail services for professional communication among biomedical, economical and technical researchers, who published papers in one of three different journals: Croatian Medical Journal, Automatika and Economic Research. Contact details of the authors who provided their e‑mail address from the papers published in those three journals during one year period were collected. These e‑mail addresses were collected from the electronic archive of the journals in question. The domains of all e‑mail addresses were assessed and contacts were categorized into three groups according to the following types: world-wide known free web‑based e‑mail services, national Internet Service Provider (ISP) e-mail services, and institutional or corporate e-mail addresses. The proportion of authors using free web-based e-mail services, the least secure group type, was highest among biomedical researchers (17.8%) while every e‑mail address collected from the technical journal belonged to the secured institutional e‑mail group type. It seems that all researchers from the technical scientific field and most of the researchers from the economical field value good security practice and use more secure systems for professional communication. High percentage of the biomedical researchers who use insecure e‑mail services may mean that they need to be warned of the possible security disadvantages of those kinds of e‑mail addresses.
A scoping review of traditional food security in Alaska.
Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa
2018-12-01
Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: "traditional foods", "food security", "access", "availability", "utilisation", "Alaska", "Alaska Native" and "indigenous". Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska.
An evaluation of the construct of earned security in adolescents: evidence from an inpatient sample.
Venta, Amanda; Sharp, Carla; Shmueli-Goetz, Yael; Newlin, Elizabeth
2015-01-01
In adult attachment research, a group of individuals who convey secure attachments despite recalling difficult early caregiver relationships has been identified. The term earned security refers to individuals in this group, whereas continuous security refers to individuals who convey secure attachments and describe caring early relationships. Evidence on the validity of earned security in adults is mixed--with one longitudinal study showing that earned secure adults, despite contrary recollections, are actually more likely to have experienced positive caregiving than continuous secure adults. There is currently no evidence of earned security in adolescence, and exploring it in this age group may help shed light on the overall problem of the validity of this construct. Therefore, the broad aim of this study was to examine the construct of earned security in a group of inpatient adolescents. First, the authors aimed to identify a group of adolescents with secure attachments and memories of difficult caregiver relationships (i.e., proposed earned secure group) in a sample of 240 inpatient adolescents. Next, to explore external validity, the authors examined whether this group differed from others with regard to internalizing distress and emotion regulation. Findings indicated that a subset of secure adolescents recall difficult caregiving, as has been noted in adults, and that they differ from others with regard to emotion regulation. Despite this preliminary evidence that earned security can be identified in adolescents, the authors conclude with a discussion of the caveats of applying this construct in adolescents as well as adults.
76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... regulations and restrictions. SUMMARY: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research...
Shelton, Shoshana R; Connor, Kathryn; Uscher-Pines, Lori; Pillemer, Francesca Matthews; Mullikin, James M; Kellermann, Arthur L
2012-12-01
The federal government plays a critical role in achieving national health security by providing strategic guidance and funding research to help prevent, respond to, mitigate, and recover from disasters, epidemics, and acts of terrorism. In this article we describe the first-ever inventory of nonclassified national health security-related research funded by civilian agencies of the federal government. Our analysis revealed that the US government's portfolio of health security research is currently weighted toward bioterrorism and emerging biological threats, laboratory methods, and development of biological countermeasures. Eight of ten other priorities identified in the Department of Health and Human Services' National Health Security Strategy-such as developing and maintaining a national health security workforce or incorporating recovery into planning and response-receive scant attention. We offer recommendations to better align federal spending with health security research priorities, including the creation of an interagency working group charged with minimizing research redundancy and filling persistent gaps in knowledge.
Exploring Factors That Affect Adoption of Computer Security Practices among College Students
ERIC Educational Resources Information Center
Alqarni, Amani
2017-01-01
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
A scoping review of traditional food security in Alaska
Walch, Amanda; Bersamin, Andrea; Loring, Philip; Johnson, Rhonda; Tholl, Melissa
2018-01-01
ABSTRACT Food insecurity is a public health concern. Food security includes the pillars of food access, availability and utilisation. For some indigenous peoples, this may also include traditional foods. To conduct a scoping review on traditional foods and food security in Alaska. Google Scholar and the High North Research Documents were used to search for relevant primary research using the following terms: “traditional foods”, “food security”, “access”, “availability”, “utilisation”, “Alaska”, “Alaska Native” and “indigenous”. Twenty four articles from Google Scholar and four articles from the High North Research Documents were selected. The articles revealed three types of research approaches, those that quantified traditional food intake (n=18), those that quantified food security (n=2), and qualitative articles that addressed at least one pillar of food security (n=8). Limited primary research is available on food security in Alaskan. Few studies directly measure food security while most provide a review of food security factors. Research investigating dietary intake of traditional foods is more prevalent, though many differences exist among participant age groups and geographical areas. Future research should include direct measurements of traditional food intake and food security to provide a more complete picture of traditional food security in Alaska. PMID:29292675
Ma, Bing; Liu, Shanshi; Liu, Donglai; Wang, Hongchun
2016-04-01
This research focuses on investigating whether organisational identification mediates the effects of job security on in-role behaviour and extra-role behaviour and how these mediation mechanisms differ according to gender. Through analysing 212 supervisor-subordinate dyads from a Chinese air transportation group, the research indicated that organisational identification partially mediated the effect of job security on in-role behaviour and fully mediated the effect of job security on extra-role behaviour. A multi-group analysis also showed that there were significant differences between male and female employees in these relationships. In addition, moderated mediation analyses showed that gender moderated the indirect effects of job security on in-role behaviour and extra-role behaviour through organisational identification. Limitations and implications of these findings are discussed. © 2015 International Union of Psychological Science.
Cryptographic Research and NSA: Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
Davida, George I.
1981-01-01
The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)
Analyzing Cases of Resilience Success and Failure - A Research Study
2012-12-01
controls [NIST 2012, NIST 2008] ISO 27002 and ISO 27004 Guidelines for initiating, implementing, maintaining, and improving information security...Commission ( ISO /IEC). Information technology—Security techniques—Code of practice for information security management ( ISO /IEC 27002 :2005). ISO /IEC, 2005...security management system and controls or groups of controls [ ISO /IEC 2005, ISO /IEC 2009] CIS Security Metrics Outcome and practice metrics measuring
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Information-Pooling Bias in Collaborative Security Incident Correlation Analysis.
Rajivan, Prashanth; Cooke, Nancy J
2018-03-01
Incident correlation is a vital step in the cybersecurity threat detection process. This article presents research on the effect of group-level information-pooling bias on collaborative incident correlation analysis in a synthetic task environment. Past research has shown that uneven information distribution biases people to share information that is known to most team members and prevents them from sharing any unique information available with them. The effect of such biases on security team collaborations are largely unknown. Thirty 3-person teams performed two threat detection missions involving information sharing and correlating security incidents. Incidents were predistributed to each person in the team based on the hidden profile paradigm. Participant teams, randomly assigned to three experimental groups, used different collaboration aids during Mission 2. Communication analysis revealed that participant teams were 3 times more likely to discuss security incidents commonly known to the majority. Unaided team collaboration was inefficient in finding associations between security incidents uniquely available to each member of the team. Visualizations that augment perceptual processing and recognition memory were found to mitigate the bias. The data suggest that (a) security analyst teams, when conducting collaborative correlation analysis, could be inefficient in pooling unique information from their peers; (b) employing off-the-shelf collaboration tools in cybersecurity defense environments is inadequate; and (c) collaborative security visualization tools developed considering the human cognitive limitations of security analysts is necessary. Potential applications of this research include development of team training procedures and collaboration tool development for security analysts.
Development and Management of University Research Groups.
ERIC Educational Resources Information Center
Smith, Robert V.
Guidelines for managers of university research groups cover securing resources, personnel, and services and choosing collaborators, as well as organizing, supervising, and controlling research activities. Attention is directed to: orientation of personnel; reporting mechanisms; boosting morale; the needs of different personnel; handling travel,…
Programmable Logic Controllers for Research on the Cyber Security of Industrial Power Plants
2017-02-12
group . 15. SUBJECT TERMS Industrial control systems, cyber security 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF a. REPORT b. ABSTRACT c. THIS...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (00-MM-YYYY) ,2. REPORT TYPE 3. DATES COVERED...From- To) 12/02/2017 Final 15 August 2015 - 12 February 2017 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Programmable Logic Controllers for Research
Framework for behavioral analytics in anomaly identification
NASA Astrophysics Data System (ADS)
Touma, Maroun; Bertino, Elisa; Rivera, Brian; Verma, Dinesh; Calo, Seraphin
2017-05-01
Behavioral Analytics (BA) relies on digital breadcrumbs to build user profiles and create clusters of entities that exhibit a large degree of similarity. The prevailing assumption is that an entity will assimilate the group behavior of the cluster it belongs to. Our understanding of BA and its application in different domains continues to evolve and is a direct result of the growing interest in Machine Learning research. When trying to detect security threats, we use BA techniques to identify anomalies, defined in this paper as deviation from the group behavior. Early research papers in this field reveal a high number of false positives where a security alert is triggered based on deviation from the cluster learned behavior but still within the norm of what the system defines as an acceptable behavior. Further, domain specific security policies tend to be narrow and inadequately represent what an entity can do. Hence, they: a) limit the amount of useful data during the learning phase; and, b) lead to violation of policy during the execution phase. In this paper, we propose a framework for future research on the role of policies and behavior security in a coalition setting with emphasis on anomaly detection and individual's deviation from group activities.
Measuring relational security in forensic mental health services
Chester, Verity; Alexander, Regi T.; Morgan, Wendy
2017-01-01
Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515
Measuring relational security in forensic mental health services.
Chester, Verity; Alexander, Regi T; Morgan, Wendy
2017-12-01
Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.
Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man
2014-01-01
Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.
Integrity and security in an Ada runtime environment
NASA Technical Reports Server (NTRS)
Bown, Rodney L.
1991-01-01
A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.
Hybrid methods for cybersecurity analysis :
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Warren Leon,; Dunlavy, Daniel M.
2014-01-01
Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling andmore » analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.« less
Tallentire, Liz; Smith, Matthew; David, Lee; Roberts, Adam; Bruce; Morrow, Sarah; Withers, Paul; Smith, Ian
2016-08-31
This research is about people who have intellectual disabilities and live in a secure hospital. It is about a group of people who meet at a support group. The support group is for people who are lesbian, gay, bisexual or transgender. These people with intellectual disabilities helped with planning, doing, and telling other people about the research. They told their stories about going to the support group. Their stories were joined together into a group story. The story said that the group helped people in lots of different ways. For some people going to the group was difficult at first because it was ?coming out'. This means telling other people you are lesbian, gay, bisexual, or transgender. Then it got easier and people started to feel better about themselves. Then they wanted to help others and this was important in their lives. This group seemed to help people get better. We have given some ideas for setting up other groups and doing more research. © 2016 John Wiley & Sons Ltd.
Wichmann, Theresia; Buchheim, Anna; Menning, Hans; Schenk, Ingmar; George, Carol; Pokorny, Dan
2016-01-01
In the last few decades, there has been an increase of experimental research on automatic unconscious processes concerning the evaluation of the self and others. Previous research investigated implicit aspects of romantic attachment using self-report measures as explicit instruments for assessing attachment style. There is a lack of experimental procedures feasible for neurobiological settings. We developed a reaction time (RT) experiment using a narrative attachment measure with an implicit nature and were interested to capture automatic processes, when the individuals’ attachment system is activated. We aimed to combine attachment methodology with knowledge from implicit measures by using a decision RT paradigm. This should serve as a means to capture implicit aspects of attachment. This experiment evaluated participants’ response to prototypic attachment sentences in association with their own attachment classification, measured with the Adult Attachment Projective Picture System (AAP). First the AAP was administered as the standardized interview procedure to 30 healthy participants, which were classified into a secure or insecure group. In the following experimental session, both experimenter and participants were blind with respect to classifications. One hundred twenty eight prototypically secure or insecure sentences related to the eight pictures of the AAP were presented to the participants. Their response and RTs were recorded. Based on the response (accept, reject) a continuous security scale was defined. Both the AAP classification and security scale were related to the RTs. Differentiated study hypotheses were confirmed for insecure sentences, which were accepted faster by participants from the insecure attachment group (or with lower security scale), and rejected faster by participants from secure attachment group (or with higher security scale). The elaborating unconscious processes were more activated by insecure sentences with potential attachment conflicts. The introduced paradigm is able to contribute to an experimental approach in attachment research. The RT analysis with the narrative procedure might be of interest for a broader variety of questions in experimental and neurophysiological settings to capture unconscious processes in association with internal working models of attachment. An electrophysiological model based on preliminary research is proposed for assessing the preconscious neuronal network related to secure or insecure attachment representations. PMID:27853426
Preschool Teachers' Views on Schools' Indoor and Outdoor Environment Safety
ERIC Educational Resources Information Center
Konakli, Tugba; Ülçetin, Esra
2016-01-01
The aim of this research is to analyze opinions of teachers who work in preschool education institutions concerning precautions that should be taken for indoor and outdoor security. Study group of this research is determined by criterion sampling from purposeful sampling techniques. The study group of this research is consist of eight preschool…
Marketing Strategy and Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This report documents the preparation of materials for the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. The materials and the marketing campaign build on the research that was previously completed, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP). Previous research included outcome analysis to determine appropriate marketing strategies. The analysis was based upon focus groups with middle school and high school students, studentmore » interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of a marketing campaign divided into DISCO (Discovering Intelligence and Security Career Opportunities) for the middle school age group and DISCO…..Your Way! for high school age groups. Both campaigns have an intertwined message that focuses on the education of students in the various national security career opportunities at NNSA using the STEM concepts and the notion that almost any career they can think of has a fit within NNSA. Further, a special emphasis has been placed on the importance of obtaining a national security clearance when working at NNSA and the steps that will need to be taken during middle school, high school, and college to be allowed this opportunity.« less
NASA Technical Reports Server (NTRS)
Bishop, Matt
1991-01-01
The Network Time Protocol is being used throughout the Internet to provide an accurate time service. The security requirements are examined of such a service, version 2 of the NTP protocol is analyzed to determine how well it meets these requirements, and improvements are suggested where appropriate.
Authentic leadership, group cohesion and group identification in security and emergency teams.
García-Guiu López, Carlos; Molero Alonso, Fernando; Moya Morales, Miguel; Moriano León, Juan Antonio
2015-01-01
Authentic leadership (AL) is a kind of leadership that inspires and promotes positive psychological capacities, underlining the moral and ethical component of behavior. The proposed investigation studies the relations among AL, cohesion, and group identification in security and emergency teams. A cross-sectional research design was conducted in which participated 221 members from 26 fire departments and operative teams from the local police of three Spanish provinces. The following questionnaires were administered: Authentic Leadership (ALQ), Group Cohesion (GEQ), and Mael and Ashford's Group Identification Questionnaire. A direct and positive relation was found between AL, cohesion, and group identification. An indirect relation was also found between AL and group cohesion through group identification, indicating the existence of partial mediation. The utility of the proposed model based on AL is considered; this model can be employed by those in charge of the fire departments and operative groups in organizations to improve workteams' cohesion. Both AL and group identification help to explain group cohesion in organizations committed to security and emergencies.
Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man
2014-01-01
Background Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. Design A qualitative study using group discussions during a workshop. Methods A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions The results of the planning workshop provide a blueprint for future research and intervention projects. PMID:25147772
A comparison of offenders with intellectual disability across three levels of security.
Hogue, Todd; Steptoe, Lesley; Taylor, John L; Lindsay, William R; Mooney, Paul; Pinkney, Lisa; Johnston, Susan; Smith, Anne H W; O'Brien, Gregory
2006-01-01
A number of authors have described, with disparate results, the prevalence of people with intellectual disability and their characteristics, in a range of offender cohorts defined by service use. These have included high security, a range of criminal justice services and community services. There is a need for research comparing cohorts of offenders with intellectual disabilities across different settings. AIM AND HYPOTHESIS: To conduct such a comparison and test the hypothesis that severity of characteristics measured will be highest in highest levels of residential security. A clinical-record-based comparison a offenders with intellectual disability in high security (n = 73), medium/low security (n = 70), and a community service (n = 69). Groups were similar in age and tested IQ levels. Early psychiatric service contact had been more likely in the lower security groups. In line with the hypothesis, more complex presentations, in particular comorbid personality disorder, was more likely in the highest security group. Both fatal and non-fatal interpersonal violence convictions were significantly related to group, with more in the high security group sustaining a conviction both at the index offence and prior to that. Over 50% of all groups had at least one conviction for a sexual offence. A regression model accounting for 78% of the variance was made up largely of disposal variables (Mental Health Act status and probation) and indications of antisocial traits (criminal damage, lifetime conviction for murder and ICD-10 personality disorder classification). The authors show that context of sampling affects most relationships between intellectual disability (ID) and offending when the methods for measuring ID are held constant. The results also present several questions on the relationship between risk, services available in an area and referral to higher security.
Mother-Child Attachment From Infancy to the Preschool Years: Predicting Security and Stability.
Meins, Elizabeth; Bureau, Jean-François; Fernyhough, Charles
2018-05-01
Relations between maternal mind-mindedness (appropriate and nonattuned mind-related comments), children's age-2 perspective-taking abilities, and attachment security at 44 (n = 165) and 51 (n = 128) months were investigated. Nonattuned comments predicted insecure preschool attachment, via insecure 15-month attachment security (44-month attachment) and poorer age-2 perspective-taking abilities (51-month attachment). With regard to attachment stability, higher perspective-taking abilities distinguished the stable secure groups from (a) the stable insecure groups and (b) children who changed from secure to insecure (at trend level). These effects were independent of child gender, stressful life events, and socioeconomic status (SES). The contribution of these findings to our understanding of stability and change in attachment security from infancy to the preschool years is discussed. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.
Digitizing and Securing Archived Laboratory Notebooks
ERIC Educational Resources Information Center
Caporizzo, Marilyn
2008-01-01
The Information Group at Millipore has been successfully using a digital rights management tool to secure the email distribution of archived laboratory notebooks. Millipore is a life science leader providing cutting-edge technologies, tools, and services for bioscience research and biopharmaceutical manufacturing. Consisting of four full-time…
Massot-Cladera, Malen; Pérez-Cano, Francisco; Llorach, Rafael; Urpi-Sarda, Mireia
2017-02-17
The Research Institute on Nutrition and Food Security at the University of Barcelona (INSA-UB) was founded in 2005 by twenty-two research groups from the Faculties of Pharmacy and Food Science; Biology; Chemistry; and Geography and History, as well as other UB-affiliated centers and hospitals [...].
Ross, Sue; Tang, Selphee; Schulz, Jane; Murphy, Magnus; Goncalves, Jose; Kaye, Stephen; Dederer, Lorel; Robert, Magali
2014-12-22
In 2006, Ethicon Inc. introduced a new minimally invasive single incision sling device for the surgical treatment of stress urinary incontinence, the Gynecare TVT Secur®. For device licensing, no new evidence of TVT Secur efficacy and safety was needed: rather evidence was provided of the long-term follow-up of patients who had a procedure using a predecate retropubic tension-free vaginal tape device. Before adopting TVT Secur into our routine clinical practice, we decided to evaluate it. The objective of our Canadian multi-centre pragmatic randomized controlled trial was to compare the effectiveness of the new single-incision device, TVT Secur, to the established TVT device, in terms of objective cure of stress urinary incontinence (SUI) at 12 months postoperatively. Other outcomes included: complications, symptoms, and incontinence-related quality of life. The sample size estimate for our trial was 300, but the trial stopped early because of poor recruitment. 74 women participated (40 allocated to TVT Secur, 34 to TVT). At 12 months postoperatively, 27/33(82%) of TVT Secur group were cured, compared with 25/28(89%) of the TVT group (relative risk 0.92, 95% confidence interval 0.75 to 1.13, p=0.49). Most women reported little or no SUI symptoms (35/37(95%) vs 29/30(97%), >0.999). Quality of life improved significantly from baseline for both groups (IIQ-7 mean change -25 for both groups) but did not differ between groups (p=0.880). Our small randomized trial did not find statistically significant differences in outcomes between women allocated to the TVT Secur device versus those allocated to the TVT device for stress urinary incontinence. Despite the discontinuation of TVT Secur in March 2013 for commercial reasons, the importance of our study lies in making evidence available for the many women who had a TVT Secur device implanted and their physicians who may be considering alternative treatments. Our experience illustrates the difficulty of undertaking research on new licensed devices in a rapidly changing surgical specialty, and further highlights the need for research before licensing if surgeons and their patients are to be confident in the effectiveness and safety of new surgical devices. ClinicalTrials.gov NCT00685217, 22 May 2008.
Mamo, Laura A; Browe, Dennis K; Logan, Holly C; Kim, Katherine K
2013-01-01
Understanding how to govern emerging distributed research networks is essential to their success. Distributed research networks aggregate patient medical data from many institutions leaving data within the local provider security system. While much is known about patients' views on secondary medical research, little is known about their views on governance of research networks. We conducted six focus groups with patients from three medical centers across the U.S. to understand their perspectives on privacy, consent, and ethical concerns of sharing their data as part of research networks. Participants positively endorsed sharing their health data with these networks believing that doing so could advance healthcare knowledge. However, patients expressed several concerns regarding security and broader ethical issues such as commercialism, public benefit, and social responsibility. We suggest that network governance guidelines move beyond strict technical requirements and address wider socio-ethical concerns by fully including patients in governance processes.
Mamo, Laura A.; Browe, Dennis K.; Logan, Holly C.; Kim, Katherine K.
2013-01-01
Understanding how to govern emerging distributed research networks is essential to their success. Distributed research networks aggregate patient medical data from many institutions leaving data within the local provider security system. While much is known about patients’ views on secondary medical research, little is known about their views on governance of research networks. We conducted six focus groups with patients from three medical centers across the U.S. to understand their perspectives on privacy, consent, and ethical concerns of sharing their data as part of research networks. Participants positively endorsed sharing their health data with these networks believing that doing so could advance healthcare knowledge. However, patients expressed several concerns regarding security and broader ethical issues such as commercialism, public benefit, and social responsibility. We suggest that network governance guidelines move beyond strict technical requirements and address wider socio-ethical concerns by fully including patients in governance processes. PMID:24551383
Managing the Security of Nursing Data in the Electronic Health Record
Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud
2015-01-01
Background: The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. Methods: This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts’ opinions and Cronbach’s alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. Results: The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Conclusions: Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research. PMID:25870490
Managing the security of nursing data in the electronic health record.
Samadbeik, Mahnaz; Gorzin, Zahra; Khoshkam, Masomeh; Roudbari, Masoud
2015-02-01
The Electronic Health Record (EHR) is a patient care information resource for clinicians and nursing documentation is an essential part of comprehensive patient care. Ensuring privacy and the security of health information is a key component to building the trust required to realize the potential benefits of electronic health information exchange. This study was aimed to manage nursing data security in the EHR and also discover the viewpoints of hospital information system vendors (computer companies) and hospital information technology specialists about nursing data security. This research is a cross sectional analytic-descriptive study. The study populations were IT experts at the academic hospitals and computer companies of Tehran city in Iran. Data was collected by a self-developed questionnaire whose validity and reliability were confirmed using the experts' opinions and Cronbach's alpha coefficient respectively. Data was analyzed through Spss Version 18 and by descriptive and analytic statistics. The findings of the study revealed that user name and password were the most important methods to authenticate the nurses, with mean percent of 95% and 80%, respectively, and also the most significant level of information security protection were assigned to administrative and logical controls. There was no significant difference between opinions of both groups studied about the levels of information security protection and security requirements (p>0.05). Moreover the access to servers by authorized people, periodic security update, and the application of authentication and authorization were defined as the most basic security requirements from the viewpoint of more than 88 percent of recently-mentioned participants. Computer companies as system designers and hospitals information technology specialists as systems users and stakeholders present many important views about security requirements for EHR systems and nursing electronic documentation systems. Prioritizing of these requirements helps policy makers to decide what to do when planning for EHR implementation. Therefore, to make appropriate security decisions and to achieve the expected level of protection of the electronic nursing information, it is suggested to consider the priorities of both groups of experts about security principles and also discuss the issues seem to be different between two groups of participants in the research.
Informal Assessment in Reading: Group vs. Individual.
ERIC Educational Resources Information Center
Shipman, Dorothy A.; Warncke, Edna W.
A study was conducted to determine whether informal group assessment instruments could be used effectively to provide the same type of reading achievement information as that secured from informal individual instruments. The researchers developed group instruments comparable to individual instruments, including a group reading inventory for grades…
Sharing Data and Analytical Resources Securely in a Biomedical Research Grid Environment
Langella, Stephen; Hastings, Shannon; Oster, Scott; Pan, Tony; Sharma, Ashish; Permar, Justin; Ervin, David; Cambazoglu, B. Barla; Kurc, Tahsin; Saltz, Joel
2008-01-01
Objectives To develop a security infrastructure to support controlled and secure access to data and analytical resources in a biomedical research Grid environment, while facilitating resource sharing among collaborators. Design A Grid security infrastructure, called Grid Authentication and Authorization with Reliably Distributed Services (GAARDS), is developed as a key architecture component of the NCI-funded cancer Biomedical Informatics Grid (caBIG™). The GAARDS is designed to support in a distributed environment 1) efficient provisioning and federation of user identities and credentials; 2) group-based access control support with which resource providers can enforce policies based on community accepted groups and local groups; and 3) management of a trust fabric so that policies can be enforced based on required levels of assurance. Measurements GAARDS is implemented as a suite of Grid services and administrative tools. It provides three core services: Dorian for management and federation of user identities, Grid Trust Service for maintaining and provisioning a federated trust fabric within the Grid environment, and Grid Grouper for enforcing authorization policies based on both local and Grid-level groups. Results The GAARDS infrastructure is available as a stand-alone system and as a component of the caGrid infrastructure. More information about GAARDS can be accessed at http://www.cagrid.org. Conclusions GAARDS provides a comprehensive system to address the security challenges associated with environments in which resources may be located at different sites, requests to access the resources may cross institutional boundaries, and user credentials are created, managed, revoked dynamically in a de-centralized manner. PMID:18308979
Certified Training for Nuclear and Radioactive Source Security Management.
Johnson, Daniel
2017-04-01
Radioactive sources are used by hospitals, research facilities and industry for such purposes as diagnosing and treating illnesses, sterilising equipment and inspecting welds. Unfortunately, many States, regulatory authorities and licensees may not appreciate how people with malevolent intentions could use radioactive sources, and statistics confirm that a number of security incidents happen around the globe. The adversary could be common thieves, activists, insiders, terrorists and organised crime groups. Mitigating this risk requires well trained and competent staff who have developed the knowledge, attributes and skills necessary to successfully discharge their security responsibilities. The International Atomic Energy Agency and the World Institute for Nuclear Security are leading international training efforts. The target audience is a multi-disciplinary group of professionals with management responsibilities for security at facilities with radioactive sources. These efforts to promote training and competence amongst practitioners have been recognised at the 2014 and 2016 Nuclear Security and Nuclear Industry Summits. © The Author 2016. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Harwood, Irene
2006-01-01
In this paper new knowledge generated from theoretical and empirical work in infant observation studies and attachment, trauma, and neurobiology research is integrated and applied to the development of a group for pregnant and new mothers. The purposes of this group were to (1) promote the establishment of a secure base for each baby through optimum self and dyadic affect regulation, the repair of ruptures, and the emergence of positive heightened affective moments; (2) to facilitate secure attachment between mother and infant by helping mothers mentalize the experiences of their babies; (3) to build affiliative bonds between group members and; at the very least, (4) to prevent insecure disorganized attachments. The group interactions also were thought to prevent new psychopathology from developing, as well as to minimize the intergenerational transmission of trauma. A discussion of how this group came out of gestation and birthed itself in a community setting is included.
Shipton, Leah; Lashewicz, Bonnie M
2017-09-01
The purpose of this study was to uncover and understand factors influencing quality of care received by adults with developmental disabilities and/or mental health disorders living in group homes. The present authors conducted a secondary analysis of data from nine focus group discussions with adults with developmental disabilities and/or mental health disorders, and their family and paid caregivers (N = 52). To focus the analysis, the present authors drew on the research literature to craft a model of quality of group home care using concepts of social inclusion and self-determination, and corresponding staff approaches that include active support and person-centred care. Social inclusion and self-determination for adults in group homes are facilitated by staff approaches and manifest in residents being understood and experiencing security and freedom. The present authors offer recommendations for group home resources, training, communication and outcome measures that promote residents' being understood and experiencing security and freedom. © 2016 John Wiley & Sons Ltd.
NASA Astrophysics Data System (ADS)
Retnowati, Daru; Subarjo, A. H.
2018-05-01
Food Security is closely related to agriculture, including fisheries. Food is a basic necessity and indispensable to humans. Nowadays, there are many agricultural lands and fisheries are turning to settlements and offices. To overcome these obstacles, the government took the policy of forming farmer groups. Farmer groups are channeling the government assistance, whether capital, seeds, training, or technology and knowledge assistance. This research is qualitative. The population in this study were members of the fish farming group in Purwomartani, Kalasan, Sleman. The population in this study were 4 Farmers Group in Purwomartani, Kalasan, Sleman. The sample in this research is 1 farmer group with the largest number of members that is 31 people. For the other three groups of fish farmers the number of members is 20 people. The results show that farmer groups are effective in supporting government programs. The role of farmer groups is needed to support the successful management of agricultural land, improvement of knowledge and skills of fish farmers, renewal of agricultural technology and equipment, and marketing of agricultural products.
ERIC Educational Resources Information Center
Kirkbride, Rebecca
2014-01-01
The approach taken by nurture groups emphasises that difficult early experiences can be modified through creating opportunities to develop security and attachment from alternative sources other than parents. Despite previous research indicating the positive impact parental involvement can have on both parents and children, research into parental…
Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek
2015-10-14
Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.
Cryptanalysis of the Quantum Group Signature Protocols
NASA Astrophysics Data System (ADS)
Zhang, Ke-Jia; Sun, Ying; Song, Ting-Ting; Zuo, Hui-Juan
2013-11-01
Recently, the researches of quantum group signature (QGS) have attracted a lot of attentions and some typical protocols have been designed for e-payment system, e-government, e-business, etc. In this paper, we analyze the security of the quantum group signature with the example of two novel protocols. It can be seen that both of them cannot be implemented securely since the arbitrator cannot solve the disputes fairly. In order to show that, some possible attack strategies, which can be used by the malicious participants, are proposed. Moreover, the further discussions of QGS are presented finally, including some insecurity factors and improved ideas.
Twenty Seven Years of Quantum Cryptography!
NASA Astrophysics Data System (ADS)
Hughes, Richard
2011-03-01
One of the fundamental goals of cryptographic research is to minimize the assumptions underlying the protocols that enable secure communications between pairs or groups of users. In 1984, building on earlier research by Stephen Wiesner, Charles Bennett and Gilles Brassard showed how quantum physics could be harnessed to provide information-theoretic security for protocols such as the distribution of cryptographic keys, which enables two parties to secure their conventional communications. Bennett and Brassard and colleagues performed a proof-of-principle quantum key distribution (QKD) experiment with single-photon quantum state transmission over a 32-cm air path in 1991. This seminal experiment led other researchers to explore QKD in optical fibers and over line-of-sight outdoor atmospheric paths (``free-space''), resulting in dramatic increases in range, bit rate and security. These advances have been enabled by improvements in sources and single-photon detectors. Also in 1991 Artur Ekert showed how the security of QKD could be related to quantum entanglement. This insight led to a deeper understanding and proof of QKD security with practical sources and detectors in the presence of transmission loss and channel noise. Today, QKD has been implemented over ranges much greater than 100km in both fiber and free-space, multi-node network testbeds have been demonstrated, and satellite-based QKD is under study in several countries. ``Quantum hacking'' researchers have shown the importance of extending security considerations to the classical devices that produce and detect the photon quantum states. New quantum cryptographic protocols such as secure identification have been proposed, and others such as quantum secret splitting have been demonstrated. It is now possible to envision quantum cryptography providing a more secure alternative to present-day cryptographic methods for many secure communications functions. My talk will survey these remarkable developments.
Petersson, Pia; Blomqvist, Kerstin
2011-03-01
The aim of this study was to make sense of the Swedish concept 'trygghet' by using stories from daily life in a Participatory Action Research project. In Sweden, attempts to implement core values to ensure high quality health and social care for older people are given high priority and concepts such as security and dignity are often used. As concepts are abstract they are difficult to transform into practical work. One group of six assistant nurses and one group of five Registered Nurses working in a municipality participated in Story Dialogue Method and four older women were interviewed. 'Trygghet' was found to be an internal sense - an intrinsic state based on faith and trust in oneself and others called Sense of security. External factors that strengthened Sense of security were to be part of a community, to recognize and be familiar with things and situations and to use various kinds of aids. A prerequisite for the professionals being able to support the care receivers adequately is that they have a sense of security themselves, and that they are allowed to operate in a system that facilitates for the care receivers to maintain trustworthy and reliable relations over time. © 2010 Blackwell Publishing Ltd.
The Privacy and Security Implications of Open Data in Healthcare.
Kobayashi, Shinji; Kane, Thomas B; Paton, Chris
2018-04-22
The International Medical Informatics Association (IMIA) Open Source Working Group (OSWG) initiated a group discussion to discuss current privacy and security issues in the open data movement in the healthcare domain from the perspective of the OSWG membership. Working group members independently reviewed the recent academic and grey literature and sampled a number of current large-scale open data projects to inform the working group discussion. This paper presents an overview of open data repositories and a series of short case reports to highlight relevant issues present in the recent literature concerning the adoption of open approaches to sharing healthcare datasets. Important themes that emerged included data standardisation, the inter-connected nature of the open source and open data movements, and how publishing open data can impact on the ethics, security, and privacy of informatics projects. The open data and open source movements in healthcare share many common philosophies and approaches including developing international collaborations across multiple organisations and domains of expertise. Both movements aim to reduce the costs of advancing scientific research and improving healthcare provision for people around the world by adopting open intellectual property licence agreements and codes of practice. Implications of the increased adoption of open data in healthcare include the need to balance the security and privacy challenges of opening data sources with the potential benefits of open data for improving research and healthcare delivery. Georg Thieme Verlag KG Stuttgart.
Privacy-enhanced electronic mail
NASA Astrophysics Data System (ADS)
Bishop, Matt
1990-06-01
The security of electronic mail sent through the Internet may be described in exactly three words: there is none. The Privacy and Security Research Group has recommended implementing mechanisms designed to provide security enhancements. The first set of mechanisms provides a protocol to provide privacy, integrity, and authentication for electronic mail; the second provides a certificate-based key management infrastructure to support key distribution throughout the internet, to support the first set of mechanisms. These mechanisms are described, as well as the reasons behind their selection and how these mechanisms can be used to provide some measure of security in the exchange of electronic mail.
Neller, Daniel J; Vitacco, Michael J; Magaletta, Philip R; Phillips-Boyles, A Brooke
2016-03-01
Research supports the effectiveness of the Risk-Needs-Responsivity model for reducing criminal recidivism. Yet programming interests of inmates--one facet of responsivity--remain an understudied phenomenon. In the present study, we explored the programming interests of 753 federal inmates housed across three levels of security. Results suggest that inmates, as a group, prefer specific programs over others, and that some of their interests may differ by security level. We discuss possible implications of these findings. © The Author(s) 2014.
As Threats of Violence Escalate, Primate Researchers Stand Firm.
ERIC Educational Resources Information Center
Schneider, Alison
1999-01-01
Scientists doing research on primates are increasingly being subjected to threats and acts of violence from animal rights groups. The intimidation has resulted in many laboratories taking extensive security measures. Some scientists claim, however, that there is no surrogate for animal research in understanding human diseases. There are fears that…
Kim, Monica; Woodhouse, Susan S; Dai, Chenchen
2018-05-21
Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.
Foghammar, Ludvig; Jang, Suyoun; Kyzy, Gulzhan Asylbek; Weiss, Nerina; Sullivan, Katherine A; Gibson-Fall, Fawzia; Irwin, Rachel
2016-08-01
Complex security environments are characterized by violence (including, but not limited to "armed conflict" in the legal sense), poverty, environmental disasters and poor governance. Violence directly affecting health service delivery in complex security environments includes attacks on individuals (e.g. doctors, nurses, administrators, security guards, ambulance drivers and translators), obstructions (e.g. ambulances being stopped at checkpoints), discrimination (e.g. staff being pressured to treat one patient instead of another), attacks on and misappropriation of health facilities and property (e.g. vandalism, theft and ambulance theft by armed groups), and the criminalization of health workers. This paper examines the challenges associated with researching the context, scope and nature of violence directly affecting health service delivery in these environments. With a focus on data collection, it considers how these challenges affect researchers' ability to analyze the drivers of violence and impact of violence. This paper presents key findings from two research workshops organized in 2014 and 2015 which convened researchers and practitioners in the fields of health and humanitarian aid delivery and policy, and draws upon an analysis of organizational efforts to address violence affecting healthcare delivery and eleven in-depth interviews with representatives of organizations working in complex security environments. Despite the urgency and impact of violence affecting healthcare delivery, there is an overall lack of research that is of health-specific, publically accessible and comparable, as well as a lack of gender-disaggregated data, data on perpetrator motives and an assessment of the 'knock-on' effects of violence. These gaps limit analysis and, by extension, the ability of organizations operating in complex security environments to effectively manage the security of their staff and facilities and to deliver health services. Increased research collaboration among aid organizations, researchers and multilateral organizations, such as the WHO, is needed to address these challenges. Copyright © 2016 Elsevier Ltd. All rights reserved.
Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2009-01-01
A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.
Marketing Strategy and Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. This marketing campaign builds on the research that was previously conducted, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) / National Nuclear Security Administration (NNSA) grant. Outcome analysis was performed to determine appropriate marketing strategies. The analysis was based upon focus groups with middlemore » school and high school students, student interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of the marketing campaign.« less
Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress
2009-11-10
chlorine disinfection to chloramine disinfection —a change identified by some advocacy groups as being an inherently safer substitution—as being...Congressional Research Service 9 such as chlorine, for purposes such as disinfection .22 Advocates for their inclusion in security regulations cite the...Science and Technology (S& T ) Directorate is engaged in a Chemical Infrastructure Risk Assessment Project that, among other goals, will assess the
Making grandma's data secure: a security architecture for home telemedicine.
Starren, J.; Sengupta, S.; Hripcsak, G.; Ring, G.; Klerer, R.; Shea, S.
2001-01-01
Home telemedicine presents special challenges for data security and privacy. Experience in the Informatics for Diabetes Education And Telemedicine (IDEATel) project has demonstrated that data security is not a one-size-fits-all problem. The IDEATel users include elderly patients in their homes, nurse case managers, physicians, and researchers. The project supports multiple computer systems that require a variety of user interactions, including: data entry, data review, patient education, videoconferencing, and electronic monitoring. To meet these various needs, a number of different of security solutions were utilized, including: UserID/Password, PKI certificates, time-based tokens, IP filtering, VPNs, symmetric and asymmetric encryption schemes, firewalls and dedicated connections. These were combined in different ways to meet the needs of each user groups. PMID:11825267
Facing danger: how do people behave in times of need? The case of adult attachment styles.
Ein-Dor, Tsachi
2014-01-01
Bowlby's (1982) attachment theory has generated an enormous body of research and conceptual elaborations. Although attachment theory and research propose that attachment security provides a person with many adaptive advantages, during all phases of the life cycle, numerous studies indicate that almost half of the human species can be classified as insecurely attached or insecure with respect to attachment. It seems odd that evolution left humans in this vulnerable position, unless there are some advantages to individuals or groups, under at least some conditions, of anxious and avoidant attachment styles. I argue that a social group containing members with different attachment patterns may be more conducive to survival than a homogeneous group of securely attached individuals because each attachment disposition has specific adaptive advantages that promote the survival of the individual and people around him or her when facing threats and perils. In making this argument, I extend the scope of attachment theory and research by considering a broader range of adaptive functions of insecure attachment strategies, and present data to support my argument.
Chandler, Felicity; Dissanayake, Cheryl
2014-07-01
Previous research has investigated caregiver attachment relationships in children with autism during early childhood, with few differences found from matched control groups. However, little is known of this relationship during middle childhood (ages 8-12 years). In this study, the aim was to establish whether there are differences in the security of attachment in children with high-functioning autism compared to typically developing children. A secondary aim was to establish whether caregivers' perceptions of their child's attachment to them accorded with the children's own reports. Twenty-one children with high-functioning autism and 17 typically developing children were administered the Kerns Security Scale and the Inventory of Parent and Peer Attachment-Revised, and caregivers completed the same questionnaires from the viewpoint of their child. There were no differences between the groups in the children's and parents' reports of attachment security. Parents' and children's reports were moderately correlated on the Kerns Security Scale but were not correlated on the Inventory of Parent and Peer Attachment-Revised. The results indicate that levels of attachment security in children with high-functioning autism are not different from those in typically developing children. © The Author(s) 2013.
MPA-11: Materials Synthesis and Integrated Devices; Overview of an Applied Energy Group
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dattelbaum, Andrew Martin
Our mission is to provide innovative and creative chemical synthesis and materials science solutions to solve materials problems across the LANL missions. Our group conducts basic and applied research in areas related to energy security as well as problems relevant to the Weapons Program.
Guedes, Maryse; Santos, António J; Ribeiro, Olívia; Freitas, Miguel; Rubin, Kenneth H; Veríssimo, Manuela
2018-06-01
Peer victimization is one of the most prominent problems during adolescence. Research has distinguished aggressive and non-aggressive victims; however, there are still significant drawbacks in understanding the social and family functioning of these different groups of victimized adolescents. This study aimed to compare social behavior and perceived attachment security to parents of Portuguese adolescents, classified as aggressive victims, non-aggressive victims and non-victims. The sample consisted of 222 adolescents (115 boys, 107 girls) who completed the Kerns Security Scale and the Extended Class Play, to assess perceived attachment security and social behavior, respectively. Controlling for age and sex, aggressive victims and non-aggressive victims differed in anxious withdrawal but shared a similar profile in peer exclusion and prosocial behavior. Only aggressive victims reported lower attachment security to mother and father when compared to non-victims. These findings underline that victimized adolescents constitute a heterogeneous group in terms of their social and family functioning. Copyright © 2018 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
Stakeholders' views on data sharing in multicenter studies.
Mazor, Kathleen M; Richards, Allison; Gallagher, Mia; Arterburn, David E; Raebel, Marsha A; Nowell, W Benjamin; Curtis, Jeffrey R; Paolino, Andrea R; Toh, Sengwee
2017-09-01
To understand stakeholders' views on data sharing in multicenter comparative effectiveness research studies and the value of privacy-protecting methods. Semistructured interviews with five US stakeholder groups. We completed 11 interviews, involving patients (n = 15), researchers (n = 10), Institutional Review Board and regulatory staff (n = 3), multicenter research governance experts (n = 2) and healthcare system leaders (n = 4). Perceptions of the benefits and value of research were the strongest influences toward data sharing; cost and security risks were primary influences against sharing. Privacy-protecting methods that share summary-level data were acknowledged as being appealing, but there were concerns about increased cost and potential loss of research validity. Stakeholders were open to data sharing in multicenter studies that offer value and minimize security risks.
Women and Wasta: The Use of Focus Groups for Understanding Social Capital and Middle Eastern Women
ERIC Educational Resources Information Center
Bailey, Deborah C.
2012-01-01
Social capital is the use of informal networking to secure access to resources and opportunities. Often identified as an asset for offsetting deficiencies in societies, research on the phenomena is limited. This paper describes a qualitative study using focus groups with young adult Emeriti women representing three social-economic groups who were…
Behrens, Kazuko Y; Haltigan, John D; Bahm, Naomi I Gribneau
2016-08-01
This study investigated the intergenerational transmission of attachment, utilizing the Adult Attachment Interview (AAI), the Strange Situation Procedure (SSP), and the Maternal Behavioral Q-Set (MBQS). We revisited fundamental questions in attachment theory and research by examining: (1) the level of intergenerational agreement between maternal attachment representations and infant attachment security, and (2) whether maternal sensitivity serves as an intergenerational mediator between adult and infant attachment security. Significant categorical matches between the AAI and the SSP as well as mean differences for MBQS scores between adult attachment secure-insecure groups were found. Consistent with earlier intergenerational research, maternal sensitivity only partially mediated the AAI-SSP link, indicating the transmission gap remains. Consistent with recent mediation studies, using more contemporary analytical techniques, it was confirmed that maternal sensitivity did mediate the direct pathway between AAI security and SSP security. Thus, the transmission gap appears somewhat different depending on the statistical method used to measure mediation. Post hoc analyses considered mothers' childhood experiences of separation/divorce and this helped make sense of intergenerational mismatches.
Towards a Scalable Group Vehicle-based Security System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carter, Jason M
2016-01-01
In August 2014, the National Highway Traffic Safety Administration (NHTSA) proposed new rulemaking to require V2V communication in light vehicles. To establish trust in the basic safety messages (BSMs) that are exchanged by vehicles to improve driver safety, a vehicle public key infrastructure (VPKI) is required. We outline a system where a group or groups of vehicles manage and generate their own BSM signing keys and authenticating certificates -- a Vehicle-Based Security System (VBSS). Based on our preliminary examination, we assert the mechanisms exist to implement a VBSS that supports V2V communications; however, maintaining uniform trust throughout the system whilemore » protecting individual privacy does require reliance on nascent group signature technology which may require a significant amount of communication overhead for trust maintenance. To better evaluate the VBSS approach, we compare it to the proposed Security Credential Management System (SCMS) in four major areas including bootstrapping, pseudonym provisioning, BSM signing and authentication, and revocation. System scale, driver privacy, and the distribution and dynamics of participants make designing an effective VPKI an interesting and challenging problem; no clear-cut strategy exists to satisfy the security and privacy expectations in a highly efficient way. More work is needed in VPKI research, so the life-saving promise of V2V technology can be achieved.« less
Heinze, Justin; Miller, Alison L.; Zimmerman, Marc A.
2015-01-01
Purpose Forming secure friendship attachments during adolescence are important for mental health; few, however, have specifically examined the ways in which the transitions in attachment during adolescence may influence future mental health outcomes among African-Americans. Method The current study examines how transitions in attachment in adolescence predicted changes in depression symptoms from late adolescents through adulthood in an African-American sample of adolescents. We used growth curve modeling to examine the association between transitions in friendship attachment and changes in depression symptoms in adulthood. Results At age 16, 346 (64.0%) reported secure attachment with 195 (36.0%) reporting either avoidant or resistant attachment. At age 17, 340 (62.9%) reported secure attachment and 201 (37.2%) reported avoidant or resistant attachment. The largest percentage of participants (46.2%) reported stable-secure attachment across the two time points. Results of the growth model indicated that adolescents who reported a stable-secure attachment style had lower levels of depression symptoms during adulthood than those individuals who transitioned from secure-to-insecure, from insecure-to-secure, or were in the stable-insecure group. Interestingly enough, individuals in both of the attachment transition groups had a faster declining rate of depression symptoms over time compared to the two stability groups. Conclusion Data support existing research showing an association between transitions in attachment during adolescence and depression through adulthood. Further these study findings suggest there may be protective features associated with transitioning between attachment styles during adolescence on later depression, compared to African-American’s who remain stable in their attachment style. PMID:26903426
What then do we do about computer security?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Suppona, Roger A.; Mayo, Jackson R.; Davis, Christopher Edward
This report presents the answers that an informal and unfunded group at SNL provided for questions concerning computer security posed by Jim Gosler, Sandia Fellow (00002). The primary purpose of this report is to record our current answers; hopefully those answers will turn out to be answers indeed. The group was formed in November 2010. In November 2010 Jim Gosler, Sandia Fellow, asked several of us several pointed questions about computer security metrics. Never mind that some of the best minds in the field have been trying to crack this nut without success for decades. Jim asked Campbell to leadmore » an informal and unfunded group to answer the questions. With time Jim invited several more Sandians to join in. We met a number of times both with Jim and without him. At Jim's direction we contacted a number of people outside Sandia who Jim thought could help. For example, we interacted with IBM's T.J. Watson Research Center and held a one-day, videoconference workshop with them on the questions.« less
Psychosocial predictors of cannabis use in adolescents at risk.
Hüsler, Gebhard; Plancherel, Bernard; Werlen, Egon
2005-09-01
This research has tested a social disintegration model in conjunction with risk and protection factors that have the power to differentiate relative, weighted interactions among variables in different socially disintegrated groups. The model was tested in a cross-sectional sample of 1082 at-risk youth in Switzerland. Structural equation analyses show significant differences between the social disintegration (low, moderate, high) groups and gender, indicating that the model works differently for groups and for gender. For the highly disintegrated adolescents results clearly show that the risk factors (negative mood, peer network, delinquency) are more important than the protective factors (family relations, secure sense of self). Family relations lose all protective value against negative peer influence, but personal variables, such as secure self, gain protective power.
Research on Damage Models for Continuous Fiber Composites
1988-07-01
r ~.F (~ Mechanics and Materials Center TEXAS A&M UNIVERSITY College Station, Texas RESEARCH ON DAMAGE MODELS FOR CONTINUOUS FIBER COMPOSITES Final...Washington, DC 20332 11. TITLE (Include Security Clas=fication) Research on Damage Models for Continuous Fiber Composites - Final Technical Report 1...GROUP SUB-GROU ::=, COMPOsites ) continuum mechanics , ~ idamage, internal state variables V experimental mechanics, laminated composites o 19. ABSTRACT
The Millennial Generation: Developing Leaders for the Future Security Environment
2011-02-15
Dumbest Generation (Penguin Group, New York, New York: 2009) p 8, 10. 19 National Academy of Sciences, “Generation Y : The Millennials …Ready or Not, Here...St ra te gy R es ea rc h Pr oj ec t THE MILLENNIAL GENERATION: DEVELOPING LEADERS FOR THE FUTURE SECURITY ENVIRONMENT BY COLONEL LANCE...Strategy Research Project 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE The Millennial Generation: Developing Leaders for the Future
Evaluation of anger management groups in a high-security hospital.
Wilson, Claire; Gandolfi, Stacy; Dudley, Alison; Thomas, Brian; Tapp, James; Moore, Estelle
2013-12-01
Anger management programmes for offenders typically aim to improve the management of emotion associated with aggressive and antisocial behaviour. Such programmes have been quite extensively evaluated in prison and probation settings, but there is less published research in forensic mental health settings. This study aimed to evaluate anger management groups in a high-security hospital. Eighty-six patients were referred for a 20-session anger management intervention. Outcomes were self-reported experiences of anger and changes in institutionally documented incidents of aggression. Incident rates were retrospectively reviewed for all group graduates, where data were available, including a comparison group of graduates who acted as their own controls. Group graduates reported sustained reductions in feelings of anger and positive changes in their use of aggression in reaction to provocation. Some reduction in incidents of physical aggression was noted when group completers were compared with non-completers. Incidents of verbal aggression were observed to increase for graduates. There was also a trend towards improvement when treated men were compared with men on the waiting list. Our findings contribute to the growing evidence for anger management groups for aggressive men, although the low-base rate of incidents, typical of such a containing and therapeutic hospital setting, rendered the analysis of behavioural outcomes difficult. Anger management sessions for male forensic psychiatric patients can be effective in reducing incidents of physical aggression in response to provocation. Evaluation of treatments for anger is particularly difficult in secure and protective settings, where the aim is to keep incidents of actual physical aggression to a minimum. Further research of this kind is needed to test the value of self-reported reduction in angry feelings as an indicator of clinically useful progress. Copyright © 2013 John Wiley & Sons, Ltd.
System and method for secure group transactions
Goldsmith, Steven Y [Rochester, MN
2006-04-25
A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.
1999-07-28
Inf Med, 35 (1996). 8. J. P . O’Connor, J. W. Gray, C. McCollum, L. Notargiacomo, in Research Directions in Database Security, T. F. Lunt, Ed...Therefore, in general we favour refusal over lying. 104 There are several directions for further interesting research. We only mention a few of them...of the rules of P . Given two nodes p1 and p2 there is a direct edge from p1 to p2 if and only if predicate p2 occurs positively or negatively in the
Security Assessment Simulation Toolkit (SAST) Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.
2009-11-15
The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSDmore » NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.« less
Developing measures of food and nutrition security within an Australian context.
Archer, Claire; Gallegos, Danielle; McKechnie, Rebecca
2017-10-01
To develop a measure of food and nutrition security for use among an Australian population that measures all pillars of food security and to establish its content validity. The study consisted of two phases. Phase 1 involved focus groups with experts working in the area of food security. Data were assessed using content analysis and results informed the development of a draft tool. Phase 2 consisted of a series of three online surveys using the Delphi technique. Findings from each survey were used to establish content validity and progressively modify the tool until consensus was reached for all items. Australia. Phase 1 focus groups involved twenty-five experts working in the field of food security, who were attending the Dietitians Association of Australia National Conference, 2013. Phase 2 included twenty-five experts working in food security, who were recruited via email. Findings from Phase 1 supported the need for an Australian-specific tool and highlighted the failure of current tools to measure across all pillars of food security. Participants encouraged the inclusion of items to measure barriers to food acquisition and the previous single item to enable comparisons with previous data. Phase 2 findings informed the selection and modification of items for inclusion in the final tool. The results led to the development of a draft tool to measure food and nutrition security, and supported its content validity. Further research is needed to validate the tool among the Australian population and to establish inter- and intra-rater reliability.
A DICOM based radiotherapy plan database for research collaboration and reporting
NASA Astrophysics Data System (ADS)
Westberg, J.; Krogh, S.; Brink, C.; Vogelius, I. R.
2014-03-01
Purpose: To create a central radiotherapy (RT) plan database for dose analysis and reporting, capable of calculating and presenting statistics on user defined patient groups. The goal is to facilitate multi-center research studies with easy and secure access to RT plans and statistics on protocol compliance. Methods: RT institutions are able to send data to the central database using DICOM communications on a secure computer network. The central system is composed of a number of DICOM servers, an SQL database and in-house developed software services to process the incoming data. A web site within the secure network allows the user to manage their submitted data. Results: The RT plan database has been developed in Microsoft .NET and users are able to send DICOM data between RT centers in Denmark. Dose-volume histogram (DVH) calculations performed by the system are comparable to those of conventional RT software. A permission system was implemented to ensure access control and easy, yet secure, data sharing across centers. The reports contain DVH statistics for structures in user defined patient groups. The system currently contains over 2200 patients in 14 collaborations. Conclusions: A central RT plan repository for use in multi-center trials and quality assurance was created. The system provides an attractive alternative to dummy runs by enabling continuous monitoring of protocol conformity and plan metrics in a trial.
Security and Policy for Group Collaboration
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ian Foster; Carl Kesselman
2006-07-31
“Security and Policy for Group Collaboration” was a Collaboratory Middleware research project aimed at providing the fundamental security and policy infrastructure required to support the creation and operation of distributed, computationally enabled collaborations. The project developed infrastructure that exploits innovative new techniques to address challenging issues of scale, dynamics, distribution, and role. To reduce greatly the cost of adding new members to a collaboration, we developed and evaluated new techniques for creating and managing credentials based on public key certificates, including support for online certificate generation, online certificate repositories, and support for multiple certificate authorities. To facilitate the integration ofmore » new resources into a collaboration, we improved significantly the integration of local security environments. To make it easy to create and change the role and associated privileges of both resources and participants of collaboration, we developed community wide authorization services that provide distributed, scalable means for specifying policy. These services make it possible for the delegation of capability from the community to a specific user, class of user or resource. Finally, we instantiated our research results into a framework that makes it useable to a wide range of collaborative tools. The resulting mechanisms and software have been widely adopted within DOE projects and in many other scientific projects. The widespread adoption of our Globus Toolkit technology has provided, and continues to provide, a natural dissemination and technology transfer vehicle for our results.« less
Dialogue Systems and Dialogue Management
2016-12-01
dialogue management capability within DST Group’s Consensus project . UNCLASSIFIED UNCLASSIFIED Author Deeno Burgan National Security...3.1 Survey Process This research into dialogue management is part of a joint collaboration between DST Group and CSIRO. The project team comprised...
Beam Line and Associated Work: Operational Phase 1985-1987
1988-08-26
WORK UNIT NUMBERS Stanford University Stanford, California 94305 CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE U. S. Army Research Office August... Controlling Office) IS. SECURITY CLASS. (of this report) Office of Naval Research Unclassified 800 N. Quincy Street Arlington, VA 22217-5000 IS... groups actively doing or planning research in connection with Beam Line V: Profs. Lindau/Spicer, Stanford (interfacial chemistry and metallurgy of metal
Construction of Military Intelligence Military Occupational Specialty Taxonomy
1990-11-01
Ji ARI Research Note 91-10 Construction of Military Intelligence Military Occupational Specialty N Taxonomy IFrederick A. Muckler, Sally Seven, and...11. TITLE (Include Security Classification) Construction of Military Intelligence Military Occupational Specialty Taxonomy 12. PERSONAL AUTHOR(S...Continue on reverse if necessary and identify by block number) FIELD GROUP SUB-GROUP Military intelligence Evaluation taxonomy MOS restructuring
Pedagogies of Self-Humanization: Collaborating to Engage Trauma in the Phoenix Players Theatre Group
ERIC Educational Resources Information Center
Fesette, Nick; Levitt, Bruce
2017-01-01
The Phoenix Players Theatre Group was founded by incarcerated theatre artists located in a maximum-security prison with the aim of creating a space where they can be witnessed in order to initiate a process of personal, cultural, and sociopolitical transformation. This article integrates research from trauma theory with theatre and social justice…
Bryant, Richard A; Chan, Iris
2017-10-01
Although priming mental representations of attachment security reduces arousal, research has not examined the effect of attachment on the retrieval of emotionally arousing memories. This study investigated the effect of priming attachment security on the retrieval of emotional memories. Seventy-five participants viewed negative and neutral images, and two days later received either an attachment prime or a control prime immediately prior to free recall of the images. Two days later, participants reported how frequently they experienced intrusions of the negative images. The attachment group had less distress, and reported fewer subsequent intrusions than the control group. Attachment style moderated these effects such that individuals with an avoidant attachment style were not impacted by the attachment prime. These findings suggest that priming attachment security decreases distress during memory reactivation, and this may reduce subsequent intrusive memories. Copyright © 2017 Elsevier Inc. All rights reserved.
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.
2015-01-01
NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.
1986-07-01
0sl.oApos - 943- 3’% ENVIRONMENTAL IMPACT RESEARCH PROGRAM 2 w T[CHNICAL HFPOfz1 EL P36 36 COMMON CHOKECHERRY (Prunus virginiana ) Section 7.5.4...ACCESSION NO Washington, DC 20314-1000 EIRP 31631 11 TITLE (Include Security Classification) Common Chokecherry (Prunus virginiana ): Section 7.5.4, US...Continue on reverse if necessary and identify by block number) FIELD GROUP SUB-GROUP Chokecherry Prunus virginiana Rosaceae Plant materials Habitat
Multiple attachments and group psychotherapy: implications for college counseling centers.
Marmarosh, Cheri L
2009-10-01
A large body of literature has supported the application of attachment theory to the understanding of college student development and the process of individual psychotherapy. Despite group treatment being one of the major methods of intervention in college counseling centers, there has been very little research guided by attachment theory that has been applied to the area of group psychotherapy. Many current assessment instruments used in college counseling centers can be supported with attachment theory, and many group therapy interventions are aimed at facilitating secure working models of self, other, and groups. This paper explores the importance of personal and group attachments in group psychotherapy and specifically addresses implications for clinical training and research in university counseling centers.
Lardeau, M-P; Healey, G; Ford, J
2011-01-01
Food insecurity is a chronic problem affecting Inuit communities. The most comprehensive assessment of Inuit food security to-date, the Inuit Health Survey, reported that 70% of Inuit pre-school children lived in 'food insecure' households. Food banks and soup kitchens are relatively new in the Arctic but the number of users is increasing. Little is known about the experience and determinants of food insecurity among food program users who are often among the most marginalized (socially and economically) in communities. The use of participatory research methods when working in the north of Canada can promote meaningful knowledge exchange with community members and this approach was used in the present 'Photovoice' research. Photovoice uses photography to develop a baseline understanding of an issue, in this case the experience and determinants of food insecurity among users of community food programs in Iqaluit, Nunavut. The target population includes those who face significant social and economic marginalization, an often neglected group in Arctic food systems research. Eight regular users of food programs were recruited and engaged in a Photovoice research project to document factors determining their daily food consumption. The research method was introduced in workshops and discussion included the ethical concerns related to photography and how to take pictures. Participants were supplied with digital cameras, and asked to answer the following question using photography: 'What aspects of your everyday life affect what you eat and how much you have to eat?'. In the final workshop, photographs were discussed among the group and participants identified key themes in the photographs, offering an understanding of food insecurity from their perspectives. The group then discussed what should be done with the knowledge gained. Factors improving food security were the customary systems for sharing 'country food', and the presence of social support networks in the community, such as the Food Bank, the Soup Kitchen and the Tukisigiarvik Center. Factors identified as negatively affecting food security were the high cost of food in the Arctic, and substance abuse. The participants decided by consensus whether and how the knowledge from this project would be disseminated. They decided that a museum exhibit of the photographs in the summer of 2010 and promotion of the results among policy-makers in Nunavut were of high priority. The use of participatory research approaches such as Photovoice offers promise for exploring food security issues among similarly disadvantaged and vulnerable populations elsewhere in the Arctic. This approach was found to be a useful method for gathering and sharing research data because the data was generated and analysed by the participants. The clear and concise messages developed by the participants can be used to inform policy. This research method can assist in making a valuable contribution to health research, both in the Arctic and worldwide, because it promotes an understanding of the experiences of individuals from their own perspective.
Impacts of marine protected areas on fishing communities.
Mascia, Michael B; Claus, C Anne; Naidoo, Robin
2010-10-01
Marine protected areas (MPAs) are a popular conservation strategy, but their impacts on human welfare are poorly understood. To inform future research and policy decisions, we reviewed the scientific literature to assess MPA impacts on five indicators of human welfare: food security, resource rights, employment, community organization, and income. Following MPA establishment, food security generally remained stable or increased in older and smaller MPAs. The ability of most fishing groups to govern MPA resources changed. Increased resource rights were positively correlated with MPA zoning and compliance with MPA regulations. Small sample sizes precluded statistical tests of the impacts of MPAs on employment, community organization, and income. Our results demonstrate that MPAs shape the social well-being and political power of fishing communities; impacts (positive and negative) vary within and among social groups; and social impacts are correlated with some--but not all--commonly hypothesized explanatory factors. Accordingly, MPAs may represent a viable strategy for enhancing food security and empowering local communities, but current practices negatively affect at least a minority of fishers. To inform policy making, further research must better document and explain variation in the positive and negative social impacts of MPAs. © 2010 Society for Conservation Biology.
Zachary D. Barker: Final DHS HS-STEM Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barker, Z D
Working at Lawrence Livermore National Laboratory (LLNL) this summer has provided a very unique and special experience for me. I feel that the research opportunities given to me have allowed me to significantly benefit my research group, the laboratory, the Department of Homeland Security, and the Department of Energy. The researchers in the Single Particle Aerosol Mass Spectrometry (SPAMS) group were very welcoming and clearly wanted me to get the most out of my time in Livermore. I feel that my research partner, Veena Venkatachalam of MIT, and I have been extremely productive in meeting our research goals throughout thismore » summer, and have learned much about working in research at a national laboratory such as Lawrence Livermore. I have learned much about the technical aspects of research while working at LLNL, however I have also gained important experience and insight into how research groups at national laboratories function. I believe that this internship has given me valuable knowledge and experience which will certainly help my transition to graduate study and a career in engineering. My work with Veena Venkatachalam in the SPAMS group this summer has focused on two major projects. Initially, we were tasked with an analysis of data collected by the group this past spring in a large public environment. The SPAMS instrument was deployed for over two months, collecting information on many of the ambient air particles circulating through the area. Our analysis of the particle data collected during this deployment concerned several aspects, including finding groups, or clusters, of particles that seemed to appear more during certain times of day, analyzing the mass spectral data of clusters and comparing them with mass spectral data of known substances, and comparing the real-time detection capability of the SPAMS instrument with that of a commercially available biological detection instrument. This analysis was performed in support of a group report to the Department of Homeland Security on the results of the deployment. The analysis of the deployment data revealed some interesting applications of the SPAMS instrument to homeland security situations. Using software developed in-house by SPAMS group member Dr. Paul Steele, Veena and I were able to cluster a subset of data over a certain timeframe (ranging from a single hour to an entire week). The software used makes clusters based on the mass spectral characteristics of the each particle in the data set, as well as other parameters. By looking more closely at the characteristics of individual clusters, including the mass spectra, conclusions could be made about what these particles are. This was achieved partially through examination and discussion of the mass spectral data with the members of the SPAMS group, as well as through comparison with known mass spectra collected from substances tested in the laboratory. In many cases, broad conclusions could be drawn about the identity of a cluster of particles.« less
Building Secure Attachments for Primary School Children: A Mixed Methods Study
ERIC Educational Resources Information Center
Ubha, Neerose; Cahill, Sharon
2014-01-01
Despite the wide implications of attachment theory there remains a lack of research exploring interventions which encapsulate the principles of an attachment-based framework in the school context. The aim of this research was to address this gap by implementing an intervention for a group of five primary-aged pupils with identified insecure…
Disparities, Decent Work, and Multidisciplinary Research: Expanded Roles for CD and HRD
ERIC Educational Resources Information Center
Hite, Linda M.; McDonald, Kimberly S.
2018-01-01
This article focuses on how HRD research can better address some of the barriers to inclusive career development and secure employment. Beginning with the concept of decent work, we suggest expanding the scope of studies on workplace inequities, encouraging HRD to push further into disparities facing under-represented identity groups and including…
Security Management and Safeguards Office
NASA Technical Reports Server (NTRS)
Bewley, Nathaniel M.
2004-01-01
The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are in a safe environment.
Does political ideology moderate stress: the special case of soldiers conducting forced evacuation.
Shechner, Tomer; Slone, Michelle; Bialik, Gadi
2007-04-01
This study examined the moderating role of political ideology on psychological outcomes for Israeli soldiers participating in the forced evacuation of Jewish settlements from Gaza. Change in psychopathology and well-being was assessed for 3 concurrent mission groups differing in their political ideological contentiousness--forced evacuation, Gaza security, and Northern border security. After soldiers in each mission group were classified on the basis of relatively left- or right-wing political ideological tendencies, the authors examined differential impact of each mission on soldiers of differing political ideology. Results confirmed strong moderation effects of political ideology on psychological outcomes in these extreme contexts. Implications for research, prevention, and treatment are discussed. 2007 APA, all rights reserved
Transforming the Security Classification System
2012-11-01
report, the Board heard from the following individuals and groups: • Steve Aftergood, Senior Research Analyst, Project on Government Secrecy...National Intelligence, ODNI H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H H 36 | PUBLIC INTEREST DECLASSIFICATION B OARD • Steve Henry...Deputy Associate Director for Community Integration, Policy and Records, NSA • Vincent Jarvie , Vice President for Corporate Security, L3
Research on fully distributed optical fiber sensing security system localization algorithm
NASA Astrophysics Data System (ADS)
Wu, Xu; Hou, Jiacheng; Liu, Kun; Liu, Tiegen
2013-12-01
A new fully distributed optical fiber sensing and location technology based on the Mach-Zehnder interferometers is studied. In this security system, a new climbing point locating algorithm based on short-time average zero-crossing rate is presented. By calculating the zero-crossing rates of the multiple grouped data separately, it not only utilizes the advantages of the frequency analysis method to determine the most effective data group more accurately, but also meets the requirement of the real-time monitoring system. Supplemented with short-term energy calculation group signal, the most effective data group can be quickly picked out. Finally, the accurate location of the climbing point can be effectively achieved through the cross-correlation localization algorithm. The experimental results show that the proposed algorithm can realize the accurate location of the climbing point and meanwhile the outside interference noise of the non-climbing behavior can be effectively filtered out.
Secure Obfuscation for Encrypted Group Signatures
Fan, Hongfei; Liu, Qin
2015-01-01
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of) the group signature generation algorithm is running in a platform that is perfectly protected from various intrusions and attacks. As a complementary to existing studies, how to generate group signatures securely in a more austere security context, such as a white-box attack context, is studied in this paper. We use obfuscation as an approach to acquire a higher level of security. Concretely, we introduce a special group signature functionality-an encrypted group signature, and then provide an obfuscator for the proposed functionality. A series of new security notions for both the functionality and its obfuscator has been introduced. The most important one is the average-case secure virtual black-box property w.r.t. dependent oracles and restricted dependent oracles which captures the requirement of protecting the output of the proposed obfuscator against collision attacks from group members. The security notions fit for many other specialized obfuscators, such as obfuscators for identity-based signatures, threshold signatures and key-insulated signatures. Finally, the correctness and security of the proposed obfuscator have been proven. Thereby, the obfuscated encrypted group signature functionality can be applied to variants of privacy-preserving security schemes and enhance the security level of these schemes. PMID:26167686
Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue
2016-01-01
Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.
Digital Refractometry of Piezoelectric Crystalline Media
1988-11-01
Research and Development Technical Report SLCET-TR-87-0727-1 III DIGITAL REFRACTOMETRY OF PIEZOELECTRIC CRYSTALLINE MEDIA CD Dr. Edward Collett...1L 1 DA313485 11. TITLE (include Security Classification) DIGITAL REFRACTOMETRY OF PIEZOELECTRIC CRYSTALLINE MEDIA (U) 12. PERSONAL AUTHOR(S) Dr...GROUP SUB-GROUP Lasers; quartz; dielectrics; permittivity; refractometry 9 U-1optics; millimeter waves; microwaves; crystals. ,. ABSTRACT (Continue on
Big Data in the Campus Landscape: Security and Privacy. ECAR Working Group Paper
ERIC Educational Resources Information Center
Barnett, William; Corn, Mike; Hillegas, Curt; Wada, Kent
2015-01-01
This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…
Lawlis, Tanya; Islam, Wasima; Upton, Penney
2018-04-01
Food security is defined by four dimensions: food availability, access, utilisation and stability. Resettled refugees face unique struggles securing these dimensions and, thus, food security when moving to a new country. This systematic review aimed to identify the challenges Australian refugees experience in achieving the four dimensions of food security. The Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines were followed; the SPIDER tool was used to determine eligibility criteria. Three databases were searched using terms relating to food in/security and refugees from 2000 to 20 May 2017. Seven articles were retained for analysis. Studies were categorised against the four dimensions, with four studies identifying challenges against all dimensions. Challenges contributing to high levels of food insecurity in each dimension included: availability and cost of traditional foods, difficulty in accessing preferred food outlets, limited food knowledge and preparation skills and food stability due to low income and social support. Food insecurity adversely impacts refugee health and integration. Methodical research framed by the four dimensions of food security is imperative to address challenges to securing food security in refugee groups and assisting in the development of sustainable interventions. © 2017 Dietitians Association of Australia.
Stability and Change of Adolescents' Aggressive Behavior in Residential Youth Care.
Eltink, E M A; Ten Hoeve, J; De Jongh, T; Van der Helm, G H P; Wissink, I B; Stams, G J J M
2018-01-01
Aggression in residential youth care institutions is a frequent problem. The present short-term longitudinal study examined individual and institutional predictors of aggression in a group of 198 adolescents placed in open, semi-secure and secure residential institutions from the perspective of the importation and deprivation model. A total of 198 adolescents in residential youth care filled in questionnaires regarding group climate and aggression with a 3 month interval. Hierarchical multiple regression analyses were performed to test the degree to which individual and contextual factors predict aggression. Very limited support was found for the effect of contextual factors; only repression showed a trend, predicting direct aggression, while gender composition of the living groups yielded a small effect. Girls placed in same-gender groups showed lower levels of indirect (relational) aggression compared to adolescents placed in mixed-gender or boys-only groups, even when controlled for gender and initial levels of aggression. Type of institution (i.e., level of security) did not predict differences in aggression. In particular individual characteristics of the adolescents were associated with later aggression, including initial levels of aggression, showing substantial 3 months stability, age and gender of the adolescents. These findings are in line with research showing that aggression is relatively stable. Very limited support for environmental effects was found.
Impartial institutions, pathogen stress and the expanding social network.
Hruschka, Daniel; Efferson, Charles; Jiang, Ting; Falletta-Cowden, Ashlan; Sigurdsson, Sveinn; McNamara, Rita; Sands, Madeline; Munira, Shirajum; Slingerland, Edward; Henrich, Joseph
2014-12-01
Anthropologists have documented substantial cross-society variation in people's willingness to treat strangers with impartial, universal norms versus favoring members of their local community. Researchers have proposed several adaptive accounts for these differences. One variant of the pathogen stress hypothesis predicts that people will be more likely to favor local in-group members when they are under greater infectious disease threat. The material security hypothesis instead proposes that institutions that permit people to meet their basic needs through impartial interactions with strangers reinforce a tendency toward impartiality, whereas people lacking such institutions must rely on local community members to meet their basic needs. Some studies have examined these hypotheses using self-reported preferences, but not with behavioral measures. We conducted behavioral experiments in eight diverse societies that measure individuals' willingness to favor in-group members by ignoring an impartial rule. Consistent with the material security hypothesis, members of societies enjoying better-quality government services and food security show a stronger preference for following an impartial rule over investing in their local in-group. Our data show no support for the pathogen stress hypothesis as applied to favoring in-groups and instead suggest that favoring in-group members more closely reflects a general adaptive fit with social institutions that have arisen in each society.
United States Air Force Security Forces in an Era of Terrorist Threats
1999-06-01
their primary duties. The third alternative is to eliminate the Palace Tenure deployments of security personnel and replace them with dedicated units...The Phoenix Raven program, the 820th Security Forces Group, and Palace Tenure commitments. The specified mission varies by organization, but the...820th Security Forces Group. January 1999, slide 4. 166 Statement of LT. Col. Larry A. Buckingham , 820th Security Forces Group Commander, “820th Security
Truszczyński, M J
1998-08-01
Veterinary laboratories which deal with infectious diseases form three groups according to the tasks for which they are responsible. The first group includes central or national veterinary laboratories, national or international reference laboratories, high-security laboratories, district regional or state veterinary diagnostic laboratories. The major role of these laboratories is to assist national Veterinary Services in diagnosing infectious animal diseases. The second group comprises laboratories that produce veterinary diagnostic kits and those that produce veterinary vaccines. The third group is composed of veterinary research laboratories, which generally concentrate on basic research and do not contribute directly to the diagnosis and control of infectious animal diseases. The author describes the objectives of each of the three groups of laboratories.
Supplemental nutrition assistance program participation and child food security.
Mabli, James; Worthington, Julie
2014-04-01
This article investigates the association between Supplemental Nutrition Assistance Program (SNAP) participation and child food security by using data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 3000 households with children and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 months. Next, by using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 months later. Multivariate logistic regression analysis was used to estimate associations between SNAP and child food security. SNAP participation was associated with an approximately one-third decrease in the odds of children being food insecure in both samples. In the cross-sectional analysis only, SNAP was also associated with a decrease in the odds of children experiencing severe food insecurity (designated very low food security). Findings were qualitatively robust to different empirical specifications. After controlling for other possible confounders, we found children in households that had participated in SNAP for 6 months experienced improvements in food security. On the basis of these findings, we conclude SNAP serves a vital role in improving the health and well-being of low-income children by increasing food security. Future research is needed to determine whether specific groups of children experience differential improvements in food security.
Agent of opportunity risk mitigation: people, engineering, and security efficacy.
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
2010-12-01
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.
A CLOSED-LOOP BIODIESEL PRODUCTION AND RESEARCH FACILITY IN KEENE, NH
The main objectives during Phase I were to continue a Biodiesel Working Group, formalize the organizational structure of the Monadnock Biodiesel Collaborative, identify a possible facility location, secure funding, provide novel curriculum for Keene State College students, and...
Personnel Security Research - Prescreening and Background Investigations
1986-06-01
military unit, base, station, ship, or aircraft nf a controlled substance with the intent to distribute. Hallucinogens/ Psychedelics . A group of...and psychedelic amphetamine variants (STP, MDA). Although a unique drug, for purposes of this certificate phencyclidine (PCP) will be labeled in this
Improving Mobile Infrastructure for Pervasive Personal Computing
2007-11-01
fulfillment of the requirements for the degree of Master of Science. Copyright c© 2007 Ajay Surie This research was supported by the National Science Foundation...NSF) under grant number CNS-0509004 and by the Army Research Office (ARO) through grant number DAAD19-02-1-0389 (“Perpetually Available and Secure...efforts my final project could not have been successful. Working with the members of my research group, Niraj Tolia, Benjamin Gilbert, Jan Harkes, Adam
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.
2015-01-01
NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.
Analysis of Vehicle-Based Security Operations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carter, Jason M; Paul, Nate R
Vehicle-to-vehicle (V2V) communications promises to increase roadway safety by providing each vehicle with 360 degree situational awareness of other vehicles in proximity, and by complementing onboard sensors such as radar or camera in detecting imminent crash scenarios. In the United States, approximately three hundred million automobiles could participate in a fully deployed V2V system if Dedicated Short-Range Communication (DSRC) device use becomes mandatory. The system s reliance on continuous communication, however, provides a potential means for unscrupulous persons to transmit false data in an attempt to cause crashes, create traffic congestion, or simply render the system useless. V2V communications mustmore » be highly scalable while retaining robust security and privacy preserving features to meet the intra-vehicle and vehicle-to-infrastructure communication requirements for a growing vehicle population. Oakridge National Research Laboratory is investigating a Vehicle-Based Security System (VBSS) to provide security and privacy for a fully deployed V2V and V2I system. In the VBSS an On-board Unit (OBU) generates short-term certificates and signs Basic Safety Messages (BSM) to preserve privacy and enhance security. This work outlines a potential VBSS structure and its operational concepts; it examines how a vehicle-based system might feasibly provide security and privacy, highlights remaining challenges, and explores potential mitigations to address those challenges. Certificate management alternatives that attempt to meet V2V security and privacy requirements have been examined previously by the research community including privacy-preserving group certificates, shared certificates, and functional encryption. Due to real-world operational constraints, adopting one of these approaches for VBSS V2V communication is difficult. Timely misbehavior detection and revocation are still open problems for any V2V system. We explore the alternative approaches that may be applicable to a VBSS, and suggest some additional research directions in order to find a practical solution that appropriately addresses security and privacy.« less
2014-05-28
SECURITY CLASSIFICATION OF: Antimicrobial peptides or their synthetic mimics are a promising class of potential new antibiotics. Herein we assess the...effect of the type of cationic side chain (i.e., guanidino vs. amino groups) on the membrane perturbing mechanism of antimicrobial ?- peptide ...P.O. Box 12211 Research Triangle Park, NC 27709-2211 Antimicrobial peptidomimetics; Peptide –peptoid chimeras; Guanidinium cation; Bacterial
Research in Energetic Compounds.
1980-03-01
SECURITY CLASSIFICATION OF THIS PAGE(When Data Entered) ,2 ABSTRACT (cont’d.) chloroperbenzoic acid gave 3-nitrooxetane. Fluoronitromalonate esters were...tetrahydropyranyl ethers. Base hydrolysis of the ester groups followed by acid hydrolysis of the tetrahydropyranyl groups gave 2-fluo- ro-2-nitroethanol...of 3-allyloxyoxetane.3 Treatment of allyl alcohol with 0.25 equivalunt of t-butyl h-pochlorite and a catalytic amount of p-toluenesulfonic acid was
Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying
2017-01-01
Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants’ reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual’s processing of positive emotional faces; for instance, the presentation of the partner’s name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety. PMID:28473796
Tang, Qingting; Chen, Xu; Hu, Jia; Liu, Ying
2017-01-01
Our study explored how priming with a secure base schema affects the processing of emotional facial stimuli in individuals with attachment anxiety. We enrolled 42 undergraduate students between 18 and 27 years of age, and divided them into two groups: attachment anxiety and attachment secure. All participants were primed under two conditions, the secure priming using references to the partner, and neutral priming using neutral references. We performed repeated attachment security priming combined with a dual-task paradigm and functional magnetic resonance imaging. Participants' reaction times in terms of responding to the facial stimuli were also measured. Attachment security priming can facilitate an individual's processing of positive emotional faces; for instance, the presentation of the partner's name was associated with stronger activities in a wide range of brain regions and faster reaction times for positive facial expressions in the subjects. The current finding of higher activity in the left-hemisphere regions for secure priming rather than neutral priming is consistent with the prediction that attachment security priming triggers the spread of the activation of a positive emotional state. However, the difference in brain activity during processing of both, positive and negative emotional facial stimuli between the two priming conditions appeared in the attachment anxiety group alone. This study indicates that the effect of attachment secure priming on the processing of emotional facial stimuli could be mediated by chronic attachment anxiety. In addition, it highlights the association between higher-order processes of the attachment system (secure attachment schema priming) and early-stage information processing system (attention), given the increased attention toward the effects of secure base schema on the processing of emotion- and attachment-related information among the insecure population. Thus, the following study has applications in providing directions for clinical treatment of mood disorders in attachment anxiety.
CTC Sentinel. Volume 10, Issue 2. February 2017
2017-02-01
Author research. n Jabhat Ansar al-Din was initially formed as a jihadi coalition in July 2014 constituting four groups : Jaysh al-Muhajireen wa al...security. Aymenn al-Tamimi looks at the implications of the recent realignment of rebel and jihadi groups in Syria, which created two potentially...conflicting power centers revolving around an enlarged Ah- rar al-Sham and Hay’at Tahrir al-Sham, a new al-Qa`ida-aligned umbrella grouping . Robin Simcox finds
Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan
2013-02-01
The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p < 0.0001). The TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.
Modeling of Mutual Anion-Cation Neutralization Processes
2011-07-01
Chemical Kinetics, Plasma Chemistry 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT SAR 18, NUMBER OF PAGES 9 19a. NAME OF...understanding of elementary processes in plasma chemistry , conducted jointly with the research group of Dr. A. A. Viggiano at the AFRL and supported by
Simulating human behavior for national security human interactions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bernard, Michael Lewis; Hart, Dereck H.; Verzi, Stephen J.
2007-01-01
This 3-year research and development effort focused on what we believe is a significant technical gap in existing modeling and simulation capabilities: the representation of plausible human cognition and behaviors within a dynamic, simulated environment. Specifically, the intent of the ''Simulating Human Behavior for National Security Human Interactions'' project was to demonstrate initial simulated human modeling capability that realistically represents intra- and inter-group interaction behaviors between simulated humans and human-controlled avatars as they respond to their environment. Significant process was made towards simulating human behaviors through the development of a framework that produces realistic characteristics and movement. The simulated humansmore » were created from models designed to be psychologically plausible by being based on robust psychological research and theory. Progress was also made towards enhancing Sandia National Laboratories existing cognitive models to support culturally plausible behaviors that are important in representing group interactions. These models were implemented in the modular, interoperable, and commercially supported Umbra{reg_sign} simulation framework.« less
Balancing Scientific Publication and National Security Concerns: Issues for Congress
2003-01-10
because of its potential relevance to biological weapons of mass destruction. Whether the current method of only using classification to limit the...terrorist groups in developing weapons of mass destruction. In 2000, researchers at the Co-operative Research Centre for the Biological Control of Pest...development of chemical, biological , or nuclear weapons is not made accessible to terrorists or countries of proliferation concern. The resolution
Sandia National Laboratories: National Security Missions: Defense Systems
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Air Force Officers Visit Aircraft Engine Research Laboratory
1945-08-21
A group of 60 Army Air Forces officers visited the National Advisory Committee for Aeronautics (NACA) Aircraft Engine Research Laboratory on August 27, 1945. The laboratory enacted strict security regulations throughout World War II. During the final months of the war, however, the NACA began opening its doors to groups of writers, servicemen, and aviation industry leaders. These events were the first exposure of the new engine laboratory to the outside world. Grandstands were built alongside the Altitude Wind Tunnel specifically for group photographs. George Lewis, Raymond Sharp, and Addison Rothrock (right to left) addressed this group of officers in the Administration Building auditorium. Lewis was the NACA’s Director of Aeronautical Research, Sharp was the lab’s manager, and Rothrock was the lab’s chief of research. Abe Silverstein, Jesse Hall and others watch from the rear of the room. The group toured several facilities after the talks, including the Altitude Wind Tunnel and a new small supersonic wind tunnel. The visit concluded with a NACA versus Army baseball game and cookout.
2012-05-04
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17
The AIST Managed Cloud Environment
NASA Astrophysics Data System (ADS)
Cook, S.
2016-12-01
ESTO is currently in the process of developing and implementing the AIST Managed Cloud Environment (AMCE) to offer cloud computing services to ESTO-funded PIs to conduct their project research. AIST will provide projects access to a cloud computing framework that incorporates NASA security, technical, and financial standards, on which project can freely store, run, and process data. Currently, many projects led by research groups outside of NASA do not have the awareness of requirements or the resources to implement NASA standards into their research, which limits the likelihood of infusing the work into NASA applications. Offering this environment to PIs will allow them to conduct their project research using the many benefits of cloud computing. In addition to the well-known cost and time savings that it allows, it also provides scalability and flexibility. The AMCE will facilitate infusion and end user access by ensuring standardization and security. This approach will ultimately benefit ESTO, the science community, and the research, allowing the technology developments to have quicker and broader applications.
The AMCE (AIST Managed Cloud Environment)
NASA Astrophysics Data System (ADS)
Cook, S.
2017-12-01
ESTO has developed and implemented the AIST Managed Cloud Environment (AMCE) to offer cloud computing services to SMD-funded PIs to conduct their project research. AIST will provide projects access to a cloud computing framework that incorporates NASA security, technical, and financial standards, on which project can freely store, run, and process data. Currently, many projects led by research groups outside of NASA do not have the awareness of requirements or the resources to implement NASA standards into their research, which limits the likelihood of infusing the work into NASA applications. Offering this environment to PIs allows them to conduct their project research using the many benefits of cloud computing. In addition to the well-known cost and time savings that it allows, it also provides scalability and flexibility. The AMCE facilitates infusion and end user access by ensuring standardization and security. This approach will ultimately benefit ESTO, the science community, and the research, allowing the technology developments to have quicker and broader applications.
Development of an Internet Security Policy for health care establishments.
Ilioudis, C; Pangalos, G
2000-01-01
The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.
Food security and food insecurity in Europe: An analysis of the academic discourse (1975-2013).
Borch, Anita; Kjærnes, Unni
2016-08-01
In this paper we address the academic discourse on food insecurity and food security in Europe as expressed in articles published in scientific journals in the period 1975 to 2013. The analysis indicates that little knowledge has been produced on this subject, and that the limited research that has been produced tends to focus on the production of food rather than on people's access to food. The lack of knowledge about European food insecurity is particularly alarming in these times, which are characterised by increasing social inequalities and poverty, as well as shifting policy regimes. More empirical, comparative and longitudinal research is needed to survey the extent of food security problems across European countries over time. There is also a need to identify groups at risk of food insecurity as well as legal, economic, practical, social, and psychological constraints hindering access to appropriate and sufficient food. Copyright © 2016 Elsevier Ltd. All rights reserved.
Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD
NASA Astrophysics Data System (ADS)
Länger, Thomas; Lenhart, Gaby
2009-05-01
In recent years, quantum key distribution (QKD) has been the object of intensive research activities and of rapid progress, and it is now developing into a competitive industry with commercial products. Once QKD systems are transferred from the controlled environment of physical laboratories into a real-world environment for practical use, a number of practical security, compatibility and connectivity issues need to be resolved. In particular, comprehensive security evaluation and watertight security proofs need to be addressed to increase trust in QKD. System interoperability with existing infrastructures and applications as well as conformance with specific user requirements have to be assured. Finding common solutions to these problems involving all actors can provide an advantage for the commercialization of QKD as well as for further technological development. The ETSI industry specification group for QKD (ISG-QKD) offers a forum for creating such universally accepted standards and will promote significant leverage effects on coordination, cooperation and convergence in research, technical development and business application of QKD.
Using exercise to treat patients with severe mental illness: how and why?
Tetlie, Trine; Heimsnes, Maria Charlotte; Almvik, Roger
2009-02-01
In this study, one focus group and five individual semi-structured interviews were conducted to investigate nursing staff's ways of using exercise as part of the routine treatment for patients with severe mental illness (SMI). The study also explored the patients' experiences and views of the exercise program given in this secure hospital. The organization and delivery of the exercise program are also discussed. The findings indicate that successful outcomes and adherence to exercise programs for patients with SMI in a secure setting rely on therapeutic relationships, having exercise as a mandatory part of the treatment, positive reinforcement, and experienced instructors. More research is needed to identify effective exercise interventions and feasible delivery models for individuals with SMI in secure settings.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... nuclear energy research and development, the decommissioning of the Fukushima Dai-ichi Nuclear Power Station, environmental management, emergency management, nuclear security, and safety and regulatory issues. The Decommissioning and Environmental Management Working Group (DEMWG) under the Bilateral...
78 FR 2456 - Fidelity Commonwealth Trust, et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-11
...] Fidelity Commonwealth Trust, et al.; Notice of Application January 7, 2013. AGENCY: Securities and Exchange... companies and unit investment trusts outside of the same group of investment companies as the series to...-feeder structure. Applicants: Fidelity Commonwealth Trust (the ``Trust''), Fidelity Management & Research...
How America Can Look Within to Achieve Energy Security and Reduce Global Warming
2008-09-01
Linear Accelerator Center, Stanford University Maxine Savitz The Advisory Group Daniel Sperling University of California, Davis Study Group Members...Development Mr. Don Von Dollen, Electric Power Research Institute Mr. Anant Vyas, Argonne National Laboratory Dr. E.D. Tate, General Motors...other nation on Earth except China [EIA, 2007b]. Source: Lutsey and Sperling , 2005 Figure 6 U.S. fuel economy vs. fuel efficiency Passenger cars
The Basic Shelf Experience: a comprehensive evaluation.
Dewolfe, Judith A; Greaves, Gaye
2003-01-01
The Basic Shelf Experience is a program designed to assist people living on limited incomes to make better use of their food resources. The purpose of this research was to learn if the Basic Shelf Experience program helps such people to 1. utilize food resources more effectively and 2. cope, through group support, with poverty-associated stressors that influence food security. Both quantitative and qualitative methods were used to evaluate the program objectives. Participants completed a questionnaire at the beginning and end of the six-week program. The questionnaire asked about their food access, food security, and feelings about themselves. Participants returned for a focus group discussion and completed the questionnaire again three months after the program ended. The focus group was designed to elicit information about perceived changes, if any, attributed to the program. Forty-two people completed the questionnaires pre-program and 20 post-program; 17 participated in the three-month follow-up session. While results from quantitative data analysis indicate that program objectives were not met, qualitative data provide evidence that the program did achieve its stated objectives. Our results suggest such programs as the Basic Shelf Experience can assist people living on limited incomes to achieve food security.
78 FR 58376 - Home System Group, Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Home System Group, Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Home System Group because Home System Group...
Telemedicine security: a systematic review.
Garg, Vaibhav; Brewer, Jeffrey
2011-05-01
Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. © 2011 Diabetes Technology Society.
Telemedicine Security: A Systematic Review
Garg, Vaibhav; Brewer, Jeffrey
2011-01-01
Telemedicine is a technology-based alternative to traditional health care delivery. However, poor security measures in telemedicine services can have an adverse impact on the quality of care provided, regardless of the chronic condition being studied. We undertook a systematic review of 58 journal articles pertaining to telemedicine security. These articles were selected based on a keyword search on 14 relevant journals. The articles were coded to evaluate the methodology and to identify the key areas of research in security that are being reviewed. Seventy-six percent of the articles defined the security problem they were addressing, and only 47% formulated a research question pertaining to security. Sixty-one percent proposed a solution, and 20% of these tested the security solutions that they proposed. Prior research indicates inadequate reporting of methodology in telemedicine research. We found that to be true for security research as well. We also identified other issues such as using outdated security standards. PMID:21722592
Huang, Jin; Kim, Youngmi; Barnidge, Ellen
2016-11-20
The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.
Framework for Flexible Security in Group Communications
NASA Technical Reports Server (NTRS)
McDaniel, Patrick; Prakash, Atul
2006-01-01
The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.
CORBASec Used to Secure Distributed Aerospace Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.
Laboratory for Computer Science Progress Report 18, July 1980-June 1981,
1983-04-01
group in collaboration with Rolf Landauer of IBM Research. Some of the most conspicuous participants: Dyson, Feynman, Wheeler Landauer, Keyes, Bennett...Sheldon A. Data Model Equivalence, December 1978, AD A062-753 TM-119 Shamir, Adi and Richard E. Zippel On the Security of the Merkle -Hellman
Model for Providing Displaced Workers' Services. Research Report.
ERIC Educational Resources Information Center
Anderson, B. Harold; Naylor, Mary Lou
This handbook presents a model that helps vocational educators and other individuals, institutions, and agencies plan programs to maintain displaced workers' dignity and economic security. Section 1 discusses identification of displaced workers. Section 2 offers guidelines for developing a profile for a specific group of displaced workers. A list…
2008-01-01
such organizational configurations are high so are the consequences for failure. From decades of research on teams and team or group problem solving...TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Office of Naval Research ,One Liberty Center,875 North Randolph...Naval Postgraduate School Ross Pigeau (CAN), Defence Research and Development Canada (DRDC) Mink Spaans (NED), TNO Defence, Security and Safety About
26 CFR 1.1081-7 - Sale of stock or securities received upon exchange by members of system group.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Orders § 1.1081-7 Sale of stock or securities received upon exchange by members of system group. (a... which are members of the same system group consists of stock or securities issued by the corporation... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Sale of stock or securities received upon...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...
Code of Federal Regulations, 2011 CFR
2011-04-01
... of research reports by brokers or dealers about securities other than those they are distributing... research reports by brokers or dealers about securities other than those they are distributing. (a... research reports about securities of an issuer shall be deemed for purposes of sections 2(a)(10) and 5(c...
17 CFR 200.510 - Access by historical researchers.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Access by historical researchers. 200.510 Section 200.510 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Security Information and Material § 200.510 Access by historical researchers. (a) Persons outside the...
17 CFR 200.510 - Access by historical researchers.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Access by historical researchers. 200.510 Section 200.510 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Security Information and Material § 200.510 Access by historical researchers. (a) Persons outside the...
17 CFR 200.510 - Access by historical researchers.
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Access by historical researchers. 200.510 Section 200.510 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION... Security Information and Material § 200.510 Access by historical researchers. (a) Persons outside the...
DOT National Transportation Integrated Search
2000-05-01
The member countries of the Organization of American States (OAS) have recognized that a coordinated multilateral approach to improving port security in the Western Hemisphere is needed and has established a Technical Advisory Group on Port Security ...
Medical ethics surveillance in the Armed Forces.
Pearn, J
2000-05-01
Modern defense services depend on a policy of the vigorous promotion of research to ensure that they retain an advantage in any future operational context. Research involving personnel within the armed forces, however, has certain constraints with respect to contemporary, best-practice medical ethics. Service members are one example of a class of "captive subjects" who require special protection in the context of medical research. (Prisoners, students, children, and the intellectually disabled are other such examples.) The majority of national defense forces now have ethical watchdog groups--institutional ethics committees--that oversee research involving service members. Such groups monitor the special considerations and constraints under which subjects in uniform can volunteer for biological research. These committees audit particularly the ethical themes of confidentiality, equality, and justice. Themes inherent in medical research in the military include the standard Beauchamp-Childress paradigm of autonomy, beneficence, nonmaleficence, and justice, to which are added the traditional military values of loyalty, respect, courtesy, and chivalry. Contemporary thinking is that the general principle of affording service members the opportunity to volunteer for research should be maintained within the constraints of compromised training time, national security, and operational necessity. Most biological research (and its outcome) does not in practice compromise confidentiality or military security. This paper presents an audit of the functioning of one national military medical ethics committee, the Australian Defence Medical Ethics Committee, and presents a discussion of its philosophies and influence within the broader military context. The Australian Defence Medical Ethics Committee believes that most research should, as an a priori condition of approval, be intended for open publication in peer-reviewed journals.
Hepp, Shelanne L; Tarraf, Rima C; Birney, Arden; Arain, Mubashir Aslam
2017-01-01
Electronic health records are becoming increasingly common in the health care industry. Although information technology (IT) poses many benefits to improving health care and ease of access to information, there are also security and privacy risks. Educating health care providers is necessary to ensure proper use of health information systems and IT and reduce undesirable outcomes. This study evaluated employees' awareness and perceptions of the effectiveness of two IT educational training modules within a large publicly funded health care system in Canada. Semi-structured interviews and focus groups included a variety of professional roles within the organisation. Participants also completed a brief demographic data sheet. With the consent of participants, all interviews and focus groups were audio recorded. Thematic analysis and descriptive statistics were used to evaluate the effectiveness of the IT security training modules. Five main themes emerged: (i) awareness of the IT training modules, (ii) the content of modules, (iii) staff perceptions about differences between IT security and privacy issues, (iv) common breaches of IT security and privacy, and (v) challenges and barriers to completing the training program. Overall, nonclinical staff were more likely to be aware of the training modules than were clinical staff. We found e-learning was a feasible way to educate a large number of employees. However, health care providers required a module on IT security and privacy that was relatable and applicable to their specific roles. Strategies to improve staff education and mitigate against IT security and privacy risks are discussed. Future research should focus on integrating health IT competencies into the educational programs for health care professionals.
78 FR 48029 - Improving Chemical Facility Safety and Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... responding to risks in chemical facilities (including during pre-inspection, inspection execution, post.... Sec. 2. Establishment of the Chemical Facility Safety and Security Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary of Homeland Security, the Administrator of the Environmental... Secretary level or higher. In addition, the Working Group shall consist of the head of each of the following...
Security and health research databases: the stakeholders and questions to be addressed.
Stewart, Sara
2006-01-01
Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.
Sandia National Laboratories: Directed-energy tech receives funding to
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research
Ullman, Amanda J; Kleidon, Tricia; Gibson, Victoria; McBride, Craig A; Mihala, Gabor; Cooke, Marie; Rickard, Claire M
2017-08-30
Central venous access device (CVAD) associated complications are a preventable source of patient harm, frequently resulting in morbidity and delays to vital treatment. Dressing and securement products are used to prevent infectious and mechanical complications, however current complication rates suggest customary practices are inadequate. The aim of this study was to evaluate the feasibility of launching a full-scale randomized controlled efficacy trial of innovative dressing and securement products for pediatric tunneled CVAD to prevent complication and failure. An external, pilot, four-group randomized controlled trial of standard care (bordered polyurethane dressing and suture), in comparison to integrated securement-dressing, suture-less securement device, and tissue adhesive was undertaken across two large, tertiary referral pediatric hospitals in Australia. Forty-eight pediatric participants with newly inserted tunneled CVADs were consecutively recruited. The primary outcome of study feasibility was established by elements of eligibility, recruitment, attrition, protocol adherence, missing data, parent and healthcare staff satisfaction and acceptability, and effect size estimates for CVAD failure (cessation of function prior to completion of treatment) and complication (associated bloodstream infection, thrombosis, breakage, dislodgement or occlusion). Dressing integrity, product costs and site complications were also examined. Protocol feasibility was established. CVAD failure was: 17% (2/12) integrated securement-dressing; 8% (1/13) suture-less securement device; 0% tissue adhesive (0/12); and, 0% standard care (0/11). CVAD complications were: 15% (2/13) suture-less securement device (CVAD associated bloodstream infection, and occlusion and partial dislodgement); 8% (1/12) integrated securement-dressing (partial dislodgement); 0% tissue adhesive (0/12); and, 0% standard care (0/11). One CVAD-associated bloodstream infection occurred, within the suture-less securement device group. Overall satisfaction was highest in the integrated securement-dressing (mean 8.5/10; standard deviation 1.2). Improved dressing integrity was evident in the intervention arms, with the integrated securement-dressing associated with prolonged time to first dressing change (mean days 3.5). Improving the security and dressing integrity of tunneled CVADs is likely to improve outcomes for pediatric patients. Further research is necessary to identify novel, effective CVAD securement to reduce complications, and provide reliable vascular access for children. ACTRN12614000280606 ; prospectively registered on 17/03/2014.
ERIC Educational Resources Information Center
Intercultural Development Research Association, 2015
2015-01-01
English language learners make up the fastest growing segment of the student population, but they are one of the lowest academically performing groups of students and the achievement gap widens as students progress through school. Dr. Oscar Jimenez-Castellanos, the Intercultural Development Research Association's (IDRA's) inaugural Jose A.…
Managing personal health information in distributed research network environments.
Bredfeldt, Christine E; Butani, Amy L; Pardee, Roy; Hitz, Paul; Padmanabhan, Sandy; Saylor, Gwyn
2013-10-08
Studying rare outcomes, new interventions and diverse populations often requires collaborations across multiple health research partners. However, transferring healthcare research data from one institution to another can increase the risk of data privacy and security breaches. A working group of multi-site research programmers evaluated the need for tools to support data security and data privacy. The group determined that data privacy support tools should: 1) allow for a range of allowable Protected Health Information (PHI); 2) clearly identify what type of data should be protected under the Health Insurance Portability and Accountability Act (HIPAA); and 3) help analysts identify which protected health information data elements are allowable in a given project and how they should be protected during data transfer. Based on these requirements we developed two performance support tools to support data programmers and site analysts in exchanging research data. The first tool, a workplan template, guides the lead programmer through effectively communicating the details of multi-site programming, including how to run the program, what output the program will create, and whether the output is expected to contain protected health information. The second performance support tool is a checklist that site analysts can use to ensure that multi-site program output conforms to expectations and does not contain protected health information beyond what is allowed under the multi-site research agreements. Together the two tools create a formal multi-site programming workflow designed to reduce the chance of accidental PHI disclosure.
Food insecurity among Dutch food bank recipients: a cross-sectional study.
Neter, Judith E; Dijkstra, S Coosje; Visser, Marjolein; Brouwer, Ingeborg A
2014-05-16
To determine the prevalence of (very) low food security among Dutch food bank recipients, and to identify potential demographic, lifestyle and nutrition-related factors associated with (very) low food security. 11 of 135 Dutch food banks were selected throughout the Netherlands. 251 Dutch food bank recipients participated in the study (93 men and 158 women). Inclusion criteria for participation were: (1) at least 18 years of age, (2) sufficiently fluent in Dutch to participate in oral and written interviews, (3) recipient of a Dutch food bank for at least 1 month and (4) collect own food parcel at the food bank. A single member per household was included. Level of food security. The prevalence of food insecurity was 72.9% (N=183), of which 40.4% (N=74) reported very low food security. Of the very low food secure participants, 56.8% (N=42) reported they were ever hungry but did not eat because they could not afford enough food in the previous 3 months. Adjusted multinomial logistic regression analyses showed that households without children were less likely to experience low food security (OR 0.39 (95% CI 0.18 to 0.88)) and men (OR 0.24 (95% CI 0.11 to 0.51)) were less likely to experience very low food security, while low-educated recipients (OR 5.05 (95% CI 1.37 to 18.61)) were more likely to experience very low food security. Furthermore, recipients with high satisfaction with overall food intake (OR 0.46 (95% CI 0.27 to 0.78)), high perceived healthiness of overall food intake (OR 0.34 (95% CI 0.19 to 0.62)) or high self-efficacy of eating healthy (OR 0.62 (95% CI 0.40 to 0.96)) were less likely to experience very low food security. Our study showed high prevalence rates of food insecurity among Dutch food bank recipients, and identified subgroups at increased risk of food insecurity. More research is urgently needed on the underlying determinants of food insecurity and the effectiveness of food assistance by food banks. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Measurement of household food security in the USA and other industrialised countries.
Radimer, Kathy L; Radimer, Kathy L
2002-12-01
To describe the history and current status of household food security measurement. In the 1980s evidence of rising levels of hunger was a concern for many, but disputed by some, Americans. Acknowledgement and quantification of hunger was hindered by the lack of an accepted definition and measure of hunger. Qualitative research at Cornell provided a conceptual framework, description, definition and survey items for hunger. The Community Childhood Hunger Identification Project developed an instrument used in numerous communities. Based upon these initiatives, widely accepted definitions of hunger and food insecurity, and the US Household Food Security Module for its measurement, now exist. The module classifies households as food-secure, or food-insecure without hunger or with moderate or severe hunger, and contains household-, adult- and child-referent items. Its inclusion in the Current Population Survey (CPS) since 1995 has yielded annual estimates of food insecurity. A six-item short form of the module, for surveys with severe time constraints, classifies households only as food-secure or food-insecure without or with hunger and contains no child-specific items. Surveys using the 18-item or short-form module can compare results with published national data from the CPS. Information about the module is available at http://www.ers.usda.gov/briefing/foodsecurity and http://www.fns.usda/fsec. Current research on food security measurement includes measurement of individual food insecurity and hunger, module performance regarding hunger duration and frequency, performance of the module in population sub-groups, and the effect of translations on module meaning and performance. National surveys in Canada, New Zealand and Australia also have measured food security.
Mabli, James; Ohls, Jim
2015-02-01
The Supplemental Nutrition Assistance Program (SNAP) provides nutrition assistance benefits to low-income families in an effort to reduce hunger and improve health and well-being. Because 1 in 7 Americans participate in the program each month, policymakers need to know whether the program is meeting these objectives effectively. The objective of this study was to estimate the association between SNAP participation and household food security using recent data from the largest national survey of the food security of SNAP participants to date. The analysis used a survey of nearly 6500 households and a quasi-experimental research design that consisted of 2 sets of comparisons. Using a cross-sectional sample, we compared information collected from SNAP households within days of program entry with information collected from a contemporaneous sample of SNAP households that had participated for ∼6 mo. Next, using a longitudinal sample, we compared baseline information collected from new-entrant SNAP households with information from those same households 6 mo later. Multivariate logistic regression analysis was used to estimate associations between SNAP and household food security. SNAP participation decreased the percentage of SNAP households that were food insecure in both samples by 6-17%. SNAP participation also decreased the percentage of households experiencing severe food insecurity--designated very low food security--by 12-19%. Findings were qualitatively robust to different empirical specifications. SNAP serves a vital role in improving the health and well-being of households by increasing food security. Given recent legislation to reduce program size and limit program eligibility, this study underscores SNAP's continued importance in affecting households' well-being. Future research is needed to determine whether specific groups of households experience differential improvements in food security. © 2015 American Society for Nutrition.
Kirchhoff, Anne C; Parsons, Helen M; Kuhlthau, Karen A; Leisenring, Wendy; Donelan, Karen; Warner, Echo L; Armstrong, Gregory T; Robison, Leslie L; Oeffinger, Kevin C; Park, Elyse R
2015-06-01
Supplemental security income (SSI) and social security disability insurance (DI) are federal programs that provide disability benefits. We report on SSI/DI enrollment in a random sample of adult, long-term survivors of childhood cancer (n = 698) vs a comparison group without cancer (n = 210) from the Childhood Cancer Survivor Study who completed a health insurance survey. A total of 13.5% and 10.0% of survivors had ever been enrolled on SSI or DI, respectively, compared with 2.6% and 5.4% of the comparison group. Cranial radiation doses of 25 Gy or more were associated with a higher risk of current SSI (relative risk [RR] = 3.93, 95% confidence interval [CI] = 2.05 to 7.56) and DI (RR = 3.65, 95% CI = 1.65 to 8.06) enrollment. Survivors with severe/life-threatening conditions were more often enrolled on SSI (RR = 3.77, 95% CI = 2.04 to 6.96) and DI (RR = 2.73, 95% CI = 1.45 to 5.14) compared with those with mild/moderate or no health conditions. Further research is needed on disability-related financial challenges after childhood cancer. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Water System Security and Resilience in Homeland Security Research
EPA's water security research provides tools needed to improve infrastructure security and to recover from an attack or contamination incident involving chemical, biological, or radiological (CBR) agents or weapons.
The Future of Nonproliferation in a Changed and Changing Environment: A Workshop Summary
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dreicer, M.
2016-08-30
The Center for Global Security Research and Global Security Principal Directorate at Lawrence Livermore National Laboratory convened a workshop in July 2016 to consider “The Future of Nonproliferation in a Changed and Changing Security Environment.” We took a broad view of nonproliferation, encompassing not just the treaty regime but also arms control, threat reduction, counter-proliferation, and countering nuclear terrorism. We gathered a group of approximately 60 experts from the technical, academic, political, defense and think tank communities and asked them what—and how much—can reasonably be accomplished in each of these areas in the 5 to 10 years ahead. Discussion wasmore » on a not-for-attribution basis. This document provides a summary of key insights and lessons learned, and is provided to help stimulate broader public discussion of these issues. It is a collection of ideas as informally discussed and debated among a group of experts. The ideas reported here are the personal views of individual experts and should not be attributed to Lawrence Livermore National Laboratory.« less
Correlation Research of Medical Security Management System Network Platform in Medical Practice
NASA Astrophysics Data System (ADS)
Jie, Wang; Fan, Zhang; Jian, Hao; Li-nong, Yu; Jun, Fei; Ping, Hao; Ya-wei, Shen; Yue-jin, Chang
Objective-The related research of medical security management system network in medical practice. Methods-Establishing network platform of medical safety management system, medical security network host station, medical security management system(C/S), medical security management system of departments and sections, comprehensive query, medical security disposal and examination system. Results-In medical safety management, medical security management system can reflect the hospital medical security problem, and can achieve real-time detection and improve the medical security incident detection rate. Conclusion-The application of the research in the hospital management implementation, can find hospital medical security hidden danger and the problems of medical disputes, and can help in resolving medical disputes in time and achieve good work efficiency, which is worth applying in the hospital practice.
Eighteenth Strategy for Peace Conference Report, October 13-16, 1977.
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
The document presents a report of a conference to stimulate study, research, and education in the field of foreign relations. The report contains summaries of small group discussions of peace and security, economic order, development, resource/population balance, the environment, and human rights. It is presented in six sections. Section I…
Veksler, Vladislav D; Buchler, Norbou; Hoffman, Blaine E; Cassenti, Daniel N; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting.
Seven layers of security to help protect biomedical research facilities.
Mortell, Norman
2010-04-01
In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.
Recovery-oriented care in a secure mental health setting: "striving for a good life".
McKenna, Brian; Furness, Trentham; Dhital, Deepa; Park, Malcolm; Connally, Fiona
2014-01-01
Recovery-oriented care acknowledges the unique journey of the consumer to regain control of his or her life in order to live a good life. Recovery has become a dominant policy-directed model of mental health service delivery. Even services that have traditionally been institutional and custodial have been challenged to embrace a recovery-oriented model. The aim of this qualitative study was to provide a description of service delivery in a secure in-patient mental health service, which has developed a self-professed recovery-oriented model of service delivery. An in-depth case study of the secure in-patient service using an exploratory research design was undertaken to meet the aim of this study. Qualitative data was gathered from interviews with consumers and staff (n = 15) and a focus group with carers (n = 5). Data were analyzed using a content analysis approach. Ethical approval for the study was obtained. The stakeholders readily described the secure service within recovery domains. They described a common vision; ways to promote hope and autonomy; examples of collaborative partnership which enhanced the goal of community integration; a focus on strength-based, holistic care; and the management of risk by taking calculated risks. Discrepancies in the perceptions of stakeholders were determined. This case study research provides a demonstrable example of recovery-in-action in one secure mental health service in Australia. It is intended to assist mental health services and clinicians seeking guidance in developing strategies for building and maintaining partnerships with consumers and carers in order for secure services to become truly recovery-oriented.
Sandia National Laboratories: Hydrogen Risk Assessment Models toolkit now
Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Sandia National Laboratories: 100 Resilient Cities: Sandia Challenge:
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Owen, Phillips; Mostafa, Javed; Lamm, Brent; Wang, Xiaoshu; Schmitt, Charles P.; Ahalt, Stanley C.
2013-01-01
Abstract Clinical data have tremendous value for translational research, but only if security and privacy concerns can be addressed satisfactorily. A collaboration of clinical and informatics teams, including RENCI, NC TraCS, UNC's School of Information and Library Science, Information Technology Service's Research Computing and other partners at the University of North Carolina at Chapel Hill have developed a system called the Secure Medical Research Workspace (SMRW) that enables researchers to use clinical data securely for research. SMRW significantly minimizes the risk presented when using identified clinical data, thereby protecting patients, researchers, and institutions associated with the data. The SMRW is built on a novel combination of virtualization and data leakage protection and can be combined with other protection methodologies and scaled to production levels. PMID:23751029
Pinto, Alexandra; Veríssimo, Manuela; Gatinho, Ana; Santos, António J; Vaughn, Brian E
2015-01-01
The present study aims to test Bowlby's suggestions concerning relations between the child's attachment quality with parents and subsequently constructed models of self-worth during early childhood. In most research on this question, attachment with mothers is considered in relation to self-worth but the child's attachment with fathers is not. Neither has the peer group been studied as an influence on child self-esteem, in the context of attachment research. This study addresses these relatively unstudied influences on child self-esteem. Attachment security to mother and father was measured by the Attachment Behavior Q-Set at two and half years of age. At five years of age social acceptance was measured using two sociometric techniques, and the self-esteem with the California Child Q-Sort. Our analyses indicated that security of the attachment to father and peer acceptance are both unique, significant predictors of the childrens' self-esteem. The security of the attachment to mother was also related to child self-esteem but did not emerge as a uniquely significant predictor. Peer acceptance appeared to moderate of the effect of the security of the attachment to father on the self-esteem of children. Our results extend the relatively sparse literature relating early attachments to self-esteem during early childhood.
76 FR 6499 - China 9D Construction Group; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China 9D Construction Group; Order of Suspension of Trading February 2, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China 9D Construction Group...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to ensure that...
Research and development targeted at identifying and mitigating Internet security threats require current network data. To fulfill this need... researchers working for the Center for Applied Internet Data Analysis (CAIDA), a program at the San Diego Supercomputer Center (SDSC) which is based at the...vetted network and security researchers using the PREDICT/IMPACT portal and legal framework. We have also contributed to community building efforts that
[Bibliometric analysis of publications by the Mexican Social Security Institute staff].
Valdez-Martínez, E; Garduño-Espinosa, J; Gómez-Delgado, A; Dante Amato-Martínez, J; Morales-Mori, L; Blanco-Favela, F; Muñoz-Hernández, O
2000-01-01
To describe and analyze the general characteristics and methodology of indexed publications by the health staff of the Mexican Social Security Institute in 1997. Original articles were evaluated. The primary sources included Index Medicus, Current Contents and the Mexican National Council of Science and Technology (CONACYT) index. The following information was gathered for each article: affiliation and chief activity of the first author; impact factor of the journal; research type; field of study; topic of study, and methodological conduction. This latter point included congruence between design and objective, reproducibility of methods, applicability of the analysis, and pertinence of the conclusions. A total of 300 original articles was published of which 212 (71%) were available for the present study: full-time investigators (FTI) generated 109 articles and investigators with clinical activities (CAI) wrote 103 articles. The median impact factor of the journals in which FTI published was 1.337 (0.341 to 37.297) and for CAI publications, 0.707 (0.400 to 4.237). Biomedical research predominated in the first group (41%) and clinical investigation in the second (66%). Statistically significant differences were identified for the methodological conduction between groups of investigators. Descriptive studies and publications in journals without impact factor predominated. The FTI group had the highest bibliographic production of original articles in indexed journals with an impact factor.
Tan, Evelyn S; McIntosh, Jennifer E; Kothe, Emily J; Opie, Jessica E; Olsson, Craig A
2018-08-01
This paper provides a meta-analytic examination of strength and direction of association between parents' couple relationship quality and early childhood attachment security (5 years and under). A comprehensive search of four EBSCOhost databases, Informit, Web of Science, and grey literature yielded 24 studies meeting eligibility criteria. Heterogeneity of the couple quality construct and measurement was marked. To disaggregate potentially differentially acting factors, we grouped homogeneous studies, creating two predictor variables defined as "positive dyadic adjustment" and "inter-parental conflict". Associations of each construct with offspring attachment security were examined in two separate meta-analyses. Inter-parental conflict was inversely associated (8 studies, k = 17, r = -0.28, CI = [-0.39 to -0.18]), and dyadic adjustment was not associated with offspring attachment security (5 studies, k = 12, r = 0.14, CI = [-0.03 to 0.32]). The study supports finer distinctions of couple relationship constructs and measurement in developmental research, assessment, and intervention.
17 CFR 242.501 - Certifications in connection with research reports.
Code of Federal Regulations, 2011 CFR
2011-04-01
... with research reports. 242.501 Section 242.501 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ac-Analyst Certification § 242.501 Certifications in connection with research reports. (a) A broker or dealer or covered person that publishes, circulates, or provides a research...
17 CFR 242.501 - Certifications in connection with research reports.
Code of Federal Regulations, 2010 CFR
2010-04-01
... with research reports. 242.501 Section 242.501 Commodity and Securities Exchanges SECURITIES AND... SECURITY FUTURES Regulation Ac-Analyst Certification § 242.501 Certifications in connection with research reports. (a) A broker or dealer or covered person that publishes, circulates, or provides a research...
C-C1-04: Building a Health Services Information Technology Research Environment
Gehrum, David W; Jones, JB; Romania, Gregory J; Young, David L; Lerch, Virginia R; Bruce, Christa A; Donkochik, Diane; Stewart, Walter F
2010-01-01
Background: The electronic health record (EHR) has opened a new era for health services research (HSR) where information technology (IT) is used to re-engineer care processes. While the EHR provides one means of advancing novel solutions, a promising strategy is to develop tools (e.g., online questionnaires, visual display tools, decision support) distinct from, but which interact with, the EHR. Development of such software tools outside the EHR offers an advantage in flexibility, sophistication, and ultimately in portability to other settings. However, institutional IT departments have an imperative to protect patient data and to standardize IT processes to ensure system-level security and support traditional business needs. Such imperatives usually present formidable process barriers to testing novel software solutions. We describe how, in collaboration with our IT department, we are creating an environment and a process that allows for routine and rapid testing of novel software solutions. Methods: We convened a working group consisting of IT and research personnel with expertise in information security, database design/management, web design, EHR programming, and health services research. The working group was tasked with developing a research IT environment to accomplish two objectives: maintain network/ data security and regulatory compliance; allow researchers working with external vendors to rapidly prototype and, in a clinical setting, test web-based tools. Results: Two parallel solutions, one focused on hardware, the second on oversight and management, were developed. First, we concluded that three separate, staged development environments were required to allow external vendor access for testing software and for transitioning software to be used in a clinic. In parallel, the extant oversight process for approving/managing access to internal/external personnel had to be altered to reflect the scope and scale of discrete research projects, as opposed to an enterpriselevel approach to IT management. Conclusions: Innovation in health services software development requires a flexible, scalable IT environment adapted to the unique objectives of a HSR software development model. In our experience, implementing the hardware solution is less challenging than the cultural change required to implement such a model and the modifications to administrative and oversight processes to sustain an environment for rapid product development and testing.
NASA Astrophysics Data System (ADS)
Hoeft, B.; Epting, U.; Koenig, T.
2008-07-01
While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.
Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.
Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2016-03-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.
Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chard, Kyle; Lidman, Mattias; McCollam, Brendan
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus,more » describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.« less
Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management
Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian
2015-01-01
Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability. PMID:26688598
Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Figueroa, Norilyz
2017-01-01
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
Völlm, Birgit A; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor
2018-01-01
Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for "long-stay," with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group.
Völlm, Birgit A.; Edworthy, Rachel; Huband, Nick; Talbot, Emily; Majid, Shazmin; Holley, Jessica; Furtado, Vivek; Weaver, Tim; McDonald, Ruth; Duggan, Conor
2018-01-01
Background: Many patients experience extended stays within forensic care, but the characteristics of long-stay patients are poorly understood. Aims: To describe the characteristics of long-stay patients in high and medium secure settings in England. Method: Detailed file reviews provided clinical, offending and risk data for a large representative sample of 401 forensic patients from 2 of the 3 high secure settings and from 23 of the 57 medium secure settings in England on 1 April 2013. The threshold for long-stay status was defined as 5 years in medium secure care or 10 years in high secure care, or 15 years in a combination of high and medium secure settings. Results: 22% of patients in high security and 18% in medium security met the definition for “long-stay,” with 20% staying longer than 20 years. Of the long-stay sample, 58% were violent offenders (22% both sexual and violent), 27% had been convicted for violent or sexual offences whilst in an institutional setting, and 26% had committed a serious assault on staff in the last 5 years. The most prevalent diagnosis was schizophrenia (60%) followed by personality disorder (47%, predominantly antisocial and borderline types); 16% were categorised as having an intellectual disability. Overall, 7% of the long-stay sample had never been convicted of any offence, and 16.5% had no index offence prompting admission. Although some significant differences were found between the high and medium secure samples, there were more similarities than contrasts between these two levels of security. The treatment pathways of these long-stay patients involved multiple moves between settings. An unsuccessful referral to a setting of lower security was recorded over the last 5 years for 33% of the sample. Conclusions: Long-stay patients accounted for one fifth of the forensic inpatient population in England in this representative sample. A significant proportion of this group remain unsettled. High levels of personality pathology and the risk of assaults on staff and others within the care setting are likely to impact on treatment and management. Further research into the treatment pathways of longer stay patients is warranted to understand the complex trajectories of this group. PMID:29713294
Preventive Interventions and Sustained Attachment Security in Maltreated Children
Stronach, Erin Pickreign; Toth, Sheree L.; Rogosch, Fred; Cicchetti, Dante
2013-01-01
Thirteen-month-old maltreated infants (n = 137) and their mothers were randomly assigned to one of three conditions: child-parent psychotherapy (CPP), psychoeducational parenting intervention (PPI), and community standard (CS). A fourth group of nonmaltreated infants (n =52) and their mothers served as a normative comparison (NC) group. A prior investigation found that the CPP and PPI groups demonstrated substantial increases in secure attachment at post-intervention, whereas this change was not found in the CS and NC groups. The current investigation involved the analysis of data obtained at a follow-up assessment that occurred 12-months after the completion of treatment. At follow-up, children in the CPP group had higher rates of secure and lower rates of disorganized attachment than did children in the PPI or CS groups. Rates of disorganized attachment did not differ between the CPP and NC groups. Intention-to-treat analyses (ITT) also showed higher rates of secure attachment at follow-up in the CPP group relative to the PPI and CS groups. However, groups did not differ on disorganized attachment. Both primary and ITT analyses demonstrated that maternal reported child behavior problems did not differ among the four groups at the follow-up assessment. This is the first investigation to demonstrate sustained attachment security in maltreated children 12 months after the completion of an attachment theory-informed intervention. Findings also suggest that, while effective in the short term, parenting interventions alone may not be effective in maintaining secure attachment in children over time. PMID:24229539
Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A
2016-11-01
Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P < 0.01). The mean change in food security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.
Information security for compliance with select agent regulations.
Lewis, Nick; Campbell, Mark J; Baskin, Carole R
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as "select agents." While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts--still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment.
Information Security for Compliance with Select Agent Regulations
Lewis, Nick; Campbell, Mark J.
2015-01-01
The past decade has seen a significant rise in research on high-consequence human and animal pathogens, many now known as “select agents.” While physical security around these agents is tightly regulated, information security standards are still lagging. The understanding of the threats unique to the academic and research environment is still evolving, in part due to poor communication between the various stakeholders. Perhaps as a result, information security guidelines published by select agent regulators lack the critical details and directives needed to achieve even the lowest security level of the Federal Information Security Management Act (FISMA). While only government agencies are currently required to abide by the provisions of FISMA (unless specified as preconditions for obtaining government grants or contracts—still a relatively rare or narrowly scoped occurrence), the same strategies were recently recommended by executive order for others. We propose that information security guidelines for select agent research be updated to promulgate and detail FISMA standards and processes and that the latter be ultimately incorporated into select agent regulations. We also suggest that information security in academic and research institutions would greatly benefit from active efforts to improve communication among the biosecurity, security, and information technology communities, and from a secure venue for exchange of timely information on emerging threats and solutions in the research environment. PMID:26042864
ERIC Educational Resources Information Center
Marshall, Verena; Bonner, Dede
2003-01-01
The relationships among career anchors, age, culture, gender, employment experience, and the impact of career planning on downsizing were examined with data from 423 management students (49% had been downsized). Lifestyle was the most valued anchor across age groups, stability/security the least; compared with Schein's earlier anchors research,…
Wang, Chun; Zheng, Yi; Chang, Hua-Hua
2014-01-01
With the advent of web-based technology, online testing is becoming a mainstream mode in large-scale educational assessments. Most online tests are administered continuously in a testing window, which may post test security problems because examinees who take the test earlier may share information with those who take the test later. Researchers have proposed various statistical indices to assess the test security, and one most often used index is the average test-overlap rate, which was further generalized to the item pooling index (Chang & Zhang, 2002, 2003). These indices, however, are all defined as the means (that is, the expected proportion of common items among examinees) and they were originally proposed for computerized adaptive testing (CAT). Recently, multistage testing (MST) has become a popular alternative to CAT. The unique features of MST make it important to report not only the mean, but also the standard deviation (SD) of test overlap rate, as we advocate in this paper. The standard deviation of test overlap rate adds important information to the test security profile, because for the same mean, a large SD reflects that certain groups of examinees share more common items than other groups. In this study, we analytically derived the lower bounds of the SD under MST, with the results under CAT as a benchmark. It is shown that when the mean overlap rate is the same between MST and CAT, the SD of test overlap tends to be larger in MST. A simulation study was conducted to provide empirical evidence. We also compared the security of MST under the single-pool versus the multiple-pool designs; both analytical and simulation studies show that the non-overlapping multiple-pool design will slightly increase the security risk.
Long Pulse Homopolar Generator
1988-08-01
AD-A205 452 AFWAL-TR-88-2045 LONG PULSE HOMOPOLAR GENERATOR Edward A. Knoth David P. Bauer lAP Research, Inc. 2763 Culver Avenue Dayton OH 45429-3723...TASK WORK UNIT ELEMENT NO. NO. NO ACCESSION NO. 61101F ILIR P3 01 11. TITLE (include Security Classiflcation) Long Pulse Homopolar Generator 12. PERSONAL...FIELD GROUP SUB-GROUP C6 6; y .- o- , -, ’, - 20 07 homopolar , high current, high power, high speed, generator, 19. ABIT!CT (Contkwe on rer if =ray and
Hyder, Adnan A; Maman, Suzanne; Nyoni, Joyce E; Khasiani, Shaniysa A; Teoh, Noreen; Premji, Zul; Sohani, Salim
2005-12-01
This study was designed to explore the interactions between food securing activities, health and gender equity from the perspective of rural east African women. The specific objectives were to document the critical interaction among these three issues-food security, gender inequity, women's health within the context of sub-Saharan Africa; to describe the nature of this triad from the perspective of women farmers in Africa; and to propose a framework for linking available interventions to the vicious nature of this triad. In-depth interviews and focus group discussions were conducted with rural women farmers in Kwale District, Kenya and Bagamoyo District, Tanzania. A total of 12 in-depth interviews and 4 focus group discussions have been included in this analysis. Transcribed text from interviews and focus group discussions were coded and thematic conceptual matrices were developed to compare dimensions of common themes across interviews and settings. A thematic analysis was then performed and a framework developed to understand the nature of the triad and explore the potential for interventions within the interactions. The vicious cycle of increasing work, lack of time, and lack of independent decision making for women who are responsible for food production and health of their families, has health and social consequences. Food securing activities have negative health consequences for women, which are further augmented by issues of gender inequity. The African development community must respond by thinking of creative solutions and appropriate interventions for the empowerment of women farmers in the region to ensure their health.
“Back on Track”: A Mobile App Observational Study Using Apple’s ResearchKit Framework
Woias, Peter; Suedkamp, Norbert P; Niemeyer, Philipp
2017-01-01
Background In March 2015, Apple Inc announced ResearchKit, a novel open-source framework intended to help medical researchers to easily create apps for medical studies. With the announcement of this framework, Apple presented 5 apps built in a beta phase based on this framework. Objective The objective of this study was to better understand decision making in patients with acute anterior cruciate ligament (ACL) ruptures. Here, we describe the development of a ResearchKit app for this study. Methods A multilanguage observatory study was conducted. At first a suitable research topic, target groups, participating territories, and programming method were carefully identified. The ResearchKit framework was used to program the app. A secure server connection was realized via Secure Sockets Layer. A data storage and security concept separating personal information and study data was proposed. Furthermore, an efficient method to allow multilanguage support and distribute the app in many territories was presented. Ethical implications were considered and taken into account regarding privacy policies. Results An app study based on ResearchKit was developed without comprehensive iPhone Operating System (iOS) development experience. The Apple App Store is a major distribution channel causing significant download rates (>1.200/y) without active recruitment. Preliminary data analysis showed moderate dropout rates and a good quality of data. A total of 180 participants were currently enrolled with 107 actively participating and producing 424 completed surveys in 9 out of 24 months. Conclusions ResearchKit is an easy-to-use framework and powerful tool to create medical studies. Advantages are the modular built, the extensive reach of iOS devices, and the convenient programming environment. PMID:28246069
"Back on Track": A Mobile App Observational Study Using Apple's ResearchKit Framework.
Zens, Martin; Woias, Peter; Suedkamp, Norbert P; Niemeyer, Philipp
2017-02-28
In March 2015, Apple Inc announced ResearchKit, a novel open-source framework intended to help medical researchers to easily create apps for medical studies. With the announcement of this framework, Apple presented 5 apps built in a beta phase based on this framework. The objective of this study was to better understand decision making in patients with acute anterior cruciate ligament (ACL) ruptures. Here, we describe the development of a ResearchKit app for this study. A multilanguage observatory study was conducted. At first a suitable research topic, target groups, participating territories, and programming method were carefully identified. The ResearchKit framework was used to program the app. A secure server connection was realized via Secure Sockets Layer. A data storage and security concept separating personal information and study data was proposed. Furthermore, an efficient method to allow multilanguage support and distribute the app in many territories was presented. Ethical implications were considered and taken into account regarding privacy policies. An app study based on ResearchKit was developed without comprehensive iPhone Operating System (iOS) development experience. The Apple App Store is a major distribution channel causing significant download rates (>1.200/y) without active recruitment. Preliminary data analysis showed moderate dropout rates and a good quality of data. A total of 180 participants were currently enrolled with 107 actively participating and producing 424 completed surveys in 9 out of 24 months. ResearchKit is an easy-to-use framework and powerful tool to create medical studies. Advantages are the modular built, the extensive reach of iOS devices, and the convenient programming environment. ©Martin Zens, Peter Woias, Norbert P Suedkamp, Philipp Niemeyer. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 28.02.2017.
Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Etén-Bergqvist, Christina; Persson, Jan
2011-07-01
The aim of this prospective randomized multicenter study was to compare TVT (tension-free vaginal tape) with TVT-Secur in terms of efficacy and safety. We set out to enrol 280 stress incontinent women with a half time interim analysis of short-term cure and a continuous registration of adverse events. Of 133 randomized women, 126 were operated and 123 (TVT n = 62, TVT-Secur n = 61) available for 2 months follow-up. No significant differences were found between groups regarding demographics or grade of incontinence. At 2 months follow-up, subjective cure rate following TVT-Secur was significantly lower than for TVT (72% and 92%, respectively, p = 0.01). Three major complications occurred in the TVT-Secur group: tape erosion into the urethra, a tape inadvertently placed inside the bladder, and an immediate postoperative bleeding from the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding perioperative bleeding, hospital stay, urge symptoms, or postoperative urinary tract infections. Median time for surgery was 13 and 22 min for TVT-Secur and TVT, respectively (p < 0.0001). In a prospective randomized controlled study, the TVT-Secur procedure had a significantly lower subjective cure rate than the retropubic TVT procedure. Due to this, in addition to three serious complications in the TVT-Secur group, we decided to stop further enrolment after the interim analysis. We discourage from further use of the TVT-Secur.
Measuring Human Performance within Computer Security Incident Response Teams
DOE Office of Scientific and Technical Information (OSTI.GOV)
McClain, Jonathan T.; Silva, Austin Ray; Avina, Glory Emmanuel
Human performance has become a pertinen t issue within cyber security. However, this research has been stymied by the limited availability of expert cyber security professionals. This is partly attributable to the ongoing workload faced by cyber security professionals, which is compound ed by the limited number of qualified personnel and turnover of p ersonnel across organizations. Additionally, it is difficult to conduct research, and particularly, openly published research, due to the sensitivity inherent to cyber ope rations at most orga nizations. As an alternative, the current research has focused on data collection during cyb er security training exercises. Thesemore » events draw individuals with a range of knowledge and experience extending from seasoned professionals to recent college gradu ates to college students. The current paper describes research involving data collection at two separate cyber security exercises. This data collection involved multiple measures which included behavioral performance based on human - machine transactions and questionnaire - based assessments of cyber security experience.« less
Rasch, Elizabeth K.; Huynh, Minh; Ho, Pei-Shu; Heuser, Aaron; Houtenville, Andrew; Chan, Leighton
2014-01-01
Background: Given the complexity of the adjudication process and volume of applications to Social Security Administration’s (SSA) disability programs, many individuals with serious medical conditions die while awaiting an application decision. Limitations of traditional survival methods called for a new empirical approach to identify conditions resulting in rapid mortality. Objective: To identify health conditions associated with significantly higher mortality than a key reference group among applicants for SSA disability programs. Research design: We identified mortality patterns and generated a survival surface for a reference group using conditions already designated for expedited processing. We identified conditions associated with significantly higher mortality than the reference group and prioritized them by the expected likelihood of death during the adjudication process. Subjects: Administrative records of 29 million Social Security disability applicants, who applied for benefits from 1996 – 2007, were analyzed. Measures: We computed survival spells from time of onset of disability to death, and from date of application to death. Survival data were organized by entry cohort. Results: In our sample, we observed that approximately 42,000 applicants died before a decision was made on their disability claims. We identified 24 conditions with survival profiles comparable to the reference group. Applicants with these conditions were not likely to survive adjudication. Conclusions: Our approach facilitates ongoing revision of the conditions SSA designates for expedited awards and has applicability to other programs where survival profiles are a consideration. PMID:25310524
Global Security Sciences Home - Global Security Sciences
Us About Our Research Global Security Sciences Leadership Strategic Initiatives Research Centers Center for Strategic Security Overview Leadership Risk and Infrastructure Science Center Overview Leadership Strategic Alliance for Global Energy Solutions Overview Leadership Systems Science Center Overview
Resource Conservation and a Sustainable Las Vegas
DOE Office of Scientific and Technical Information (OSTI.GOV)
Piechota, Thomas C.
2014-05-15
This research project developed educational, research, and outreach activities that addressed the challenges of Las Vegas as related to a secure energy supply through conservation, clean and adequate water supply, economic growth and diversification, air quality, and the best use of land, and usable public places. This was part of the UNLV Urban Sustainability Initiative (USI) that responded to a community and state need where a unifying vision of sustainability was developed in a cost-effective manner that promoted formal working partnerships between government, community groups, and industry.
A threat intelligence framework for access control security in the oil industry
NASA Astrophysics Data System (ADS)
Alaskandrani, Faisal T.
The research investigates the problem raised by the rapid development in the technology industry giving security concerns in facilities built by the energy industry containing diverse platforms. The difficulty of continuous updates to network security architecture and assessment gave rise to the need to use threat intelligence frameworks to better assess and address networks security issues. Focusing on access control security to the ICS and SCADA systems that is being utilized to carry out mission critical and life threatening operations. The research evaluates different threat intelligence frameworks that can be implemented in the industry seeking the most suitable and applicable one that address the issue and provide more security measures. The validity of the result is limited to the same environment that was researched as well as the technologies being utilized. The research concludes that it is possible to utilize a Threat Intelligence framework to prioritize security in Access Control Measures in the Oil Industry.
Kleidon, Tricia M; Ullman, Amanda J; Gibson, Victoria; Chaseling, Brett; Schoutrop, Jason; Mihala, Gabor; Rickard, Claire M
2017-11-01
To evaluate feasibility of an efficacy trial comparing peripherally inserted central catheter (PICC) dressing and securement techniques to prevent complications and failure. This pilot, 3-armed, randomized controlled trial was undertaken at Royal Children's Hospital and Lady Cilento Children's Hospital, Brisbane, Australia, between April 2014 and September 2015. Pediatric participants (N = 101; age range, 0-18 y) were assigned to standard care (bordered polyurethane [BPU] dressing, sutureless securement device), tissue adhesive (TA) (plus BPU dressing), or integrated securement dressings (ISDs). Average PICC dwell time was 8.1 days (range, 0.2-27.7 d). Primary outcome was trial feasibility including PICC failure. Secondary outcomes were PICC complications, dressing performance, and parent and staff satisfaction. Protocol feasibility was established. PICC failure was 6% (2/32) with standard care, 6% (2/31) with ISD, and 3% (1/32) with TA. PICC complications were 16% across all groups. TA provided immediate postoperative hemostasis, prolonging the first dressing change until 5.5 days compared with 3.5 days and 2.5 days with standard care and ISD respectively. Bleeding was the most common reason for first dressing change: standard care (n = 18; 75%), ISD (n = 11; 69%), TA (n = 4; 27%). Parental satisfaction (median 9.7/10; P = .006) and staff feedback (9.2/10; P = .002) were most positive for ISD. This research suggests safety and acceptability of different securement dressings compared with standard care; securement dressings may also reduce dressing changes after insertion. Further research is required to confirm clinically cost-effective methods to prevent PICC failure. Copyright © 2017 SIR. Published by Elsevier Inc. All rights reserved.
NASA Astrophysics Data System (ADS)
Abbasi, Milad; Monnazzam, Mohammad Reza; Zakerian, Sayedabbolfazl; Yousefzadeh, Arsalan
2015-04-01
Noise from wind turbines is one of the most important factors affecting the health, welfare, and human sleep. This research was carried out to study the effect of wind turbine noise on workers' sleep disorder. For this, Manjil Wind Farm, because of the greater number of staff and turbines than other wind farms in Iran, was chosen as case study. A total number of 53 participants took part in this survey. They were classified into three groups of mechanics, security, and official. In this study, daytime sleepiness data of workers were gathered using Epworth Sleepiness Scales (ESS) was used to determine the level of daytime sleepiness among the workers. The 8-h equivalent sound level (LAeq,8h) was measured to determine the individuals' exposure at each occupational group. Finally, the effect of sound, age, and workers' experience on individuals' sleep disorder was analyzed through multiple regression analysis in the R software. The results showed that there was a positive and significant relationship between age, workers' experience, equivalent sound level, and the level of sleep disorder. When age is constant, sleep disorder will increase by 26% as per each 1 dB increase in equivalent sound level. In situations where equivalent sound level is constant, an increase of 17% in sleep disorder is occurred as per each year of work experience. Because of the difference in sound exposure in different occupational groups. The effect of noise in repairing group was about 6.5 times of official group and also 3.4 times of the security group. Sleep disorder effect caused by wind turbine noise in the security group is almost two times more than the official group. Unlike most studies on wind turbine noise that address the sleep disorder among inhabitants nearby wind farms, this study, for the first time in the world, examines the impact of wind turbine noise on sleep disorder of workers who are more closer to wind turbines and exposed to higher levels of noise. So despite all the good benefits of wind turbines, it can be stated that this technology has health risks for all those exposed to its sound. However, further research is needed to confirm the results of this study.
The development of the food barn in achieving food security of poor household in Wonogiri Regency
NASA Astrophysics Data System (ADS)
Suminah
2018-03-01
Food barn has function as food stock which managed by households both individually and collectively. It has important role in food security. This study aims to determine the factors that influence the development of food barns, and formulate alternative strategies in the development of food barns in Wonogiri regency. The samples of this research were determined by random sampling. The data collection technique was done by interview, field observation and focus group discussion (FGD). The data analysis was done quantitatively with multiple regression, and qualitative information. The results showed that the age of respondents included in the category of middle age, their level of education was mostly from elementary school, most of their occupation were farmers, they had narrow knowledge of land management, and their income was around 1-2 million rupiah/month. In fact, the perception of food barns, institutional regulation of food barns, and the Economic institutions of food barn have a positive significant influence toward food barn development, filling the food barn and institutional capacity of food barn groups in realizing the food security of poor household in Wonogiri Regency. In food barn development, there are positive and clear perceptions of the food barn, institutional regulations. It indicates that significant as well as the economic institution of food barn are needed so that the food security can be realized.
Keurhorst, M; Anderson, P; Heinen, M; Bendtsen, Preben; Baena, Begoña; Brzózka, Krzysztof; Colom, Joan; Deluca, Paolo; Drummond, Colin; Kaner, Eileen; Kłoda, Karolina; Mierzecki, Artur; Newbury-Birch, Dorothy; Okulicz-Kozaryn, Katarzyna; Palacio-Vieira, Jorge; Parkinson, Kathryn; Reynolds, Jillian; Ronda, Gaby; Segura, Lidia; Słodownik, Luiza; Spak, Fredrik; van Steenkiste, Ben; Wallace, Paul; Wolstenholme, Amy; Wojnar, Marcin; Gual, Antoni; Laurant, M; Wensing, M
2016-07-16
Brief interventions in primary healthcare are cost-effective in reducing drinking problems but poorly implemented in routine practice. Although evidence about implementing brief interventions is growing, knowledge is limited with regard to impact of initial role security and therapeutic commitment on brief intervention implementation. In a cluster randomised factorial trial, 120 primary healthcare units (PHCUs) were randomised to eight groups: care as usual, training and support, financial reimbursement, and the opportunity to refer patients to an internet-based brief intervention (e-BI); paired combinations of these three strategies, and all three strategies combined. To explore the impact of initial role security and therapeutic commitment on implementing brief interventions, we performed multilevel linear regression analyses adapted to the factorial design. Data from 746 providers from 120 PHCUs were included in the analyses. Baseline role security and therapeutic commitment were found not to influence implementation of brief interventions. Furthermore, there were no significant interactions between these characteristics and allocated implementation groups. The extent to which providers changed their brief intervention delivery following experience of different implementation strategies was not determined by their initial attitudes towards alcohol problems. In future research, more attention is needed to unravel the causal relation between practitioners' attitudes, their actual behaviour and care improvement strategies to enhance implementation science. ClinicalTrials.gov: NCT01501552.
Homeland security in the USA: past, present, and future.
Kemp, Roger L
2012-01-01
This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.
Attachment and group psychotherapy: introduction to a special section.
Tasca, Giorgio A
2014-03-01
The application of attachment theory to adult psychotherapy represents a growing area of research and practice. Despite the conceptual overlap between group therapeutic factors, attachment theory, and therapeutic tasks as outlined by Bowlby (1988), there is little research on attachment functioning in group therapy. Hence, there remain substantial questions about the role of attachment theory in understanding group therapy processes and outcomes. The three studies in this special section advance the research in some of these important areas, including showing that positive changes in self-reported attachment insecurity among clients persist long after group therapy ends; attachment anxiety affects the level and rate of interpersonal learning in groups; and change in attachment to the therapy group has an impact on longer term change in individual group members' attachment. Each article also examines the impact of these attachment concepts on treatment outcomes. Numerous areas remain to be explored when it comes to the implications of attachment theory for understanding and conducting group therapy, including the conceptual and practical overlap between attachment concepts such as security and exploration with group therapeutic factors such as cohesion and interpersonal learning. The articles in this special section begin to address some of these issues related to attachment theory and its implications for group therapists. (c) 2014 APA, all rights reserved.
Veksler, Vladislav D.; Buchler, Norbou; Hoffman, Blaine E.; Cassenti, Daniel N.; Sample, Char; Sugrim, Shridat
2018-01-01
Computational models of cognitive processes may be employed in cyber-security tools, experiments, and simulations to address human agency and effective decision-making in keeping computational networks secure. Cognitive modeling can addresses multi-disciplinary cyber-security challenges requiring cross-cutting approaches over the human and computational sciences such as the following: (a) adversarial reasoning and behavioral game theory to predict attacker subjective utilities and decision likelihood distributions, (b) human factors of cyber tools to address human system integration challenges, estimation of defender cognitive states, and opportunities for automation, (c) dynamic simulations involving attacker, defender, and user models to enhance studies of cyber epidemiology and cyber hygiene, and (d) training effectiveness research and training scenarios to address human cyber-security performance, maturation of cyber-security skill sets, and effective decision-making. Models may be initially constructed at the group-level based on mean tendencies of each subject's subgroup, based on known statistics such as specific skill proficiencies, demographic characteristics, and cultural factors. For more precise and accurate predictions, cognitive models may be fine-tuned to each individual attacker, defender, or user profile, and updated over time (based on recorded behavior) via techniques such as model tracing and dynamic parameter fitting. PMID:29867661
Integrating security in a group oriented distributed system
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth; Gong, LI
1992-01-01
A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.
Security Techniques for the Electronic Health Records.
Kruse, Clemens Scott; Smith, Brenna; Vanderlinden, Hannah; Nealand, Alexandra
2017-08-01
The privacy of patients and the security of their information is the most imperative barrier to entry when considering the adoption of electronic health records in the healthcare industry. Considering current legal regulations, this review seeks to analyze and discuss prominent security techniques for healthcare organizations seeking to adopt a secure electronic health records system. Additionally, the researchers sought to establish a foundation for further research for security in the healthcare industry. The researchers utilized the Texas State University Library to gain access to three online databases: PubMed (MEDLINE), CINAHL, and ProQuest Nursing and Allied Health Source. These sources were used to conduct searches on literature concerning security of electronic health records containing several inclusion and exclusion criteria. Researchers collected and analyzed 25 journals and reviews discussing security of electronic health records, 20 of which mentioned specific security methods and techniques. The most frequently mentioned security measures and techniques are categorized into three themes: administrative, physical, and technical safeguards. The sensitive nature of the information contained within electronic health records has prompted the need for advanced security techniques that are able to put these worries at ease. It is imperative for security techniques to cover the vast threats that are present across the three pillars of healthcare.
Secure scalable disaster electronic medical record and tracking system.
Demers, Gerard; Kahn, Christopher; Johansson, Per; Buono, Colleen; Chipara, Octav; Griswold, William; Chan, Theodore
2013-10-01
Electronic medical records (EMRs) are considered superior in documentation of care for medical practice. Current disaster medical response involves paper tracking systems and radio communication for mass-casualty incidents (MCIs). These systems are prone to errors, may be compromised by local conditions, and are labor intensive. Communication infrastructure may be impacted, overwhelmed by call volume, or destroyed by the disaster, making self-contained and secure EMR response a critical capability. Report As the prehospital disaster EMR allows for more robust content including protected health information (PHI), security measures must be instituted to safeguard these data. The Wireless Internet Information System for medicAl Response in Disasters (WIISARD) Research Group developed a handheld, linked, wireless EMR system utilizing current technology platforms. Smart phones connected to radio frequency identification (RFID) readers may be utilized to efficiently track casualties resulting from the incident. Medical information may be transmitted on an encrypted network to fellow prehospital team members, medical dispatch, and receiving medical centers. This system has been field tested in a number of exercises with excellent results, and future iterations will incorporate robust security measures. A secure prehospital triage EMR improves documentation quality during disaster drills.
Informal work, unemployment and health in Brazilian metropolitan areas, 1998 and 2003.
Giatti, Luana; Barreto, Sandhi Maria; César, Cibele Comini
2008-10-01
This study investigates whether employment with no social security, as well as short and long term unemployment are associated with worse health among Brazilians. The representative study sample was taken from two National Health Surveys and included men aged between 15 and 64 who lived in one of the eight metropolitan regions of Brazil in 1998 (n = 31,870) and 2003 (n = 32,887). Both surveys showed that full and part time workers with no social security, as well as those in short and long term (> 12 months) unemployment had worse health indicators, regardless of age or schooling, when compared with full-time workers (> 40 hours/week) who had some form of social security through their employment. Hepatic cirrhosis was the disease most strongly associated with labor market status. Its prevalence was higher among individuals in long term unemployment and those with no social security. Labor market status was also negatively associated with the use of health care services, especially medical visits. The present study shows that the absence of social security at work, unemployment and length of unemployment, characterize heterogeneous groups of individuals in relation to health. Results reinforce the need to incorporate labor market status in research into health inequalities.
Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo
2017-12-03
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.
Attachment style and adjustment to divorce.
Yárnoz-Yaben, Sagrario
2010-05-01
Divorce is becoming increasingly widespread in Europe. In this study, I present an analysis of the role played by attachment style (secure, dismissing, preoccupied and fearful, plus the dimensions of anxiety and avoidance) in the adaptation to divorce. Participants comprised divorced parents (N = 40) from a medium-sized city in the Basque Country. The results reveal a lower proportion of people with secure attachment in the sample group of divorcees. Attachment style and dependence (emotional and instrumental) are closely related. I have also found associations between measures that showed a poor adjustment to divorce and the preoccupied and fearful attachment styles. Adjustment is related to a dismissing attachment style and to the avoidance dimension. Multiple regression analysis confirmed that secure attachment and the avoidance dimension predict adjustment to divorce and positive affectivity while preoccupied attachment and the anxiety dimension predicted negative affectivity. Implications for research and interventions with divorcees are discussed.
NASA Astrophysics Data System (ADS)
Papa, Mauricio; Shenoi, Sujeet
The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.
ERIC Educational Resources Information Center
Chandler, Felicity; Dissanayake, Cheryl
2014-01-01
Previous research has investigated caregiver attachment relationships in children with autism during early childhood, with few differences found from matched control groups. However, little is known of this relationship during middle childhood (ages 8-12 years). In this study, the aim was to establish whether there are differences in the security…
Evolving the US Army Research Laboratory (ARL) Technical Communication Strategy
2016-10-01
of added value and enhanced tech transfer, and strengthened relationships with academic and industry collaborators. In support of increasing ARL’s...communication skills; and Prong 3: Promote a Stakeholder Database to implement a stakeholder database (including names and preferences) and use a...Group, strategic planning, communications strategy, stakeholder database , workforce improvement, science and technology, S&T 16. SECURITY
Capacity building in indigenous men's groups and sheds across Australia.
Southcombe, Amie; Cavanagh, Jillian; Bartram, Timothy
2015-09-01
This article presents an investigation into capacity building, at the community level, in Aboriginal and Torres Strait Islander Men's Groups and Sheds. As safe men's spaces, Men's Groups and Sheds represent an ever-growing social, and health and well-being community service across Australia. The study is qualitative and employs 'yarning circles' (focus groups), semi-structured interviews and observations to gather data from 15 Groups/Sheds involving 45 men from urban, regional and remote communities. We found that capacity building is primarily about securing relationships between Group Leaders/Shed Co-ordinators and Government services. Capacity building establishes links to services such as Centrelink, Medicare, Department of Housing, Probation and Control, and positive outcomes such as Indigenous men securing housing and Centrelink payments. Capacity building results in better health outcomes and, educates and empowers men to improve their social, cultural, emotional and economic well-being. It helps men to better connect with family and community. The current research paves the way for countries worldwide to explore the conceptual and empirical approach of capacity building applicable to other Indigenous [and non-Indigenous] Men's Groups/Sheds. We recommend feasibilities studies, on approaches to capacity building in Indigenous Groups/Sheds, be carried out within urban, regional and remote regions across the country. © The Author (2014). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
Aspoas, Belinda; Amod, Zaytoon
2014-01-01
Community-based interventions that support the parent-infant dyad present an ideal opportunity to help foster secure attachment relationships. This study set out to investigate a parent-infant intervention that was implemented in a peri-urban township in South Africa. The aim of the research was to understand caregivers' experience of this intervention and shed light on why some caregivers make optimal use of this intervention whereas others do not. Data for this study were collected by holding a focus group with 11 caregivers, who were selected using purposive sampling. The discussion that took place in the group was video-recorded and transcribed verbatim. Thematic content analysis of this data indicates that caregivers are very receptive to the intervention, which they see in the role of "grandmother." Yet, their socially and economically weak position hinders them from making full use of the intervention. Ideally, they want professionals to reach out to them. This research highlights how important it is for early parent-infant interventions to move beyond the consulting room and to meet caregivers on their terms. © 2014 Michigan Association for Infant Mental Health.
17 CFR 256.188 - Research, development, or demonstration expenditures.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 3 2011-04-01 2011-04-01 false Research, development, or demonstration expenditures. 256.188 Section 256.188 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... COMPANIES, PUBLIC UTILITY HOLDING COMPANY ACT OF 1935 4. Deferred Debits § 256.188 Research, development, or...
High-Performance Secure Database Access Technologies for HEP Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Matthew Vranicar; John Weicher
2006-04-17
The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysismore » capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems’ security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory’s (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project’s current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.« less
Regional Military Security Cooperation in North America
2009-12-11
will serve as the main research sources. The primary research question is how might the United States better facilitate greater security cooperation...militarily between the U.S., Canada, and Mexico? Secondary research questions are why do we need increased security integration? How do current...research question has several associated tertiary questions . The paper consists of five chapters. Chapters 1 through 3 are introductory and
Gulacti, Umut; Lok, Ugur
2017-07-19
Consultation, the process of an Emergency Physician seeking an opinion from other specialties, occurs frequently in the Emergency Department (ED). The aim of this study was to determine the effect of secure messaging application (WhatsApp) usage for medical consultations on Emergency Department Length of Stay (ED LOS) and consult time. We conducted a prospective, randomized controlled trial in the ED using allocation concealment over three months. Consultations requested in the ED were allocated into two groups: consultations requested via the secure messaging application and consultations requested by telephone as verbal. A total of 439 consultations requested in the ED were assessed for eligibility and 345 were included in the final analysis: 173 consultations were conducted using secure messaging application and 172 consultations were conducted using standard telephone communications. The median ED LOS was 240 minutes (IQR:230-270, 95% CI:240 to 255.2) for patients in the secure messaging application group and 277 minutes (IQR:270-287.8, 95% CI:277 to 279) for patients in the telephone group. The median total ED LOS was significantly lower among consults conducted using Secure messaging application relative to consults conducted by telephone (median dif: -30, 95%CI:-37to-25, p<0.0001). The median consult time was 158 minutes (IQR:133 to 177.25, 95% CI:150 to 169) for patients in the Secure messaging application group and 170 minutes (IQR:165 to 188.5, 95% CI:170-171) for patients in the Telephone group (median dif: -12, 95%CI:-19 to-7,p<0.0001). Consultations completed without ED arrival was 61.8% in the secure messaging group and 33.1% in the Telephone group (dif: 28.7, 95% CI:48.3 to 66, p<0.001). Use of secure messaging application for consultations in the ED reduces the total ED LOS and consultation time. Consultation with secure messaging application eliminated more than half of in-person ED consultation visits.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fields, Susannah
2007-08-16
This project is currently under contract for research through the Department of Homeland Security until 2011. The group I was responsible for studying has to remain confidential so as not to affect the current project. All dates, reference links and authors, and other distinguishing characteristics of the original group have been removed from this report. All references to the name of this group or the individual splinter groups has been changed to 'Group X'. I have been collecting texts from a variety of sources intended for the use of recruiting and radicalizing members for Group X splinter groups for themore » purpose of researching the motivation and intent of leaders of those groups and their influence over the likelihood of group radicalization. This work included visiting many Group X websites to find information on splinter group leaders and finding their statements to new and old members. This proved difficult because the splinter groups of Group X are united in beliefs, but differ in public opinion. They are eager to tear each other down, prove their superiority, and yet remain anonymous. After a few weeks of intense searching, a list of eight recruiting texts and eight radicalizing texts from a variety of Group X leaders were compiled.« less
Nüchtern, E; Bahemann, A; Egdmann, W; van Essen, J; Gostomzyk, J; Hemmrich, K; Manegold, B; Müller, B; Robra, B P; Röder, M; Schmidt, L; Zobel, A; von Mittelstaedt, G
2015-09-01
In January, 2014, the division "Social Medicine in Practice and Rehabilitation" of the German Society for Social Medicine and Prevention established a working group on the self-image of the physicians active in the field of social medicine (medical expertise and counseling). The result of this work is the contribution presented here after consensus was achieved by specialists of social medicine from different fields and institutions (social security etc.) and in good cooperation with Prof. Dr. Gostomzyk and Prof. Dr. Robra. Based on the importance of an up to date social medicine for claimants and recipients of benefits on the one hand and the social security system on the other, and also on a description of the subjects, objectives and methods the following aspects are presented: · The perspective of social medicine. · Qualification in social medicine, concerning specialist training and continuing medical education. · The fields of duty of experts in social medicine. · The proceedings in social medicine. The working group identified challenges for the specialists in social medicine by a narrowed perception of social medicine by physicians in hospitals and practice, accompanied by an enlarged importance of expertise in social medicine, by the demand for more "patient orientation" and gain of transparency, and concerning the scientific foundation of social medicine. The working group postulates: · The perspective of social medicine should be spread more widely.. · Confidence in experts of social medicine and their independency should be strengthened.. · The not case-related consulting of the staff and executives should be expanded.. · Social medicine in practice needs support by politics and society, and especially by research and teaching.. · Good cooperation and transfer of experiences of the different branches of social security are essential for the impact of social medicine.. © Georg Thieme Verlag KG Stuttgart · New York.
Cummings, E Mark; Schatz, Julie N
2012-03-01
The social problem posed by family conflict to the physical and psychological health and well-being of children, parents, and underlying family relationships is a cause for concern. Inter-parental and parent-child conflict are linked with children's behavioral, emotional, social, academic, and health problems, with children's risk particularly elevated in distressed marriages. Supported by the promise of brief psycho-educational programs (e.g., Halford et al. in Journal of Family Psychology 22:497-505, 2008; Sanders in Journal of Family Psychology 22:506-517, 2008), the present paper presents the development and evaluation of a prevention program for community families with children, concerned with family-wide conflict and relationships, and building on Emotional Security Theory (Davies and Cummings in Psychological Bulletin 116:387-411, 1994). This program uniquely focuses on translating research and theory in this area into brief, engaging programs for community families to improve conflict and emotional security for the sake of the children. Evaluation is based on multi-domain and multi-method assessments of family-wide and child outcomes in the context of a randomized control design. A series of studies are briefly described in the programmatic development of a prevention program for conflict and emotional security for community families, culminating in a program for family-wide conflict and emotional security for families with adolescents. With regard to this ongoing program, evidence is presented at the post-test for improvements in family-wide functioning, consideration of the relative benefits for different groups within the community, and preliminary support for the theoretical bases for program outcomes.
Vecchione, Michele; Caprara, Gianvittorio; Schoen, Harald; Castro, Josè Luis Gonzàlez; Schwartz, Shalom H
2012-08-01
Using data from Italy, Spain, and Germany (N= 1,569), this study investigated the role of basic values (universalism and security) and basic traits (openness and agreeableness) in predicting perceptions of the consequences of immigration. In line with Schwartz's (1992) theory, we conceptualized security as having two distinct components, one concerned with safety of the self (personal security) and the other with harmony and stability of larger groups and of society (group security). Structural equation modelling revealed that universalism values underlie perceptions that immigration has positive consequences and group security values underlie perceptions that it has negative consequences. Personal security makes no unique, additional contribution. Multi-group analyses revealed that these associations are invariant across the three countries except for a stronger link between universalism and perceptions of the consequences of immigration in Spain. To examine whether values mediate relations of traits to perceptions of immigration, we used the five-factor model. Findings supported a full mediation model. Individuals' traits of openness and agreeableness explained significant variance in security and universalism values. Basic values, in turn, explained perceptions of the consequences of immigration. ©2011 The British Psychological Society.
Embossing of optical document security devices
NASA Astrophysics Data System (ADS)
Muke, Sani
2004-06-01
Embossing in the transparent window area of polymer banknotes, such as those seen on the Australian, New Zealand and Romanian currencies, have enormous potential for the development of novel optical security devices. The intaglio printing process can provide an efficient means for embossing of optical security structures such as micro lenses. Embossed micro lens arrays in the transparent window of a polymer banknote can be folded over a corresponding printed image array elsewhere on the note to reveal a series of moire magnified images. Analysis of samples of embossed micro lenses showed that the engraving side and impression side had a similar embossed profile. The embossed micro lens profiles were modelled using Optalix-LX commercial optical ray tracing software in order to determine the focal length of the lenses and compare with the focal length of desired embossed lenses. A fundamental understanding of how the polymer deforms during the embossing process is critical towards developing a micro lens embossing tool which can achieve the desired embossed micro lenses. This work also looks at extending the early research of the Intaglio Research Group (IRG) to better understand the embossibility of polymer substrates such as biaxially oriented polypropylene (BOPP).
Lohse, Barbara; Belue, Rhonda; Smith, Stephanie; Wamboldt, Patricia; Cunningham-Sabo, Leslie
2015-01-01
Produce and evaluate About Eating (AE), an online program for low-income women aligned with the Satter eating competence model, congruent with best practices for nutrition education of low-income audiences. Responses from iterative cognitive interviews and online surveys with diverse samples of low-income women informed lesson revisions. The researchers conducted a randomized controlled trial of AE with low-income women to determine its impact on dietary behavior and food security. In all, 284 women reviewed at least 1 AE lesson and endorsed it. After AE, women (n = 288) increased in use of food resource management skills (eg, using a budget [P = .008] and planning meals to include all food groups [P = .002]). About Eating participants who were food secure had more confidence in managing money for food (P = .002) and keeping track of food-related purchases (P = .02) than food-insecure persons. Mixed-methods research with life stage and geodiverse samples confirmed the usefulness of AE. Food security assessment may enhance interpretation of intervention effectiveness. Copyright © 2015 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.
Securing medical research: a cybersecurity point of view.
Schneier, Bruce
2012-06-22
The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.
Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals
NASA Astrophysics Data System (ADS)
Fleischmann, Kenneth R.
The biggest challenge facing computer security researchers and professionals is not learning how to make ethical decisions; rather it is learning how to recognize ethical decisions. All too often, technology development suffers from what Langdon Winner terms technological somnambulism - we sleepwalk through our technology design, following past precedents without a second thought, and fail to consider the perspectives of other stakeholders [1]. Computer security research and practice involves a number of opportunities for ethical decisions. For example, decisions about whether or not to automatically provide security updates involve tradeoffs related to caring versus user autonomy. Decisions about online voting include tradeoffs between convenience and security. Finally, decisions about routinely screening e-mails for spam involve tradeoffs of efficiency and privacy. It is critical that these and other decisions facing computer security researchers and professionals are confronted head on as value-laden design decisions, and that computer security researchers and professionals consider the perspectives of various stakeholders in making these decisions.
Weinhardt, Lance S; Galvao, Loren W; Mwenyekonde, Thokozani; Grande, Katarina M; Stevens, Patricia; Yan, Alice F; Mkandawire-Valhmu, Lucy; Masanjala, Winford; Kibicho, Jennifer; Ngui, Emmanuel; Emer, Lindsay; Watkins, Susan C
2014-01-01
Poverty and lack of a predictable, stable source of food are two fundamental determinants of ill health, including HIV/AIDS. Conversely, episodes of poor health and death from HIV can disrupt the ability to maintain economic stability in affected households, especially those that rely on subsistence farming. However, little empirical research has examined if, and how, improvements in people's economic status and food security translate into changes in HIV vulnerability. In this paper, we describe in detail the methods and protocol of an academic-NGO collaboration on a quasi-experimental, longitudinal study of the mechanisms and magnitude of the impact of a multilevel economic and food security program (Support to Able-Bodied Vulnerable Groups to Achieve Food Security; SAFE), as implemented by CARE. Primary outcomes include HIV vulnerability (i.e., HIV risk behaviors, HIV infection), economic status (i.e., income, household assets) and food security (including anthropometric measures). We recruited participants from two types of areas of rural central Malawi: traditional authorities (TA) selected by CARE to receive the SAFE program (intervention group) and TAs receiving other unrelated CARE programming (controls). In the intervention TAs, we recruited 598 program participants (398 women, 200 men) and interviewed them at baseline and 18- and 36-month follow-ups; we interviewed 301 control households. In addition, we conducted random surveys (n = 1002) in the intervention and control areas with a 36-month assessment interval, prior to and after implementation of SAFE. Thus, we are examining intervention outcomes both in direct SAFE program participants and their larger communities. We are using multilevel modeling to examine mediators and moderators of the effects of SAFE on HIV outcomes at the individual and community levels and determine the ways in which changes in HIV outcomes feed back into economic outcomes and food security at later interviews. Finally, we are conducting a qualitative end-of-program evaluation consisting of in-depth interviews with 90 SAFE participants. In addition to examining pathways linking structural factors to HIV vulnerability, this research will yield important information for understanding the impact of a multilevel environmental/structural intervention on HIV, with the potential for other sustainable long-term public health benefits.
Required Security Screenings for Researchers: A Policy Analysis and Commentary
ERIC Educational Resources Information Center
Zucker, Andrew A.
2011-01-01
After the attacks of 9/11/2001 the federal government implemented new policies intended to protect people and institutions in the United States. A surprising policy requires education researchers conducting research under contract to the U.S. Department of Education (ED) to obtain security clearances, sometimes known as security screenings.…
New security and privacy laws require basic changes in professional practice
NASA Astrophysics Data System (ADS)
Sykes, David M.
2005-09-01
Everybody knows about HIPAA-but what about GLBA? FIPA? The Patriot Act? Homeland Security? NCLB? FCRA? CASB1? PIPEDA? All of these are recent laws that impact acoustical design. Throw in the American Hospital Association/ASHE and AIA's about-to-be-released ``Guidelines for the Design of Healthcare Facilities'' as well as the redrafting of DCID 6/9 and it looks like time for careful examination of some professional practices relating to security and privacy. Should INCE members join with and endorse the ASA's recently formed Joint TCAA/TCN Subcommittee which aims to fill a policy vacuum in Washington and Ottawa relating to the fundamental protection of citizens' rights to privacy? This group will formulate consistent guidelines to enable federal and state agencies in the US and Canada to enforce and monitor their laws-will their guidelines affect INCE members? Those who advise or give expert testimony to government agencies, defense/security organizations, courts, and large institutions in financial services, healthcare or education likely find themselves in a rapidly shifting landscape and recognize the need to respond with new research and professional practices.
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading June 5, 2012. It appears to the Securities and Exchange... concerning the securities of Gammacan International, Inc. because it has not filed any periodic reports since...
An 'Honest Broker' mechanism to maintain privacy for patient care and academic medical research.
Boyd, Andrew D; Hosner, Charlie; Hunscher, Dale A; Athey, Brian D; Clauw, Daniel J; Green, Lee A
2007-01-01
From the Hippocratic Oath to the World Medical Association's Declaration of Geneva, physicians have sworn to protect patients' privacy. However, as systems move to more integrated architectures, protecting this medical data becomes more of a challenge. The increase in complexity of IT environments, the aggregation of data, and the desire of other entities to access this data, often 24 h/day x 7 day/week x 365 day/year, is putting serious strains on our ability to maintain its security. This problem cuts across all electronic record sources from patient care records to academic medical research records. In order to address this issue, we are rethinking the way we store, transmit, process, access, and federate patient data from clinical and research applications. Our groups at the University of Michigan are developing a system called the "Honest Broker" to help manage this problem. The Honest Broker will offload the burden of housing identifiable data elements of protected health information (PHI) (e.g., name and address) as well as manage data transfer between clinical and research systems. Lab results and other non-identifiable data will be stored in separate systems with either a research study ID or clinical ID number. This two-component architecture increases the burden on attackers who now need to compromise two systems, one of which is seriously hardened, in order to match health data with a patient's actual identity. While no security system is truly intrusion-proof, this architecture provides a high security choke point reducing the likelihood of a breach. By redesigning the method of integrating clinical care and research, we have enabled projects that would be cost prohibitive to conduct otherwise. The scalability of this mechanism is dependant on nature of the heterogenous nature of the clinical systems serving patients.
The Marketing Concept in an Academic Environment
NASA Astrophysics Data System (ADS)
Rešetová, Kvetoslava
2013-01-01
Universities, as subjects of the academic environment, are institutions with the priority of education and research. The task of the marketing concept in the academic field is to communicate with all important target groups to support a stronger position and their perception of the school. The aim of the intervention is to increase the prestige, improve awareness, support positive attitudes, and present successful results in all areas of activity. This means creation and protection of a positive image, which enables higher interest of all target groups and secures better awareness about it.
Lee, Tian-Fu; Wang, Zeng-Bo
2017-01-01
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509
Gray, Sarah A O
2015-01-01
This pilot program evaluation was undertaken to examine the effectiveness of an attachment-based, group professional-development experience, Circle of Security-Parenting, on family childcare (FCC) providers' psychological resources and self-efficacy in managing children's challenging behaviors and supporting children's socioemotional development. Licensed FCC providers with children actively in their care (n = 34) self-selected into the program, offered in English and Spanish through a regional support network for FCC providers; a comparison group of providers was recruited from the state database of licensed providers (n = 17). A significant Time × Group interaction was observed for self-efficacy in managing challenging behaviors, F(1, 46) = 30.59, p = .000, partial η(2) = .40, with participating providers' mean self-efficacy scores increasing, p = .000, d = .78, while comparison providers' decreased, p = .003, d = 1.40. Mean depressive symptoms decreased over time for both groups whereas job stress-related resources were stable over time in both groups. Patterns of association were found between providers' self-report of difficulties considering children's mental states and depressive symptoms, job stress resources, and self-efficacy. Limitations and implications for future research are reviewed, including the impact of conducting this work within an organized support network for FCC providers. © 2015 Michigan Association for Infant Mental Health.
Big Data: the challenge for small research groups in the era of cancer genomics
Noor, Aisyah Mohd; Holmberg, Lars; Gillett, Cheryl; Grigoriadis, Anita
2015-01-01
In the past decade, cancer research has seen an increasing trend towards high-throughput techniques and translational approaches. The increasing availability of assays that utilise smaller quantities of source material and produce higher volumes of data output have resulted in the necessity for data storage solutions beyond those previously used. Multifactorial data, both large in sample size and heterogeneous in context, needs to be integrated in a standardised, cost-effective and secure manner. This requires technical solutions and administrative support not normally financially accounted for in small- to moderate-sized research groups. In this review, we highlight the Big Data challenges faced by translational research groups in the precision medicine era; an era in which the genomes of over 75 000 patients will be sequenced by the National Health Service over the next 3 years to advance healthcare. In particular, we have looked at three main themes of data management in relation to cancer research, namely (1) cancer ontology management, (2) IT infrastructures that have been developed to support data management and (3) the unique ethical challenges introduced by utilising Big Data in research. PMID:26492224
Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.
Executives' speech expressiveness: analysis of perceptive and acoustic aspects of vocal dynamics.
Marquezin, Daniela Maria Santos Serrano; Viola, Izabel; Ghirardi, Ana Carolina de Assis Moura; Madureira, Sandra; Ferreira, Léslie Piccolotto
2015-01-01
To analyze speech expressiveness in a group of executives based on perceptive and acoustic aspects of vocal dynamics. Four male subjects participated in the research study (S1, S2, S3, and S4). The assessments included the Kingdomality test to obtain the keywords of communicative attitudes; perceptive-auditory assessment to characterize vocal quality and dynamics, performed by three judges who are speech language pathologists; perceptiveauditory assessment to judge the chosen keywords; speech acoustics to assess prosodic elements (Praat software); and a statistical analysis. According to the perceptive-auditory analysis of vocal dynamics, S1, S2, S3, and S4 did not show vocal alterations and all of them were considered with lowered habitual pitch. S1: pointed out as insecure, nonobjective, nonempathetic, and unconvincing with inappropriate use of pauses that are mainly formed by hesitations; inadequate separation of prosodic groups with breaking of syntagmatic constituents. S2: regular use of pauses for respiratory reload, organization of sentences, and emphasis, which is considered secure, little objective, empathetic, and convincing. S3: pointed out as secure, objective, empathetic, and convincing with regular use of pauses for respiratory reload and organization of sentences and hesitations. S4: the most secure, objective, empathetic, and convincing, with proper use of pauses for respiratory reload, planning, and emphasis; prosodic groups agreed with the statement, without separating the syntagmatic constituents. The speech characteristics and communicative attitudes were highlighted in two subjects in a different manner, in such a way that the slow rate of speech and breaks of the prosodic groups transmitted insecurity, little objectivity, and nonpersuasion.
Wang, Yi-jun; Li, Fei-ping; Wang, Qian; Yang, Sen; Cai, Xian-guo; Chen, Ying-he
2011-11-01
The purpose of the study was to evaluate and compare the clinical values of tension-free vaginal tape (TVT), tension-free vaginal tape-transobturator (TVT-O), or tension-free vaginal tape-Secur (TVT-Secur) as treatment for female stress urinary incontinence. The pre-operative and 1-year post-operative follow-up protocols for patients who were treated with serial mid-urethral tension-free tape procedures in two hospitals from October 2008 to December 2009 were prospectively studied. These patients were randomly allocated to TVT, TVT-O, or TVT-Secur. A total of 102 women participated. At the 1-year follow-up, complications were not statistically different across the three groups except for pain in the thigh, which was more common in the TVT-O group. The overall efficacy and cure rate were similar between the TVT and TVT-O groups, but were significantly lower in the TVT-Secur group. A comparison of the three procedures shows that TVT-O is easy to operate and is as safe as TVT-Secur, and it has similar long-term efficacy to TVT, though, as one of the third-generation mid-urethral tension-free tapes, TVT-Secur is still being evaluated. Basing on the outcome of our study, it had rare complications but unsatisfactory efficacy, and we suggest that TVT-Secur is not fit for severe cases. However, observation and comparison of these groups in a larger sample size on a longer term are needed.
2018-03-31
NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil
Data Mining Research for Information Security
2016-01-29
AFRL-AFOSR-JP-TR-2016-0028 Data Mining Research for Information Security Kevin Barton Texas A&M University-San Antonio Final Report 01/29/2016...Final 3. DATES COVERED (From - To) 20-05-2014 to 19-05-2015 4. TITLE AND SUBTITLE Data Mining Research for Information Security 5a. CONTRACT
Confidence-Building Measures in Philippine Security.
1998-05-01
service or government agency. STRATEGY RESEARCH PROJECT i CONFIDENCE-BUILDING MEASURES IN PHILIPPINE SECURITY BY LIEUTENANT COLONEL RAMON G...WAR COLLEGE, CARLISLE BARRACKS, PA 17013-5050 rimo*’^»®*raBl USAWC STRATEGY RESEARCH PROJECT CONFIDENCE-BUILDING MEASURES IN PHILIPPINE...Colonel Ramon Santos, Philippine Army TITLE: Confidence-Building Measures in Philippine Security FORMAT: Strategy Research Project DATE: 1
The Effects of Evaluation and Production Blocking on the Performance of Brainstorming Groups
1992-08-01
NUMBER OF PAGES 701 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LMIITATION OF ABSTRACT OF...special interest group. Once again, the people in the above examples share many things in common such as a sense of civil duty, an employer, a love for a...people respond differently in the presence of others, a phenomenon Zajonc refers to as compresence . In group settings, social facilitation can be
ERIC Educational Resources Information Center
Scharf, Miri; Kerns, Kathryn A.; Rousseau, Sofie; Kivenson-Baron, Inbal
2016-01-01
The goal of the study was to examine the joint and distinct contribution of attachment security and social anxiety to Arab children's peer competence in middle childhood. We focused on Arab children as very little research has examined close relationships for this group. A sample of 404 third-, fourth- and fifth-grade Arabic students (203 boys and…
DoD Materiel Management Regulation
1998-05-01
Policy Group DRMO Defense Reutilization and Marketing Office DRMS Defense Reutilization and Marketing Service DSAA Defense Security Assistance...C3.4.2.2.1.2. Availability of Commercial Support. Market research and surveys should be conducted to determine market availability, present of in-place...stock and shall be subject to transfer to the Defense Reutilization and Marketing Service (DRMS). C4.2.1.1.6. Personnel involved in wholesale materiel
Wireless Communications in Reverberant Environments
2015-01-01
Secure Wireless Agent Testbed (SWAT), the Protocol Engineering Advanced Networking (PROTEAN) Research Group, the Data Fusion Laboratory (DFL), and the...constraints of their application. 81 Bibliography [1] V. Gungor and G. Hancke, “Industrial wireless sensor networks : Challenges, design principles, and...Bhattacharya, “Path loss estimation for a wireless sensor network for application in ship,” Int. J. of Comput. Sci. and Mobile Computing, vol. 2, no. 6, pp
NASA Technical Reports Server (NTRS)
Powell, John D.
2003-01-01
This document discusses the verification of the Secure Socket Layer (SSL) communication protocol as a demonstration of the Model Based Verification (MBV) portion of the verification instrument set being developed under the Reducing Software Security Risk (RSSR) Trough an Integrated Approach research initiative. Code Q of the National Aeronautics and Space Administration (NASA) funds this project. The NASA Goddard Independent Verification and Validation (IV&V) facility manages this research program at the NASA agency level and the Assurance Technology Program Office (ATPO) manages the research locally at the Jet Propulsion Laboratory (California institute of Technology) where the research is being carried out.
NASA Astrophysics Data System (ADS)
Malekian, Atefe; Hayati, Dariush; Aarts, Noelle
2017-01-01
Conceptions of agricultural water security are conditioned by larger understandings of being and reality. It is still unclear what such understandings mean for perspectives on water security in general and on causes and solutions related to perceived water security risks and problems in agricultural sector in particular. Based on a systematic literature review, three conceptualizations of water security, related to different paradigms, are presented. Also the consequences of such conceptualizations for determining research objectives, research activities, and research outcomes on agricultural water security are discussed. The results showed that agricultural water security from a positivist paradigm referred to tangible and measurable water-related hazards and threats, such as floods and droughts, pollution, and so forth. A constructivist approach to agricultural water security, constituted by a process of interaction and negotiation, pointed at perceptions of water security of farmers and other stakeholders involved in agricultural sector. A critical approach to agricultural water security focused on the processes of securing vulnerable farmers and others from wider political, social, and natural impediments to sufficient water supplies. The conclusions of the study suggest that paradigms, underlying approaches should be expressed, clarified, and related to one another in order to find optimal and complementary ways to study water security issues in agricultural sector.
A Secure and Efficient Threshold Group Signature Scheme
NASA Astrophysics Data System (ADS)
Zhang, Yansheng; Wang, Xueming; Qiu, Gege
The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.
Exploring the youth experience about sense of social security: a qualitative study.
Chinekesh, Ahdieh; Hosseini, Seyed Ali; Mohammadi, Farahnaz; Motlagh, Mohammad Esmael; Eftekhari, Monir Baradaran; Ardalan, Gelayol; Djalalinia, Shirin
2017-12-01
Undoubtedly, one of the vital needs of man is security. Determinants and related factors to sense of social security is one of the most important research priorities, especially in adolescents and young people. To identify the factors affecting the social security of the youth. In 2017, using conventional content analysis, and benefiting from semi-structured in-depth interviews, we conducted a qualitative study exploring the opinions of young people about their feelings regarding social security. First, a targeted sampling method was determined to collect the data. Participants were young volunteers aged 18 to 30 who were selected from Tehran, the capital of Iran. Inclusion criteria for participants were willingness to participate in the study and ability to express their experiences. Data was extracted from 21 participants. The participants consisted of 21 young people who met the study inclusion criteria, of whom 12 participants were male. Their mean age was 24.4±0.41 years and their education varied from primary school to master's degree. Under two main categories of the need for economic and financial security and the need for a safe society, we extracted 11 subcategories following 32 codes. According to the findings, most participants agreed on the important role that sense of social security has in their lives and their health. The important role of sense of social security in participant's lives and health was the main important point of our findings, emphasized by most of participants. Based on the results; the assessment of the specific needs of different target groups, the design, development and implementation of health programs led to more effective interventions.
ERIC Educational Resources Information Center
Olijnyk, Nicholas Victor
2014-01-01
The central aim of the current research is to explore and describe the profile, dynamics, and structure of the information security specialty. This study's objectives are guided by four research questions: 1. What are the salient features of information security as a specialty? 2. How has the information security specialty emerged and evolved from…
Securing Volunteers to Fix up the School. Research Brief
ERIC Educational Resources Information Center
Johnston, Howard
2011-01-01
How can schools secure volunteers to help fix up the building and grounds? There isn't much research on how to secure volunteers to participate in school clean-ups and fix-ups, but some key ideas can be found in anecdotal examples from many communities around the nation. The first recommendation is that securing volunteers is easier when the…
An RFID-based luggage and passenger tracking system for airport security control applications
NASA Astrophysics Data System (ADS)
Vastianos, George E.; Kyriazanos, Dimitris M.; Kountouriotis, Vassilios I.; Thomopoulos, Stelios C. A.
2014-06-01
Market analysis studies of recent years have shown a steady and significant increase in the usage of RFID technology. Key factors for this growth were the decreased costs of passive RFIDs and their improved performance compared to the other identification technologies. Besides the benefits of RFID technologies into the supply chains, warehousing, traditional inventory and asset management applications, RFID has proven itself worth exploiting on experimental, as well as on commercial level in other sectors, such as healthcare, transport and security. In security sector, airport security is one of the biggest challenges. Airports are extremely busy public places and thus prime targets for terrorism, with aircraft, passengers, crew and airport infrastructure all subject to terrorist attacks. Inside this labyrinth of security challenges, the long range detection capability of the UHF passive RFID technology can be turned into a very important tracking tool that may outperform all the limitations of the barcode tracking inside the current airport security control chain. The Integrated Systems Lab of NCSR Demokritos has developed an RFID based Luggage and Passenger tracking system within the TASS (FP7-SEC-2010-241905) EU research project. This paper describes application scenarios of the system categorized according to the structured nature of the environment, the system architecture and presents evaluation results extracted from measurements with a group of different massive production GEN2 UHF RFID tags that are widely available in the world market.
Education and Strategic Research Collaborations
Los Alamos National Laboratory National Security Education Center Image Search Site submit LaboratoryNational Security Education Center Menu Program Offices Energy Security Council New Mexico Consortium Geophysics, Planetary Physics, Signatures Events Collaborations for education and strategic research, student
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AIMS Worldwide, Inc., Apollo Capital Group, Inc., CommunitySouth Financial Corp., Last Mile Logistics Group, Inc., Made in America Entertainment... concerning the securities of Last Mile Logistics Group, Inc. because it has not filed any periodic reports...
Secure Multicast Tree Structure Generation Method for Directed Diffusion Using A* Algorithms
NASA Astrophysics Data System (ADS)
Kim, Jin Myoung; Lee, Hae Young; Cho, Tae Ho
The application of wireless sensor networks to areas such as combat field surveillance, terrorist tracking, and highway traffic monitoring requires secure communication among the sensor nodes within the networks. Logical key hierarchy (LKH) is a tree based key management model which provides secure group communication. When a sensor node is added or evicted from the communication group, LKH updates the group key in order to ensure the security of the communications. In order to efficiently update the group key in directed diffusion, we propose a method for secure multicast tree structure generation, an extension to LKH that reduces the number of re-keying messages by considering the addition and eviction ratios of the history data. For the generation of the proposed key tree structure the A* algorithm is applied, in which the branching factor at each level can take on different value. The experiment results demonstrate the efficiency of the proposed key tree structure against the existing key tree structures of fixed branching factors.
77 FR 50204 - Star Entertainment Group, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Star Entertainment Group, Inc., Order of... lack of current and accurate information concerning the securities of Star Entertainment Group, Inc. (``Star Entertainment'') because of questions regarding the accuracy of the company's financial statements...
77 FR 14839 - Harris & Harris Group, Inc.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29976; 812-13313] Harris & Harris Group, Inc.; Notice of Application March 7, 2012. AGENCY: Securities and Exchange Commission... from section 23(c) of the Act. SUMMARY OF THE APPLICATION: Harris & Harris Group, Inc. (``Applicant...
Public key infrastructure for DOE security research
DOE Office of Scientific and Technical Information (OSTI.GOV)
Aiken, R.; Foster, I.; Johnston, W.E.
This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-keymore » infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.« less
Zhang, Qi; Jones, Sonya; Ruhm, Christopher J; Andrews, Margaret
2013-10-01
Children in food-insecure households are more likely to experience poorer health function and worse academic achievement. To investigate the relation between economic environmental factors and food insecurity among children, we examined the relation between general and specific food prices (fast food, fruits and vegetables, beverages) and risk of low (LFS) and very low food security (VLFS) status among low-income American households with children. Using information for 27,900 child-year observations from the Early Childhood Longitudinal Study-Kindergarten Class of 1998-1999 linked with food prices obtained from the Cost of Living Data of the Council for Community and Economic Research, formerly known as the American Chamber of Commerce Researchers' Association, fixed effects models were estimated within stratified income groups. Higher overall food prices were associated with increased risk of LFS and VLFS (coefficient = 0.617; P < 0.05). Higher fast food and fruit and vegetable prices also contributed to higher risk of food insecurity (coefficient = 0.632, P < 0.01 for fast food; coefficient = 0.879, P < 0.01 for fruits and vegetables). However, increasing beverage prices, including the prices of soft drinks, orange juice, and coffee, had a protective effect on food security status, even when controlling for general food prices. Thus, although food price changes were strongly related to food security status among low-income American households with children, the effects were not uniform across types of food. These relations should be accounted for when implementing policies that change specific food prices.
Using Technology to Enhance Discharge Teaching and Improve Coping for Patients After Stroke.
Schneider, Melissa A; Howard, Katrina A
2017-06-01
A diagnosis of stroke is a life-changing event. Effective discharge teaching after a stroke is crucial for recovery, but the overload of information can be overwhelming for patients and caregivers. The purpose of this study was to examine differences in discharge readiness and postdischarge coping in patients admitted for stroke after the use of individualized postdischarge information/education provided via a technology package (including patient online portal access, e-mail/secure messaging) compared with current standard discharge teaching methods (verbal/written instructions). This study used a descriptive comparative design to evaluate the difference between the nonintervention group A and the intervention group B. Patients in group B received additional discharge information via secured e-mail messaging at postdischarge days 2, 6, and 10. Two validated tools, Readiness for Hospital Discharge Form and Post-Discharge Coping Difficulty Scale, were used. One hundred patients were recruited for the study, but the final number of complete data sets collected was 86-42 in group A and 44 in group B. There was no statistically significant difference between the groups in discharge readiness. There was a significant difference in coping scores between the 2 groups, with the technology group exhibiting higher coping. New technology affords new options to improve discharge readiness and contribute to positive patient coping after stroke. The researchers hope that this study will contribute to the growing body of evidence showing success using aspects of technology to enhance discharge teaching and follow-up after discharge.
Williams, Timothy P; Binagwaho, Agnes; Betancourt, Theresa S
2012-04-01
To illuminate the different manifestations of transactional sexual exploitation and abuse among Rwanda's children in order to inform effective responses by policies, programs, and communities. Qualitative data was collected during April and May 2010. One-hundred and thirty-nine adults (56% female) and 52 children (60% female) participated in focus groups across three geographic locations in Rwanda. Eleven interviews were held with child protection stakeholders. Interview and focus group participants reported how children, primarily girls, engaged in transactional sex as a survival strategy in response to situations of adversity including economic deprivation, difficulty accessing school, and social pressure. Policy and programs should work to address the underlying social and economic determinants of transactional sexual exploitation through structural interventions that reduce gender inequalities to accessing school and securing basic needs. Further quantitative and qualitative research to better understand the complexities of this issue is warranted. Copyright © 2012 Elsevier Ltd. All rights reserved.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pestovich, Kimberly Shay
Harnessing the power of the nuclear sciences for national security and to benefit others is one of Los Alamos National Laboratory’s missions. MST-8 focuses on manipulating and studying how the structure, processing, properties, and performance of materials interact at the atomic level under nuclear conditions. Within this group, single crystal scintillators contribute to the safety and reliability of weapons, provide global security safeguards, and build on scientific principles that carry over to medical fields for cancer detection. Improved cladding materials made of ferritic-martensitic alloys support the mission of DOE-NE’s Fuel Cycle Research and Development program to close the nuclear fuelmore » cycle, aiming to solve nuclear waste management challenges and thereby increase the performance and safety of current and future reactors.« less
Profiles of Irish survivors of institutional abuse with different adult attachment styles.
Carr, Alan; Flanagan, Edel; Dooley, Barbara; Fitzpatrick, Mark; Flanagan-Howard, Roisín; Shevlin, Mark; Tierney, Kevin; White, Megan; Daly, Margaret; Egan, Jonathan
2009-03-01
Two hundred and forty seven survivors of institutional abuse in Ireland were classified with the Experiences in Close Relationships Inventory as having fearful (44%), preoccupied (13%), dismissive (27%), or secure (17%) adult attachment styles. The group with the secure adult attachment style had the most positive profile, while the most negative profile occurred for the fearful group in terms of DSM IV diagnoses and scores on the Trauma Symptom Inventory, the Global Assessment of Functioning Scale, the World Health Organization Quality of Life 100 scale, and the Kansas Marital Satisfaction Scale. The profile of the preoccupied group was more similar to that of the fearful group. The profile of the dismissive group was more similar to that of the secure group.
NASA Astrophysics Data System (ADS)
Wolthuis, Reinder; Broenink, Gerben; Fransen, Frank; Schultz, Sven; de Vries, Arnout
This paper is the result of research on the security perception of users in ICT services and equipment. We analyze the rationale of users to have an interest in security and to decide to change security parameters of equipment and services. We focus on the home environment, where more and more devices are (inter)connected to form a complex end-to-end chain in using online services. In our research, we constructed a model to determine the delta between the perceived overall security and the real security in home networks. To achieve an understanding of perception and how to identify the delta between perceived and real security, our work forms the basis for examining how perception relates to behaviour. Since humans are referred to as the weakest link in security, there are also differences in behaviour and desired behaviour from a security perspective.
Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James
2017-04-01
Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.
78 FR 24161 - Bureau of Industry and Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... of Industry and Security senior management. 4. Discussion on General Technology Note as it applies to.... Report of Composite Working Group and other working groups. 7. Report on regime-based activities. 8...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-08
... DEPARTMENT OF JUSTICE Antitrust Division Notice Pursuant to the National Cooperative Research and Production Act of 1993--Secure Content Storage Association, LLC Notice is hereby given that, on May 3, 2012, pursuant to Section 6(a) of the National Cooperative Research and Production Act of 1993, 15 U.S.C. 4301 et seq. (``the Act''), the Secure...
Border Security: A Conceptual Model of Complexity
2013-12-01
maximum 200 words ) This research applies complexity and system dynamics theory to the idea of border security, culminating in the development of...alternative policy options. E. LIMITATIONS OF RESEARCH AND MODEL This research explores whether border security is a living system. In other words , whether...border inspections. Washington State, for example, experienced a 50% drop in tourism and lost over $100 million in local revenue because of the
Information risk and security modeling
NASA Astrophysics Data System (ADS)
Zivic, Predrag
2005-03-01
This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.
ERIC Educational Resources Information Center
Neas, Ethel Josephine; And Others
A study was made of the use of consumer credit by Home Demonstration Club (HDC) members in Blount County, Tennessee, as a basis for planning educational programs. Data were secured by group interviews from 237 Home Demonstration Club members representing 24 clubs. The data were classified according to the members use of consumer credit: those who…
Firefox add-ons for medical reference.
Hoy, Matthew B
2010-07-01
Firefox is a Web browser created by the Mozilla project, an open-source software group. Features of the browser include automated updates, advanced security and standards compliance, and the ability to add functionality through add-ons and extensions. First introduced in 2004, Firefox now accounts for roughly 30% of the browser market. This article will focus primarily on add-ons and extensions available for the browser that are useful to medical researchers.
Field Demonstration of Light Obscuration Particle Counting Technologies to Detect Fuel Contaminates
2016-12-01
to detect fuel contamiation including particulates and free water 15. SUBJECT TERMS fuel, JP-8, aviation fuel, contamination, free water ...undissolved water , F24 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT none 18. NUMBER OF PAGES 12 19a. NAME OF RESPONSIBLE PERSON Joel...technical, interim, memorandum, master’s thesis, progress, quarterly, research , special, group study, etc. 3. DATES COVERED. Indicate the time during
2012-10-01
support for various aspects of CI resilience in BC since 2008, initially for the Vancouver 2010 Olympic and Paralympic Winter Games and, subsequently... Paralympic Winter Games (V2010). Under this project, DRDC provided critical infrastructure (CI) support to two groups: the Integrated Security Unit (ISU...BC since 2008, initially for the Vancouver 2010 Olympic and Paralympic Winter Games and, subsequently, for the development of Emergency Management
The Crime-Terror Nexus and the Threat to U.S. Homeland Security
2015-12-01
described by analysts as falling into the “gray area phenomenon.” The three case studies, the analysis, and conclusion of this thesis support the...sub-national groups are protean in nature; they are best described by analysts as falling into the “gray area phenomenon.” The three case studies, the...1 A. WHY IS THE CRIME-TERROR NEXUS A PROBLEM WORTHY OF RESEARCH
2016-04-01
Gerard Chaney, and Charles Pergantis Weapons and Materials Research Directorate, ARL Coatings, Corrosion, and Engineered Polymers Branch (CCEPB...SUBJECT TERMS single lap joint, adhesive, sample preparation, testing, database, metadata, material pedigree, ISO 16. SECURITY CLASSIFICATION OF: 17...temperature/water immersion conditioning test for lap-joint test specimens using the test tubes and convection oven method
Ward, Paul R; Meyer, Samantha B; Verity, Fiona; Gill, Tiffany K; Luong, Tini C N
2011-08-05
In order to improve the health of the most vulnerable groups in society, the WHO Commission on Social Determinants of Health (CSDH) called for multi-sectoral action, which requires research and policy on the multiple and inter-linking factors shaping health outcomes. Most conceptual tools available to researchers tend to focus on singular and specific social determinants of health (SDH) (e.g. social capital, empowerment, social inclusion). However, a new and innovative conceptual framework, known as social quality theory, facilitates a more complex and complete understanding of the SDH, with its focus on four domains: social cohesion, social inclusion, social empowerment and socioeconomic security, all within the same conceptual framework. This paper provides both an overview of social quality theory in addition to findings from a national survey of social quality in Australia, as a means of demonstrating the operationalisation of the theory. Data were collected using a national random postal survey of 1044 respondents in September, 2009. Multivariate logistic regression analysis was conducted. Statistical analysis revealed that people on lower incomes (less than $45000) experience worse social quality across all of the four domains: lower socio-economic security, lower levels of membership of organisations (lower social cohesion), higher levels of discrimination and less political action (lower social inclusion) and lower social empowerment. The findings were mixed in terms of age, with people over 65 years experiencing lower socio-economic security, but having higher levels of social cohesion, experiencing lower levels of discrimination (higher social inclusion) and engaging in more political action (higher social empowerment). In terms of gender, women had higher social cohesion than men, although also experienced more discrimination (lower social inclusion). Applying social quality theory allows researchers and policy makers to measure and respond to the multiple sources of oppression and advantage experienced by certain population groups, and to monitor the effectiveness of interventions over time.
2011-01-01
Background In order to improve the health of the most vulnerable groups in society, the WHO Commission on Social Determinants of Health (CSDH) called for multi-sectoral action, which requires research and policy on the multiple and inter-linking factors shaping health outcomes. Most conceptual tools available to researchers tend to focus on singular and specific social determinants of health (SDH) (e.g. social capital, empowerment, social inclusion). However, a new and innovative conceptual framework, known as social quality theory, facilitates a more complex and complete understanding of the SDH, with its focus on four domains: social cohesion, social inclusion, social empowerment and socioeconomic security, all within the same conceptual framework. This paper provides both an overview of social quality theory in addition to findings from a national survey of social quality in Australia, as a means of demonstrating the operationalisation of the theory. Methods Data were collected using a national random postal survey of 1044 respondents in September, 2009. Multivariate logistic regression analysis was conducted. Results Statistical analysis revealed that people on lower incomes (less than $45000) experience worse social quality across all of the four domains: lower socio-economic security, lower levels of membership of organisations (lower social cohesion), higher levels of discrimination and less political action (lower social inclusion) and lower social empowerment. The findings were mixed in terms of age, with people over 65 years experiencing lower socio-economic security, but having higher levels of social cohesion, experiencing lower levels of discrimination (higher social inclusion) and engaging in more political action (higher social empowerment). In terms of gender, women had higher social cohesion than men, although also experienced more discrimination (lower social inclusion). Conclusions Applying social quality theory allows researchers and policy makers to measure and respond to the multiple sources of oppression and advantage experienced by certain population groups, and to monitor the effectiveness of interventions over time. PMID:21819576
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of... of current and accurate information concerning the securities of Data Fortress Systems Group Ltd...
Federal Plan for Cyber Security and Information Assurance Research and Development
2006-04-01
Security Systems 103 varieties of the BB84 scheme have been developed, and other forms of quantum key distribution have been proposed. Rapid progress has led... key . Capability Gaps Existing quantum cryptographic protocols may also have weaknesses. Although BB84 is generally regarded as secure , researchers...complement agency-specific prioritization and R&D planning efforts in cyber security and information assurance. The Plan also describes the key Federal
Attachment-based interventions for families with young children.
Woodhouse, Susan S
2018-05-21
Given a large body of research indicating links between child attachment and later mental health outcomes, interventions that promote children's secure attachment to their caregivers have the potential to contribute to prevention of psychopathology and promotion of well-being. A number of attachment-based interventions have been developed to support parents, enhance caregiving quality, and promote children's attachment security with the aim of improving children's mental health. There is now a growing evidence base to support the efficacy of a number of these interventions. The present literature review and introduction to the special issue on attachment-based interventions for families with young children describes key aspects of attachment theory and research that form the theoretical and empirical background for attachment-based interventions, and introduces seven case studies illustrating five different attachment-based interventions. The case studies represent a variety of attachment-based models, including both group and individual treatments, and show applications across a range of caregiver contexts. © 2018 Wiley Periodicals, Inc.
Disability at Work: A Look Back and Forward.
Schur, Lisa; Han, Kyongji; Kim, Andrea; Ameri, Mason; Blanck, Peter; Kruse, Douglas
2017-12-01
Purpose This article presents new evidence on employment barriers and workplace disparities facing employees with disabilities, linking the disparities to employee attitudes. Methods Analyses use the 2006 General Social Survey to connect disability to workplace disparities and attitudes in a structural equation model. Results Compared to employees without disabilities, those with disabilities report: lower pay levels, job security, and flexibility; more negative treatment by management; and, lower job satisfaction but similar organizational commitment and turnover intention. The lower satisfaction is mediated by lower job security, less job flexibility, and more negative views of management and co-worker relations. Conclusion Prior research and the present findings show that people with disabilities experience employment disparities that limit their income, security, and overall quality of work life. Technology plays an increasingly important role in decreasing employment disparities. However, there also should be increased targeted efforts by government, employers, insurers, occupational rehabilitation providers, and disability groups to address workplace barriers faced by employees with disabilities, and by those with disabilities seeking to return to work.
E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom
2010-04-01
112 APPENDIX IV: SWOT ANALYSIS ............................................................................. 113 APPENDIX V...violent extremism taking root here in the United States. We don‘t have the luxury of focusing our efforts on one group ; we must protect the country from... group that engages in an activity referred to in subparagraph (A). 12 The National Security Act of 1947 created the National Security Council
2011-05-05
groups emerge sporadic.ally. In patticular, the JMJB is widely perceived by the security and intelligent officials in Bangladesh to be the youth wing...organizations and protect others. According to National Security Intelligence sources, there are 20 to 33 Islamist ten·orist groups active in Bangladesh.29 Only...Additional Direction, National Security Intelligence , Bangladesh, broke down how the influx of charitable money is being used and misused in Bangladesh
The Shaping of Managers' Security Objectives through Information Security Awareness Training
ERIC Educational Resources Information Center
Harris, Mark A.
2010-01-01
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…
Security Controls Hurt Research, NAS Warns.
ERIC Educational Resources Information Center
Kolata, Gina
1982-01-01
A National Academy of Sciences (NAS) report found no evidence that leaks of technical information from universities or other research centers have damaged national security. However, in areas where control is warranted, decisions should be based on criteria. These criteria and issues related to security control and technological transfer are…
Code of Federal Regulations, 2010 CFR
2010-07-01
... Treasury NATIONAL SECURITY INFORMATION § 2.2 Access to classified information by historical researchers... security; and (2) Receipt of the individual's written agreement to safeguard classified information... granting of a security clearance for access to classified information. (d) Treasury personnel will...
ERIC Educational Resources Information Center
Oblinger, Diana G.; Hawkins, Brian L.
2006-01-01
Seeing an institution's name in the headlines for a security breach may be among a CIO's-- and a president's--worst nightmares. Whether the breached data involves social security numbers, credit card accounts, clinical records, or research, this is bad news. Federal agencies that provide research funding may lose confidence in data integrity,…
Neural evidence for a multifaceted model of attachment security.
Canterberry, Melanie; Gillath, Omri
2013-06-01
The sense of attachment security has been linked with a host of beneficial outcomes related to personal and relational well-being. Moreover, research has demonstrated that the sense of attachment security can be enhanced via cognitive priming techniques. Studies using such techniques have shown that security priming results with similar outcomes as dispositional attachment security. The way security priming leads to these effects, however, is yet to be unveiled. Using fMRI we took one step in that direction and examined the neural mechanisms underlying enhanced attachment security. Participants were exposed to explicit and implicit security- and insecurity-related words. Security priming led to co-occurring activation in brain areas reflective of cognitive, affective, and behavioral processes (e.g., medial frontal cortex, parahippocampus, BA 6). There were activation differences based on attachment style. This research serves as an important step in mapping out the security process and supports a conceptualization of security as part of a behavioral system with multiple components. Copyright © 2012 Elsevier B.V. All rights reserved.
76 FR 25702 - National Maritime Security Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-05
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0310] National Maritime Security Advisory... Maritime Security Advisory Committee (NMSAC) will meet by teleconference to discuss the results of the... Maritime Organization (IMO). Agenda (1) Results of Seafarer Access Working Group's review and...
Security Considerations for E-Mental Health Interventions
Bennett, Anthony James; Griffiths, Kathleen Margaret
2010-01-01
Security considerations are an often overlooked and underfunded aspect of the development, delivery, and evaluation of e-mental health interventions although they are crucial to the overall success of any eHealth project. The credibility and reliability of eHealth scientific research and the service delivery of eHealth interventions rely on a high standard of data security. This paper describes some of the key methodological, technical, and procedural issues that need to be considered to ensure that eHealth research and intervention delivery meet adequate security standards. The paper concludes by summarizing broad strategies for addressing the major security risks associated with eHealth interventions. These include involving information technology (IT) developers in all stages of the intervention process including its development, evaluation, and ongoing delivery; establishing a wide-ranging discourse about relevant security issues; and familiarizing researchers and providers with the security measures that must be instituted in order to protect the integrity of eHealth interventions. PMID:21169173
Tier 1 and Tier 3 eAdjudication Business Rule Validation
2018-04-01
Approved for Public Distribution Defense Personnel and Security Research Center Office of People Analytics OPA-2018-038 PERSEREC-TR-18-06 April...Northrop Grumman Technology Services Leissa C. Nelson, Ph.D. Susan C. Reed Defense Personnel and Security Research Center Office of People Analytics...Defense Personnel and Security Research Center Office of People Analytics 400 Gigling Road, Seaside, CA 93955 OPA-2018-038 PERSEREC-TR-06 April
A Secure Multicast Framework in Large and High-Mobility Network Groups
NASA Astrophysics Data System (ADS)
Lee, Jung-San; Chang, Chin-Chen
With the widespread use of Internet applications such as Teleconference, Pay-TV, Collaborate tasks, and Message services, how to construct and distribute the group session key to all group members securely is becoming and more important. Instead of adopting the point-to-point packet delivery, these emerging applications are based upon the mechanism of multicast communication, which allows the group member to communicate with multi-party efficiently. There are two main issues in the mechanism of multicast communication: Key Distribution and Scalability. The first issue is how to distribute the group session key to all group members securely. The second one is how to maintain the high performance in large network groups. Group members in conventional multicast systems have to keep numerous secret keys in databases, which makes it very inconvenient for them. Furthermore, in case that a member joins or leaves the communication group, many involved participants have to change their own secret keys to preserve the forward secrecy and the backward secrecy. We consequently propose a novel version for providing secure multicast communication in large network groups. Our proposed framework not only preserves the forward secrecy and the backward secrecy but also possesses better performance than existing alternatives. Specifically, simulation results demonstrate that our scheme is suitable for high-mobility environments.
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Exploring the youth experience about sense of social security: a qualitative study
Chinekesh, Ahdieh; Mohammadi, Farahnaz; Motlagh, Mohammad Esmael; Eftekhari, Monir Baradaran; Ardalan, Gelayol; Djalalinia, Shirin
2017-01-01
Background Undoubtedly, one of the vital needs of man is security. Determinants and related factors to sense of social security is one of the most important research priorities, especially in adolescents and young people. Objective To identify the factors affecting the social security of the youth. Methods In 2017, using conventional content analysis, and benefiting from semi-structured in-depth interviews, we conducted a qualitative study exploring the opinions of young people about their feelings regarding social security. First, a targeted sampling method was determined to collect the data. Participants were young volunteers aged 18 to 30 who were selected from Tehran, the capital of Iran. Inclusion criteria for participants were willingness to participate in the study and ability to express their experiences. Data was extracted from 21 participants. Results The participants consisted of 21 young people who met the study inclusion criteria, of whom 12 participants were male. Their mean age was 24.4±0.41 years and their education varied from primary school to master’s degree. Under two main categories of the need for economic and financial security and the need for a safe society, we extracted 11 subcategories following 32 codes. According to the findings, most participants agreed on the important role that sense of social security has in their lives and their health. Conclusion The important role of sense of social security in participant’s lives and health was the main important point of our findings, emphasized by most of participants. Based on the results; the assessment of the specific needs of different target groups, the design, development and implementation of health programs led to more effective interventions. PMID:29560155
Food Security and Diet Among American Indians in the Midwest.
Berryhill, Kelly; Hale, Jason; Chase, Brian; Clark, Lauren; He, Jianghua; Daley, Christine M
2018-04-05
The purpose of this study was to determine levels of food security among American Indians (AI) living in the Midwest and possible correlations between food security levels and various health outcomes, diet, and demographic variables. This study used a cross-sectional design to determine health behaviors among AI. Participants (n = 362) were recruited by AI staff through various cultural community events in the Midwest, such as powwows and health fairs. Inclusion criteria included the following: age 18 years or older, self-identify as an AI, and willing to participate in the survey. Of all participants, 210 (58%) had either low or very low food security, with 96 in the very low category (26.5%). Participants with very low food security tended to have significantly more chronic conditions. Additional significant differences for very low food security existed by demographic variables, including having no insurance (p < 0.0001) or having a regular primary care provider (p = 0.0354). There was also a significant difference between food security levels and the consumption of fast food within the past week (p value = 0.0420), though no differences were found in fruit and vegetable consumption. AI in our sample had higher levels of food insecurity than those reported in the literature for other racial/ethnic groups. AI and non-Native health professionals should be aware of the gravity of food insecurity and the impact it has on overall health. Additional research is needed to determine specific aspects of food insecurity affecting different Native communities to develop appropriate interventions.
NASA Astrophysics Data System (ADS)
Morgan, John S.
2005-05-01
Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.
Persistent maritime traffic monitoring for the Canadian Arctic
NASA Astrophysics Data System (ADS)
Ulmke, M.; Battistello, G.; Biermann, J.; Mohrdieck, C.; Pelot, R.; Koch, W.
2017-05-01
This paper presents results of the Canadian-German research project PASSAGES (Protection and Advanced Surveillance System for the Arctic: Green, Efficient, Secure)1 on an advanced surveillance system for safety and security of maritime operations in Arctic areas. The motivation for a surveillance system of the Northwest Passage is the projected growth of maritime traffic along Arctic sea routes and the need for securing Canada's sovereignty by controlling its arctic waters as well as for protecting the safety of international shipping and the intactness of the arctic marine environment. To ensure border security and to detect and prevent illegal activities it is necessary to develop a system for surveillance and reconnaissance that brings together all related means, assets, organizations, processes and structures to build one homogeneous and integrated system. The harsh arctic conditions require a new surveillance concept that fuses heterogeneous sensor data, contextual information, and available pre-processed surveillance data and combines all components to efficiently extract and provide the maximum available amount of information. The fusion of all these heterogeneous data and information will provide improved and comprehensive situation awareness for risk assessment and decision support of different stakeholder groups as governmental authorities, commercial users and Northern communities.
Cheating in OSCEs: The Impact of Simulated Security Breaches on OSCE Performance.
Gotzmann, Andrea; De Champlain, André; Homayra, Fahmida; Fotheringham, Alexa; de Vries, Ingrid; Forgie, Melissa; Pugh, Debra
2017-01-01
Construct: Valid score interpretation is important for constructs in performance assessments such as objective structured clinical examinations (OSCEs). An OSCE is a type of performance assessment in which a series of standardized patients interact with the student or candidate who is scored by either the standardized patient or a physician examiner. In high-stakes examinations, test security is an important issue. Students accessing unauthorized test materials can create an unfair advantage and lead to examination scores that do not reflect students' true ability level. The purpose of this study was to assess the impact of various simulated security breaches on OSCE scores. Seventy-six 3rd-year medical students participated in an 8-station OSCE and were randomized to either a control group or to 1 of 2 experimental conditions simulating test security breaches: station topic (i.e., providing a list of station topics prior to the examination) or egregious security breach (i.e., providing detailed content information prior to the examination). Overall total scores were compared for the 3 groups using both a one-way between-subjects analysis of variance and a repeated measure analysis of variance to compare the checklist, rating scales, and oral question subscores across the three conditions. Overall total scores were highest for the egregious security breach condition (81.8%), followed by the station topic condition (73.6%), and they were lowest for the control group (67.4%). This trend was also found with checklist subscores only (79.1%, 64.9%, and 60.3%, respectively for the security breach, station topic, and control conditions). Rating scale subscores were higher for both the station topic and egregious security breach conditions compared to the control group (82.6%, 83.1%, and 77.6%, respectively). Oral question subscores were significantly higher for the egregious security breach condition (88.8%) followed by the station topic condition (64.3%), and they were the lowest for the control group (48.6%). This simulation of different OSCE security breaches demonstrated that student performance is greatly advantaged by having prior access to test materials. This has important implications for medical educators as they develop policies and procedures regarding the safeguarding and reuse of test content.
Attachment, self-worth, and peer-group functioning in middle childhood.
Booth-Laforce, Cathryn; Oh, Wonjung; Kim, Angel Hayoung; Rubin, Kenneth H; Rose-Krasnor, Linda; Burgess, Kim
2006-12-01
We evaluated links between peer-group functioning and indicators of attachment security in relation to both mother and father in middle childhood, among 73 10-year-olds (37 girls). Children's perceptions of security with both parents, coping styles with mother, and self-worth were assessed. Classmates, teachers, and mothers evaluated the participants' peer-related behavioral characteristics. Children's perceptions of security to both parents were related to others' appraisals of their social competence; perceptions of security to father were related to lower aggression. We did not find child gender effects, but children had higher security scores in relation to mother than to father. Self-worth perceptions mediated the relation between attachment and social competence.
Sandia National Laboratories: Malware Technical Exchange Meeting (MTEM)
Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Against Malware Detection of Malware Malware Research Malware in Mobile Devices Malware Attack Trends Malware Malware Research Malware in Mobile Devices Malware Attack Trends Success Stories of COTS Products
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Dialpoint Communications Corp., Pacel Corp., Quantum Group, Inc. (The), and Tradequest International, Inc.; Order of Suspension of Trading September 8... securities of Quantum Group, Inc. (The) because it has not filed any periodic reports since the period ended...
Cook, John T; Black, Maureen; Chilton, Mariana; Cutts, Diana; Ettinger de Cuba, Stephanie; Heeren, Timothy C; Rose-Jacobs, Ruth; Sandel, Megan; Casey, Patrick H; Coleman, Sharon; Weiss, Ingrid; Frank, Deborah A
2013-01-01
This review addresses epidemiological, public health, and social policy implications of categorizing young children and their adult female caregivers in the United States as food secure when they live in households with "marginal food security," as indicated by the U.S. Household Food Security Survey Module. Existing literature shows that households in the US with marginal food security are more like food-insecure households than food-secure households. Similarities include socio-demographic characteristics, psychosocial profiles, and patterns of disease and health risk. Building on existing knowledge, we present new research on associations of marginal food security with health and developmental risks in young children (<48 mo) and health in their female caregivers. Marginal food security is positively associated with adverse health outcomes compared with food security, but the strength of the associations is weaker than that for food insecurity as usually defined in the US. Nonoverlapping CIs, when comparing odds of marginally food-secure children's fair/poor health and developmental risk and caregivers' depressive symptoms and fair/poor health with those in food-secure and -insecure families, indicate associations of marginal food security significantly and distinctly intermediate between those of food security and food insecurity. Evidence from reviewed research and the new research presented indicates that households with marginal food security should not be classified as food secure, as is the current practice, but should be reported in a separate discrete category. These findings highlight the potential underestimation of the prevalence of adverse health outcomes associated with exposure to lack of enough food for an active, healthy life in the US and indicate an even greater need for preventive action and policies to limit and reduce exposure among children and mothers.
NASA Astrophysics Data System (ADS)
Koca, Güler; Kayılıoğlu, Begüm
2017-10-01
People’s expectations from the city have changed with the transformation of urban life. Urban space is not the only place where structures are formed. Urban space also consists of a combination of public spaces, semi-public spaces, and private spaces. As social and cultural phenomena, social events occur and people communicate with each other in these spaces. Therefore, streets and neighbourhoods composed of houses are not only physical spaces, but they also have important social and cultural dimensions. Modern life has brought a plethora of changes that affected the cities. Due to rapid changes today, the urban space forms in the conversion process are also designed differently. Historically, the space organization based on the streets of the semi-public life in Turkish cities has been transformed into mass housing and housing estate-style life in recent years. This transformation has been expressed differently in urban life not only physically, but also socially and culturally. The street which is regarded as a public space was a place where people communicated and social events happened in the past; but today, the streets are rife with security problems and they have become a concept evoking an image of street that is bordered with buildings. Spatial separation has emerged with middle and upper classes isolating themselves from the streets and heading towards gated communities, especially for security reasons. This social and spatial separation has begun to lead to various problems in cities. Eskisehir is an important Anatolian city located between Ankara, the capital of Turkey, and Istanbul. This research was conducted in two research sites in Eskisehir: one is a gated community where middle and upper-income groups reside, and the other is a residential neighbourhood where middle-income groups live. These groups were studied through a survey. The spatial preferences of the residents in these two areas and their relation with the neighbourhood are examined. These groups were surveyed and their relations with their relatives have been researched.
76 FR 7818 - Announcing a Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-11
... will be open to the public. The ISPAB was established by the Computer Security Act of 1987 (Pub. L. 100..., --Presentation on Science of Security relating to computer security research, --Presentation on Access of..., --A panel of Inspector Generals regarding privacy and security, and --Update on NIST Computer Security...
When trust defies common security sense.
Williams, Patricia A H
2008-09-01
Primary care medical practices fail to recognize the seriousness of security threats to their patient and practice information. This can be attributed to a lack of understanding of security concepts, underestimation of potential threats and the difficulty in configuration of security technology countermeasures. To appreciate the factors contributing to such problems, research into general practitioner security practice and perceptions of security was undertaken. The investigation focused on demographics, actual practice, issues and barriers, and practitioner perception. Poor implementation, lack of relevant knowledge and inconsistencies between principles and practice were identified as key themes. Also the results revealed an overwhelming reliance on trust in staff and in computer information systems. This clearly identified that both cultural and technical attributes contribute to the deficiencies in information security practice. The aim of this research is to understand user needs and problems when dealing with information security practice.
Analyzing handwriting biometrics in metadata context
NASA Astrophysics Data System (ADS)
Scheidat, Tobias; Wolf, Franziska; Vielhauer, Claus
2006-02-01
In this article, methods for user recognition by online handwriting are experimentally analyzed using a combination of demographic data of users in relation to their handwriting habits. Online handwriting as a biometric method is characterized by having high variations of characteristics that influences the reliance and security of this method. These variations have not been researched in detail so far. Especially in cross-cultural application it is urgent to reveal the impact of personal background to security aspects in biometrics. Metadata represent the background of writers, by introducing cultural, biological and conditional (changing) aspects like fist language, country of origin, gender, handedness, experiences the influence handwriting and language skills. The goal is the revelation of intercultural impacts on handwriting in order to achieve higher security in biometrical systems. In our experiments, in order to achieve a relatively high coverage, 48 different handwriting tasks have been accomplished by 47 users from three countries (Germany, India and Italy) have been investigated with respect to the relations of metadata and biometric recognition performance. For this purpose, hypotheses have been formulated and have been evaluated using the measurement of well-known recognition error rates from biometrics. The evaluation addressed both: system reliance and security threads by skilled forgeries. For the later purpose, a novel forgery type is introduced, which applies the personal metadata to security aspects and includes new methods of security tests. Finally in our paper, we formulate recommendations for specific user groups and handwriting samples.
Padgett, Deborah K.
2007-01-01
As the homelessness ‘crisis’ in the United States enters a third decade, few are as adversely affected as persons with serious mental illness. Despite recent evidence favoring a ‘housing first’ approach, the dominant ‘treatment first’ approach persists in which individuals must climb a ladder of program requirements before becoming eligible for an apartment of their own. Drawing upon the concept of ‘ontological security’, this qualitative study examines the subjective meaning of ‘home’ among 39 persons who were part of a unique urban experiment that provided New York City’s homeless mentally ill adults with immediate access to independent housing in the late 1990s. The study design involved purposively sampling from the experimental (housing first) group (N=21) and the control (treatment first) group (N=18) and conducting two life history interviews with each participant. Markers of ontological security--constancy, daily routines, privacy, and having a secure base for identity construction—provided sensitizing concepts for grounded theory analyses designed to also yield emergent, or new, themes. Findings revealed clear evidence of the markers of ontological security among participants living in their own apartments. This study expands upon previous research showing that homeless mentally ill persons are capable of independent living in the community. The emergent theme of ‘what’s next’ questions and uncertainty about the future points to the need to address problems of stigma and social exclusion that extend beyond the minimal achievement of having a ‘home’. PMID:17355900
Proposing Telecardiology Services on Cloud for Different Medical Institutions: A Model of Reference.
de la Torre-Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Rodrigues, Joel J P C
2017-08-01
For a cloud-based telecardiology solution to be established in any scenario, it is necessary to ensure optimum levels of security, as patient's data will not be in the same place from where access is gained. The main objective of this article is to present a secure, cloud-based solution for a telecardiology service in different scenarios: a hospital, a health center in a city, and a group of health centers in a rural area. iCanCloud software is used to simulate the scenarios. The first scenario will be a city hospital with over 220,000 patients at its emergency services, and ∼1 million outpatient consultations. For the health center in a city, it serves ∼107,000 medical consultations and 16,700 pediatric consultations/year. In the last scenario, a group of health centers in a rural area serve an average 437.08 consultations/month and around 15.6 a day. Each one of the solutions proposed shares common features including the following: secure authentication through smart cards, the use of StorageGRID technology, and load balancers. For all cases, the cloud is private and the estimated price of the solution would cost around 450 €/month. Thanks to the research conducted in this work, it has been possible to provide an adapted solution in the form of a telecardiology service for a hospital, city health center, and rural health centers that offer security, privacy, and robustness, and is also optimum for a large number of cloud requests.
Morales-Perez, Arcadio; Nava-Aguilera, Elizabeth; Legorreta-Soberanis, José; Paredes-Solís, Sergio; Balanzar-Martínez, Alejandro; Serrano-de Los Santos, Felipe René; Ríos-Rivera, Claudia Erika; García-Leyva, Jaime; Ledogar, Robert J; Cockcroft, Anne; Andersson, Neil
2017-05-30
Community mobilisation for prevention requires engagement with and buy in from those communities. In the Mexico state of Guerrero, unprecedented social violence related to the narcotics trade has eroded most community structures. A recent randomised controlled trial in 90 coastal communities achieved sufficient mobilisation to reduce conventional vector density indicators, self-reported dengue illness and serologically proved dengue virus infection. The Camino Verde intervention was a participatory research protocol promoting local discussion of baseline evidence and co-design of vector control solutions. Training of facilitators emphasised community authorship rather than trying to convince communities to do specific activities. Several discussion groups in each intervention community generated a loose and evolving prevention plan. Facilitators trained brigadistas, the first wave of whom received a small monthly stipend. Increasing numbers of volunteers joined the effort without pay. All communities opted to work with schoolchildren and for house-to-house visits by brigadístas. Children joined the neighbourhood vector control movements where security conditions permitted. After 6 months, a peer evaluation involved brigadista visits between intervention communities to review and to share progress. Although most communities had no active social institutions at the outset, local action planning using survey data provided a starting point for community authorship. Well-known in their own communities, brigadistas faced little security risk compared with the facilitators who visited the communities, or with governmental programmes. We believe the training focus on evidence-based dialogue and a plural community ownership through multiple design groups were key to success under challenging security conditions. ISRCTN27581154 .
Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.
2018-01-01
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921
Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P
2018-01-16
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.
Information Security Issues in Higher Education and Institutional Research
ERIC Educational Resources Information Center
Custer, William L.
2010-01-01
Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…
Mechanisms of Power within a Community-Based Food Security Planning Process
ERIC Educational Resources Information Center
McCullum, Christine; Pelletier, David; Barr, Donald; Wilkins, Jennifer; Habicht, Jean-Pierre
2004-01-01
A community food security movement has begun to address problems of hunger and food insecurity by utilizing a community-based approach. Although various models have been implemented, little empirical research has assessed how power operates within community-based food security initiatives. The purpose of this research was to determine how power…
International Competitiveness: A National Security Perspective
1989-06-01
Maxwell AFB AL 36112-5532. International Competitiveness A National Security Perspective 0 C 0 Thank you for your assistance / , ’I RELSEARCJ RhINORT NO...AU-ARI-88-11 International Competitiveness A National Security Perspective RONALD H. DABROWSKI, Maj, USAF Research Fellow Airpower Research Institute...26 International Competition ......................... 26 Identification of Firms Involved ..................... 26 Continued Leadership in
Do you think you have what it takes to set up a long-term video monitoring unit?
Smith, Sheila L
2006-03-01
The single most important factor when setting up a long-term video monitoring unit is research. Research all vendors by traveling to other sites and calling other facilities. Considerations with equipment include the server, acquisition units, review units, cameras, software, and monitors as well as other factors including Health Insurance Portability and Accountability Act (HIPAA) compliance. Research customer support including both field and telephone support. Involve your Clinical Engineering Department in your investigations. Be sure to obtain warranty information. Researching placement of the equipment is essential. Communication with numerous groups is vital. Administration, engineers, clinical engineering, physicians, infection control, environmental services, house supervisors, security, and all involved parties should be involved in the planning.
NASA Astrophysics Data System (ADS)
Kurnianto, Ari; Isnanto, Rizal; Widodo, Aris Puji
2018-02-01
Information security is a problem effected business process of an organization, so it needs special concern. Information security assessment which is good and has international standard is done using Information Security Management System (ISMS) ISO/IEC 27001:2013. In this research, the high level assessment has been done using ISO/IEC 27001:2013 to observe the strength of information secuity in Ministry of Internal Affairs. The research explains about the assessment of information security management which is built using PHP. The input data use primary and secondary data which passed observation. The process gets maturity using the assessment of ISO/IEC 27001:2013. GAP Analysis observes the condition now a days and then to get recommendation and road map. The result of this research gets all of the information security process which has not been already good enough in Ministry of Internal Affairs, gives recommendation and road map to improve part of all information system being running. It indicates that ISO/IEC 27001:2013 is good used to rate maturity of information security management. As the next analyzation, this research use Clause and Annex in ISO/IEC 27001:2013 which is suitable with condition of Data Center and Data Recovery Center, so it gets optimum result and solving problem of the weakness information security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the research that has been undertaken as background for preparation of a marketing campaign for middle and high school students to increase interest in national security careers at the National Nuclear Security Administration. This work is a part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. Previous research on the development of a properly trained and skilled national security workforce has identified a lack of interest by k-12 students in the STEM (Science, Technology, Engineering, and Mathematics) fields. Further, participation in these careers by womenmore » and minority populations is limited and is not increasing. Added to this are low educational achievement levels in New Mexico, where the marketing campaign will be deployed.« less
DOT National Transportation Integrated Search
2003-05-01
The Department of Transportation's (DOT) Research and Special Programs Administration (RSPA) began research in to assess the vulnerabilities of the nation's transportation infrastructure and develop needed improvements in security in June 2001. The g...
Ethiopian-Eritrean Conflict: Security Implications for the Horn of Africa
2012-03-19
and Eritrea accepted a diplomatic team from the United States and Rwanda to discuss and prevent the war from being pushed to its logical conclusion...2001), p. 6. 16 Medhane Tadesse ,The Djibouti-Eritrea Conflict, ( Inter Africa Group, Center for Dialogue on Humanitarian, Peace and Development...Tonui, Future Stability in the Horn of Africa, Strategy Research Project (U.S. Army War College, 2000), p. 18. 36 Medhane Tadesse ,The Djibouti
Fernando, Sumadhya Deepika; Rodrigo, Chaturaka; de Silva, Nipun; Semege, Saveen; Rajapakse, Senaka; Samaranayake, Nilakashi; Senenayake, Sanath; Premaratne, Risintha Gayan
2014-09-01
The security forces are a high risk group for malaria transmission in Sri Lanka. Interrupting transmission and maintaining surveillance in this group is an important component of elimination efforts. The objective of the study was to develop a prototype educational programme on malaria for security forces serving in endemic areas. An interactive seminar was designed to deliver the required knowledge. The content was on current status, transmission, signs and symptoms and the role of security personnel in identification and prevention of malaria. Each seminar was preceded by a pre-test and followed by a post test to assess the improvement of knowledge. Fifty seminars were held in eight districts over 2 months with 2301 security forces personnel participating. Pre seminar knowledge on malaria was significantly better in the medical corps, those who had completed secondary education and in the Army compared to other security forces (p<0.001). Participation in the seminar resulted in an improvement in all domains tested as shown by test scores in post seminar assessment (p<0.001). Conducting a formal educational programme is an effective strategy to improve awareness on malaria amongst security forces personnel who are a high risk group for re-introduction of malaria into the country. © The Author 2014. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
2009-03-03
ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and
78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...
Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.
ERIC Educational Resources Information Center
O'Lear, Shannon
1999-01-01
Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…
ERIC Educational Resources Information Center
National Academies Press, 2012
2012-01-01
"Research Universities and the Future of America" presents critically important strategies for ensuring that our nation's research universities contribute strongly to America's prosperity, security, and national goals. Widely considered the best in the world, our nation's research universities today confront significant financial…
ERIC Educational Resources Information Center
Smith, Gwendolynn T.
2012-01-01
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
Implicit Trust between the Uyghur and the Han in Xinjiang, China
Li, Xueting; Fang, Huizhen; Yang, Shengmin; Liu, Jia
2013-01-01
Trust is a vital lubricant that increases the sense of security in social interactions. In this study, we investigated the intergroup trust between the Uyghur and the Han, the two largest ethnic groups in Xinjiang, China, with a Go/No-Go Association Task. Specifically, we instructed Uyghur and Han participants to respond to ethnic faces (Uyghur vs. Han) and trust/distrust words and measured the strength of the automatic associations between the faces and words for both in-group and out-group pairs. As expected, both ethnic groups showed implicit in-group trust and out-group distrust, but the Han group demonstrated stronger in-group trust and out-group distrust toward the Uyghur than the Uyghur group toward the Han. However, the magnitude of distrust of the Han toward the Uyghur was small to medium as compared with that reported by other intergroup relationship research. In addition, participant geographic location was associated with out-group distrust. These findings offer implications for developing effective strategies to encourage trust between conflicting groups. PMID:23977155
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-15
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] ROK Entertainment Group, Inc., RussOil Corp., Tricell, Inc., Tunex International, Inc. (n/k/a Aone Dental International Group, Inc.), and Wireless Age... there is a lack of current and accurate information concerning the securities of Wireless Age...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-11
... intermodal container loaded with eyes crosswise, grouped in rows, in which the coils are loaded to contact... cargo securement regulations for the transportation of groups of metal coils with eyes crosswise, as... cargo securement regulations (then at 49 CFR 393.100(c)) for the transportation of groups of metal coils...
The Influence of Secure Emotional Expression on Team Effectiveness
ERIC Educational Resources Information Center
Bailey, Emily; Dewitt, Matt
2014-01-01
The present study examined the relationship between group effectiveness and secure emotional expression over the course of a 10 week period. The participants consisted of 12 college students who were enrolled in a senior seminar on teamwork. Participants worked in two groups of six and participated in a group meeting each week that consisted of a…
NASA Astrophysics Data System (ADS)
Frühwirth, Christian
Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.
EPA/ORD NATIONAL EXPOSURE RESEARCH LABORATORY MEASUREMENT SCIENCE SUPPORT FOR HOMELAND SECURITY
This product describes the National Exposure Research Laboratory research and development support for homeland security through the proposed National Exposure Measurements Center (NEMC). Key NEMC functional areas depicted in this poster are: standardized analytical method develo...
Secure Base Priming Diminishes Conflict-Based Anger and Anxiety
Koren, Tamara; Bartholomew, Kim
2016-01-01
This study examines the impact of a visual representation of a secure base (i.e. a secure base prime) on attenuating experimentally produced anger and anxiety. Specifically, we examined the assuaging of negative emotions through exposure to an image of a mother-infant embrace or a heterosexual couple embracing. Subjects seated at a computer terminal rated their affect (Pre Affect) using the Affect Adjective Checklist (AAC) then listened to two sets of intense two person conflicts. After the first conflict exposure they rated affect again (Post 1 AAC). Following the second exposure they saw a blank screen (control condition), pictures of everyday objects (distraction condition) or a photo of two people embracing (Secure Base Prime condition). They then reported emotions using the Post 2 AAC. Compared to either control or distraction subjects, Secure Base Prime (SBP) subjects reported significantly less anger and anxiety. These results were then replicated using an internet sample with control, SBP and two new controls: Smiling Man (to control for expression of positive affect) and Cold Mother (an unsmiling mother with infant). The SBP amelioration of anger and anxiety was replicated with the internet sample. No control groups produced this effect, which was generated only by a combination of positive affect in a physically embracing dyad. The results are discussed in terms of attachment theory and research on spreading activation. PMID:27606897
ERIC Educational Resources Information Center
Schultz, Christopher
2012-01-01
Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…
ERIC Educational Resources Information Center
Kramer, Aleksey
2013-01-01
The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…
ERIC Educational Resources Information Center
Edwards, Gregory
2011-01-01
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
1981-03-01
Research Instructor of Computer Scienr-. Reviewed by: Released by: WILLIAM M. TOLLES Department puter Science Dean of Research 4c t SECURITY...Lyle A. Cox, Roger R. Schell, and Sonja L. Perdue 9. PERFORMING ORGANIZATION NAME ANO ADDRESS 10. PROGRAM ELEMENT. PROJECT. TASK AREA A WORK UNIT... Computer Networks, Operating Systems, Computer Security 20. AftUrCT (Cnthm, w v re eae old* It n..*p and idm 0 F W blk ..m.m.o’) ",A_;he security
Ferrara, Pietro; Scancarello, Marta; Khazrai, Yeganeh M; Romani, Lorenza; Cutrona, Costanza; DE Gara, Laura; Bona, Gianni
2016-10-12
The nutritional status of foster children, the quality of daily menus in group homes and the Food Security inside these organizations have been poorly studied and this study means to investigate them. A sample of 125 children, ranging in age from 0-17 years, among seven group homes (group A) was compared with 121 children of the general population we (group B). To evaluate nutritional status, BMI percentiles were used. Mean percentiles of both groups were compared through statistical analysis. Both nutritional and caloric daily distributions in each organization were obtained using the 24-hour recall method. A specific questionnaire was administered to evaluate Food Security. From the analysis of mean BMI-for-age (or height-for-length) percentiles, did not observe statistically significant differences between group A and group B. The average daily nutrient and calorie distribution in group homes proves to be nearly optimal with the exception of a slight excess in proteins and a slight deficiency in PUFAs. Moreover, a low intake of iron and calcium was revealed. All organizations obtained a "High Food Security" profile. Nutritional conditions of foster children are no worse than that of children of the general population. Foster care provides the necessary conditions to support their growth.
A preliminary cyber-physical security assessment of the Robot Operating System (ROS)
NASA Astrophysics Data System (ADS)
McClean, Jarrod; Stull, Christopher; Farrar, Charles; Mascareñas, David
2013-05-01
Over the course of the last few years, the Robot Operating System (ROS) has become a highly popular software framework for robotics research. ROS has a very active developer community and is widely used for robotics research in both academia and government labs. The prevalence and modularity of ROS cause many people to ask the question: "What prevents ROS from being used in commercial or government applications?" One of the main problems that is preventing this increased use of ROS in these applications is the question of characterizing its security (or lack thereof). In the summer of 2012, a crowd sourced cyber-physical security contest was launched at the cyber security conference DEF CON 20 to begin the process of characterizing the security of ROS. A small-scale, car-like robot was configured as a cyber-physical security "honeypot" running ROS. DEFFCON-20 attendees were invited to find exploits and vulnerabilities in the robot while network traffic was collected. The results of this experiment provided some interesting insights and opened up many security questions pertaining to deployed robotic systems. The Federal Aviation Administration is tasked with opening up the civil airspace to commercial drones by September 2015 and driverless cars are already legal for research purposes in a number of states. Given the integration of these robotic devices into our daily lives, the authors pose the following question: "What security exploits can a motivated person with little-to-no experience in cyber security execute, given the wide availability of free cyber security penetration testing tools such as Metasploit?" This research focuses on applying common, low-cost, low-overhead, cyber-attacks on a robot featuring ROS. This work documents the effectiveness of those attacks.
NASA Astrophysics Data System (ADS)
Klein, Eran; Ojemann, Jeffrey
2016-08-01
Objective. Implantable brain-computer interface (BCI) research promises improvements in human health and enhancements in quality of life. Informed consent of subjects is a central tenet of this research. Rapid advances in neuroscience, and the intimate connection between functioning of the brain and conceptions of the self, make informed consent particularly challenging in BCI research. Identification of safety and research-related risks associated with BCI devices is an important step in ensuring meaningful informed consent. Approach. This paper highlights a number of BCI research risks, including safety concerns, cognitive and communicative impairments, inappropriate subject expectations, group vulnerabilities, privacy and security, and disruptions of identity. Main results. Based on identified BCI research risks, best practices are needed for understanding and incorporating BCI-related risks into informed consent protocols. Significance. Development of best practices should be guided by processes that are: multidisciplinary, systematic and transparent, iterative, relational and exploratory.
Klein, Eran; Ojemann, Jeffrey
2016-08-01
Implantable brain-computer interface (BCI) research promises improvements in human health and enhancements in quality of life. Informed consent of subjects is a central tenet of this research. Rapid advances in neuroscience, and the intimate connection between functioning of the brain and conceptions of the self, make informed consent particularly challenging in BCI research. Identification of safety and research-related risks associated with BCI devices is an important step in ensuring meaningful informed consent. This paper highlights a number of BCI research risks, including safety concerns, cognitive and communicative impairments, inappropriate subject expectations, group vulnerabilities, privacy and security, and disruptions of identity. Based on identified BCI research risks, best practices are needed for understanding and incorporating BCI-related risks into informed consent protocols. Development of best practices should be guided by processes that are: multidisciplinary, systematic and transparent, iterative, relational and exploratory.
Neutron and Gamma Imaging for National Security Applications
NASA Astrophysics Data System (ADS)
Hornback, Donald
2017-09-01
The Department of Energy, National Nuclear Security Administration (NNSA), Office of Defense Nuclear Nonproliferation Research and Development (DNN R&D/NA-22) possesses, in part, the mission to develop technologies in support of nuclear security efforts in coordination with other U.S. government entities, such as the Department of Defense and the Department of Homeland Security. DNN R&D has long supported research in nuclear detection at national labs, universities, and through the small business innovation research (SBIR) program. Research topics supported include advanced detector materials and electronics, detection algorithm development, and advanced gamma/neutron detection systems. Neutron and gamma imaging, defined as the directional detection of radiation as opposed to radiography, provides advanced detection capabilities for the NNSA mission in areas of emergency response, international safeguards, and nuclear arms control treaty monitoring and verification. A technical and programmatic overview of efforts in this field of research will be summarized.
Security implications and governance of cognitive neuroscience.
Kosal, Margaret E; Huang, Jonathan Y
2015-01-01
In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists.
Security in the Cache and Forward Architecture for the Next Generation Internet
NASA Astrophysics Data System (ADS)
Hadjichristofi, G. C.; Hadjicostis, C. N.; Raychaudhuri, D.
The future Internet architecture will be comprised predominately of wireless devices. It is evident at this stage that the TCP/IP protocol that was developed decades ago will not properly support the required network functionalities since contemporary communication profiles tend to be data-driven rather than host-based. To address this paradigm shift in data propagation, a next generation architecture has been proposed, the Cache and Forward (CNF) architecture. This research investigates security aspects of this new Internet architecture. More specifically, we discuss content privacy, secure routing, key management and trust management. We identify security weaknesses of this architecture that need to be addressed and we derive security requirements that should guide future research directions. Aspects of the research can be adopted as a step-stone as we build the future Internet.
Using connected objects in clinical research.
Dhainaut, Jean-François; Huot, Laure; Pomar, Valérie Bouchara; Dubray, Claude
2018-02-01
Connected objects (CO), whether medical devices or not, are used in clinical research for data collection, a specific activity (communication, diagnosis, effector, etc.), or several functions combined. Their validation should be based on three approaches: technical and clinical reliability, data protection and cybersecurity. Consequently, the round table recommends that the typology of COs, their uses and limitations, be known and shared by all, particularly for implementing precise specifications. COs are used in clinical research during observational studies (assessment of the device itself or data collection), randomized studies, where only one group has a CO (assessment of its impact on patient follow-up or management), or randomized studies where both groups have a CO, which is then used as a tool to help with assessment. The benefits of using COs in clinical research includes: improved collection and quality of data, compliance of patients and pharmacovigilance, easier implementation of e-cohorts and a better representative balance of patients. The societal limits and risks identified relate to the sometimes intrusive nature of certain collected parameters and the possible misuse of data. The round table recommends the following on this last point: anticipation, by securing transmission methods, the qualification of data hosts, and assessment of the object's vulnerability. For this, a risk analysis appears necessary for each project. It is also necessary to accurately document the data flow, in order to inform both patients and healthcare professionals and to ensure adequate security. Anticipating regulatory changes and involving users starting from the study design stage are also recommended. Copyright © 2018 Société française de pharmacologie et de thérapeutique. Published by Elsevier Masson SAS. All rights reserved.
Radioactive source security: the cultural challenges.
Englefield, Chris
2015-04-01
Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
A form of relapse prevention for men in a high security hospital.
Newton, Liam; Coles, Dawn; Quayle, Marie
2005-01-01
Marlatt and Gordon's relapse prevention model has evolved, and been applied to many repetitive problem behaviours, including drug use, gambling and sexual offending. High security hospital patients often present with a number of such behaviours. To evaluate a relapse prevention group in one high security hospital. Nine patients were selected on clinical need for the group. In a naturalistic study design, each completed several self-report questionnaires pre- and post-group. Analysis of group results demonstrated a significant increase in guilt and acceptance of responsibility for offences (GBAI ratings), and reduced endorsement of pro-offending thinking styles (PICTS). Movement towards increased empathy, and decreased impulsivity and venturesomeness, did not reach significance. All participants showed some changes in desired directions but effects were small. Both relapse prevention and its evaluation are limited in high security hospitals by the restricted opportunities for testing out new skills. The feasibility of delivering an RP programme and evaluating it in high security has nevertheless been established. The small effects found may be promising, and suggest both justification and need for a randomized controlled trial of this approach in that setting. Copyright (c) 2005 John Wiley & Sons, Ltd.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less
Increasing the resilience and security of the United States' power infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
2015-08-01
The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-worldmore » conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.« less
School Security Measures and Longitudinal Trends in Adolescents' Experiences of Victimization.
Fisher, Benjamin W; Mowen, Thomas J; Boman, John H
2018-06-01
Although school security measures have become a common fixture in public schools across the United States, research on the relationship between security and adolescent victimization is mixed, with very few studies examining trends in adolescent victimization across time. Using two waves of data from the Educational Longitudinal Study 2002 (N = 7659; 50.6% female; 56.7% White, 13.3% Black, 13.5% Hispanic, 11.3% Asian American, 5.4% other race), results from a series of multi-level models demonstrate that adolescents in schools with more security measures report higher odds of being threatened with harm, and no difference in odds of being in a physical altercation or having something stolen over time. Although prior research has established racial disparities in using school security measures, results demonstrate inconsistent patterns in the extent to which adolescents' race conditions the relationship between security and victimization. The findings are discussed in light of existing theoretical and empirical work, and implications for both research and practice are offered.
Security of electronic mental health communication and record-keeping in the digital age.
Elhai, Jon D; Frueh, B Christopher
2016-02-01
The mental health field has seen a trend in recent years of the increased use of information technology, including mobile phones, tablets, and laptop computers, to facilitate clinical treatment delivery to individual patients and for record keeping. However, little attention has been paid to ensuring that electronic communication with patients is private and secure. This is despite potentially deleterious consequences of a data breach, which are reported in the news media very frequently in modern times. In this article, we present typical security concerns associated with using technology in clinical services or research. We also discuss enhancing the privacy and security of electronic communication with clinical patients and research participants. We offer practical, easy-to-use software application solutions for clinicians and researchers to secure patient communication and records. We discuss such issues as using encrypted wireless networks, secure e-mail, encrypted messaging and videoconferencing, privacy on social networks, and others. © Copyright 2015 Physicians Postgraduate Press, Inc.
Use of focus groups to study absenteeism due to illness.
Høverstad, T; Kjølstad, S
1991-10-01
Reasons for sick leaves are often complex and influenced by nonmedical factors. We have used focus groups, a qualitative research method, to study the relationship between working conditions and absenteeism due to illness in both an industrial company and an insurance company. We organized 10 focus groups within each company, with participants randomly selected from departments having similar work tasks within each company. According to the groups, the most important working conditions that influenced absenteeism were (a) feeling of well-being at work (mainly defined as security in social relations), (b) the organization of the work, and (c) the department leader. Factors considered to be less important included: number of employees, male/female ratios, group norms for absenteeism, age distribution, work-related illness, substance abuse, and work loads. There was substantial agreement between the groups, indicating that our findings may be relevant to other companies.
NASA Technical Reports Server (NTRS)
Tencati, Ron
1991-01-01
An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.
Barr, W; Brown, A; Quinn, B; McFarlane, J; McCabe, R; Whittington, R
2013-02-01
In the past decade UK government policy has been to develop alternative care for women detained in secure psychiatric hospital. This study evaluated the relative benefits of community-based step-down housing. Comparisons were made between female patients in community step-down housing and a control group in secure hospital who were on the waiting list for the houses. For each woman in the sample, a range of assessments was conducted on three separate occasions over a 12-month period. We noted a gradual improvement over time in women in both settings. However, by the final assessment psychological well-being and security needs were significantly better in the community group (P < 0.05). Although risks for violence and social functioning were also somewhat better in this group throughout the study, no statistically significant differences between the groups were found in these areas at any assessment time. This study has generated evidence in support of the further development of high-support step-down community housing for women in secure psychiatric care. This initiative may provide greater personal freedom and enhanced relational security for the women concerned while also facilitating improvements in their psychological well-being, with no increased risk to the women themselves or to the wider community. © 2012 Blackwell Publishing.
Buchanan, Elizabeth; Aycock, John; Dexter, Scott; Dittrich, David; Hvizdak, Erin
2011-06-01
This paper explores the growing concerns with computer science research, and in particular, computer security research and its relationship with the committees that review human subjects research. It offers cases that review boards are likely to confront, and provides a context for appropriate consideration of such research, as issues of bots, clouds, and worms enter the discourse of human subjects review.
Securing Wireless Communications of the Internet of Things from the Physical Layer, An Overview
NASA Astrophysics Data System (ADS)
Zhang, Junqing; Duong, Trung; Woods, Roger; Marshall, Alan
2017-08-01
The security of the Internet of Things (IoT) is receiving considerable interest as the low power constraints and complexity features of many IoT devices are limiting the use of conventional cryptographic techniques. This article provides an overview of recent research efforts on alternative approaches for securing IoT wireless communications at the physical layer, specifically the key topics of key generation and physical layer encryption. These schemes can be implemented and are lightweight, and thus offer practical solutions for providing effective IoT wireless security. Future research to make IoT-based physical layer security more robust and pervasive is also covered.
2018-01-01
BACKGROUND/OBJECTIVES This cross-sectional study assessed household food security status and determined its association with diet quality and weight status among indigenous women from the Mah Meri tribe in Peninsular Malaysia. SUBJECTS/METHODS The Radimer/Cornell Hunger and Food Insecurity Instrument and the Malaysian Healthy Eating Index (HEI) were used to assess household food security status and diet quality, respectively. Information on socio-demographic characteristics and 24-hour dietary recall data were collected through face-to-face interview, and anthropometric measurements including weight, height, and body mass index (BMI) were obtained from 222 women. RESULTS Majority of households (82.9%) experienced different levels of food insecurity: 29.3% household food insecurity, 23.4% individual food insecurity, and 30.2% fell into the child hunger group. The food-secure group had significantly fewer children and smaller household sizes than the food-insecure groups (P < 0.05). The mean household income, income per capita, and food expenditure significantly decreased as food insecurity worsened (P < 0.001). The food-secure group had significantly higher Malaysian HEI scores for grains and cereals (P < 0.01), as well as for meat, poultry, and eggs (P < 0.001), than the food-insecure groups. The child-hunger group had significantly higher fat (P < 0.05) and sodium (P < 0.001) scores than the food-secure and household food-insecure groups. Compared to the individual food-insecure and child-hunger groups, multivariate analysis of covariance showed that the food-secure group was significantly associated with a higher Malaysian HEI score while the household food-insecure group was significantly associated with a higher BMI after controlling for age (P < 0.025). CONCLUSIONS The majority of indigenous households faced food insecurity. Food insecurity at the individual and child levels was associated with lower quality of diet, while food insecurity at the household level was associated with higher body weight. Therefore, a substantial effort by all stakeholders is warranted to improve food insecurity among poorer households. The results suggest a pressing need for nutritional interventions to improve dietary intake among low income households. PMID:29629030
Pei, Chong Su; Appannah, Geeta; Sulaiman, Norhasmah
2018-04-01
This cross-sectional study assessed household food security status and determined its association with diet quality and weight status among indigenous women from the Mah Meri tribe in Peninsular Malaysia. The Radimer/Cornell Hunger and Food Insecurity Instrument and the Malaysian Healthy Eating Index (HEI) were used to assess household food security status and diet quality, respectively. Information on socio-demographic characteristics and 24-hour dietary recall data were collected through face-to-face interview, and anthropometric measurements including weight, height, and body mass index (BMI) were obtained from 222 women. Majority of households (82.9%) experienced different levels of food insecurity: 29.3% household food insecurity, 23.4% individual food insecurity, and 30.2% fell into the child hunger group. The food-secure group had significantly fewer children and smaller household sizes than the food-insecure groups ( P < 0.05). The mean household income, income per capita, and food expenditure significantly decreased as food insecurity worsened ( P < 0.001). The food-secure group had significantly higher Malaysian HEI scores for grains and cereals ( P < 0.01), as well as for meat, poultry, and eggs ( P < 0.001), than the food-insecure groups. The child-hunger group had significantly higher fat ( P < 0.05) and sodium ( P < 0.001) scores than the food-secure and household food-insecure groups. Compared to the individual food-insecure and child-hunger groups, multivariate analysis of covariance showed that the food-secure group was significantly associated with a higher Malaysian HEI score while the household food-insecure group was significantly associated with a higher BMI after controlling for age ( P < 0.025). The majority of indigenous households faced food insecurity. Food insecurity at the individual and child levels was associated with lower quality of diet, while food insecurity at the household level was associated with higher body weight. Therefore, a substantial effort by all stakeholders is warranted to improve food insecurity among poorer households. The results suggest a pressing need for nutritional interventions to improve dietary intake among low income households.
Jones, Marcella K; Bloch, Gary; Pinto, Andrew D
2017-08-17
To examine the development and implementation of a novel income security intervention in primary care. A retrospective, descriptive chart review of all patients referred to the Income Security Heath Promotion service during the first year of the service (December 2013-December 2014). A multisite interdisciplinary primary care organisation in inner city Toronto, Canada, serving over 40 000 patients. The study population included 181 patients (53% female, mean age 48 years) who were referred to the Income Security Health Promotion service and engaged in care. The Income Security Health Promotion service consists of a trained health promoter who provides a mixture of expert advice and case management to patients to improve income security. An advisory group, made up of physicians, social workers, a community engagement specialist and a clinical manager, supports the service. Sociodemographic information, health status, referral information and encounter details were collected from patient charts. Encounters focused on helping patients with increasing their income (77.4%), reducing their expenses (58.6%) and improving their financial literacy (26.5%). The health promoter provided an array of services to patients, including assistance with taxes, connecting to community services, budgeting and accessing free services. The service could be improved with more specific goal setting, better links to other members of the healthcare team and implementing routine follow-up with each patient after discharge. Income Security Health Promotion is a novel service within primary care to assist vulnerable patients with a key social determinant of health. This study is a preliminary look at understanding the functioning of the service. Future research will examine the impact of the Income Security Health Promotion service on income security, financial literacy, engagement with health services and health outcomes. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
Bergmans, Rachel S; Palta, Mari; Robert, Stephanie A; Berger, Lawrence M; Ehrenthal, Deborah B; Malecki, Kristen M
2018-06-01
Evidence suggests both that chronic inflammation mediates the association of food insecurity with adverse health outcomes and that diet may be a significant source of inflammation among food insecure individuals. To examine whether food security status is associated with dietary inflammatory potential. Cross-sectional data came from the National Health and Nutrition Examination Survey (NHANES), cycles 2007 to 2014 (n=10,630). The analysis sample is representative of noninstitutionalized US adults with an income-to-poverty ratio ≤3.00. Dietary Inflammatory Index (DII) score, calculated using the average of two 24-hour dietary recalls, was the main outcome measure. Type III F tests or χ 2 tests compared population characteristics by food security status, defined using the US Food Security Survey Module. Multivariable linear regression was used to estimate the association between food security status and the DII score and moderation by demographic factors. Survey weighting procedures accounted for the effects of stratification and clustering used in the NHANES study design. When accounting for socioeconomic status, demographic factors, and health status, DII score was higher at greater levels of food insecurity (P=0.0033). Those with very low food security had a 0.31 (95% CI=0.12 to 0.49) higher DII score than those with high food security. Age moderated the association between food security status and DII score (interaction P=0.0103), where the magnitude of the association between DII score and severity of food insecurity was higher for those >65 years than for younger age groups. Food security status may be associated with dietary inflammatory potential, which is hypothesized to play a role in multiple chronic health conditions. Further research is needed to determine the causal nature of this relationship and evaluate how best to implement programs designed to address health disparities within food insecure populations. Copyright © 2018 Academy of Nutrition and Dietetics. Published by Elsevier Inc. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-21
... SECURITIES AND EXCHANGE COMMISSION In the Matter of Cape Systems Group, Inc., Caribbean Cigar...., File No. 500-1; Order of Suspension of Trading October 19, 2010. It appears to the Securities and... Cape Systems Group, Inc. because it has not filed any periodic reports since the period ended December...
Security patterns and a weighting scheme for mobile agents
NASA Astrophysics Data System (ADS)
Walker, Jessie J.
The notion of mobility has always been a prime factor in human endeavor and achievement. This need to migrate by humans has been distilled into software entities, which are their representatives on distant environments. Software agents are developed to act on behalf of a user. Mobile agents were born from the understanding that many times it was much more useful to move the code (program) to where the resources are located, instead of connecting remotely. Within the mobile agent research community, security has traditionally been the most defining issue facing the community and preventing the paradigm from gaining wide acceptance. There are still numerous difficult problems being addressed with very few practical solutions, such as the malicious host and agent problems. These problems are some of the most active areas of research within the mobile agent community. The major principles, facets, fundamental concepts, techniques and architectures of the field are well understood within the community. This is evident by the many mobile agent systems developed in the last decade that share common core components such as agent management, communication facilities, and mobility services. In other words new mobile agent systems and frameworks do not provide any new insights into agent system architecture or mobility services, agent coordination, communication that could be useful to the agent research community, although these new mobile agent systems do in many instances validate, refine, demonstrate the reuse of many previously proposed and discussed mobile agent research elements. Since mobile agent research for the last decade has been defined by security and related issues, our research into security patterns are within this narrow arena of mobile agent research. The research presented in this thesis examines the issue of mobile agent security from the standpoint of security pattern documented from the universe of mobile agent systems. In addition, we explore how these documented security patterns can be quantitatively compared based on a unique weighting scheme. The scheme is formalized into a theory that can be used improve the development of secure mobile agents and agent-based systems.
ERIC Educational Resources Information Center
Pierre, Joseph D.
2011-01-01
Information security systems (ISS) have been designed to protect assets from damages and from unauthorized access internally as well as externally. This research is promising similar protection from ISS methods that could prevent intoxicated individuals under the influence of alcohol from driving. However, previous research has shown significant…
17 CFR 200.13b - Director of the Office of Public Affairs, Policy Evaluation, and Research.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Director of the Office of Public Affairs, Policy Evaluation, and Research. 200.13b Section 200.13b Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Organization and Program Management General...
Case Study: Creation of a Degree Program in Computer Security. White Paper.
ERIC Educational Resources Information Center
Belon, Barbara; Wright, Marie
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
78 FR 27966 - Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-13
... Working Group on Improving Cybersecurity and Resilience Through Acquisition AGENCY: Office of Emergency... the Department of Homeland Security and the Federal Acquisition Regulation Council, are required to... security standards into acquisition planning and contract administration and address what steps [[Page...
2007-09-11
clerics Abu Bakar Baasyir and Abdullah Sungkar, began demanding the establishment of sharia law in Indonesia. The two considered themselves the...the violent Abu Sayyaf Group. It has also launched a Regional Maritime Security Initiative to enhance security in the Straits of Malacca, increase...15 The Abu Sayyaf Group
77 FR 19300 - National Infrastructure Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Group regarding the scope of the next phase of the Working Group's critical infrastructure resilience...
NASA Astrophysics Data System (ADS)
Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.
2017-10-01
IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.
Risholm Mothander, Pia; Furmark, Catarina; Neander, Kerstin
2018-06-01
This study presents effects of adding Circle of Security-Parenting (COS-P) to an already established comprehensive therapeutic model for early parent-child intervention in three Swedish infant mental health (IMH) clinics. Parents' internal representations and quality of parent-infant interaction were studied in a clinical sample comprised of 52 parent-infant dyads randomly allocated to two comparable groups. One group consisted of 28 dyads receiving treatment as usual (TAU) supplemented with COS-P in a small group format, and another group of 24 dyads receiving TAU only. Assessments were made at baseline (T1), 6 months after inclusion (T2) and 12 months after inclusion (T3). Changes over time were explored in 42 dyads. In the COS-P group, the proportion of balanced representations, as assessed with Working Model of the Child Interview (WMCI), significantly increased between T1 and T3. Further, the proportion of emotionally available interactions, as assessed with Emotional Availability scales (EA), significantly increased over time in the COS-P group. Improvements in the TAU-group were close to significant. Limitations of the study are mainly related to the small sample size. Strength is the real world character of the study, where COS-P was implemented in a clinical context not otherwise adapted to research. We conclude by discussing the value of supplementing TAU with COS-P in IMH treatment. © 2017 The Authors. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.
Jiménez Calvo, J; Hualde Alfaro, A; Raigoso Ortega, O; Cebrian Lostal, J L; Alvarez Bandres, S; Jiménez Parra, J; Montesino Semper, M; Santiago Gonzalez de Garibay, A
2008-01-01
The purpose of this publication is to describe the surgical technique, assess complications and short-term results of TVT secur and MiniArc tapes. From October 2006 to August 2007 it was carried out the surgical correction with TVT Secur,Women's Health & Urology, Ethicon, Johnson & Johnson, placing the tape as a hammock, to 51 patients, 38 of them with pure stress incontinence and 13 with mixed incontinence and with an average age of 57 years. From September 2007 to February 2008 41 patients, 33 of them with pure stress incontinence and 8 with mixed incontinence, with an average of age of 58 years were operated with AMS Miniarc swing system tape, posted on hammock. All procedures were performed with sedoanalgesia and Ambulatory Surgery regime. Patients were monitored in outpatient visits one month, 3 months and one year after surgical procedure. Medical history and questionnaire and ICIQ-SF, to which we added a question to quantify the degree of satisfaction, as well as physical examination, were done. We compared the results of both technical procedures and statistical survey was conducted by Student test. [Analysis with SPSS software (V14.0)]. The median follow-up in TVT secur group was 328 days (range 163-522 days) and 101 days (range 41-209 days) inthe MiniArc group. We only had one (TVT secur group) surgical complication in all the series (92 patients) being a bladder perforation. Taking into account that we read a negative test effort as an objective cure in the TVT secur group, 80.4% patients are cured and 90.2% inthe MiniArc group without significant difference between both groups (p 0095). To assess the subjective healing we utilized the ICIQ-SF test and the satisfaction extra-question and we noted that there is no significant difference between the first and third month controls. (90% of patients satisfied). 80% of patients were completely satisfied in the first year control that was only performed to TVT secur group. These new tapes show fewer complications that the TVT-O and TOT tapes and allow the possibility of placement with local anesthesia but further studies are needed.
Steve Clark is an environmental engineer in EPA’s National Homeland Security Research Center (NHSRC). His research focuses on water security, exploring ways to protect and decontaminate pipes and other water “infrastructure.”
Weak and Failing States: Evolving Security Threats and U.S. Policy
2008-04-18
Instability Task Force, a research group commissioned by the Central Intelligence Agency, found in a 2003 report that terrorists operate in both “ caves ...Bank Support to Low-Income Countries Under Stress (Washington, DC: The World Bank, 2006); Chauvet and Collier, “Helping Hand? Aid to Failing States...income, 50% higher debt-to-gross domestic product ratios, and double the poverty CRS-9 27 See Chauvet and Collier (2004), op. cit.; Francois Bourguignon
Internship at Los Alamos National Laboratory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dunham, Ryan Q.
2012-07-11
Los Alamos National Laboratory (LANL) is located in Los Alamos, New Mexico. It provides support for our country's nuclear weapon stockpile as well as many other scientific research projects. I am an Undergraduate Student Intern in the Systems Design and Analysis group within the Nuclear Nonproliferation division of the Global Security directorate at LANL. I have been tasked with data analysis and modeling of particles in a fluidized bed system for the capture of carbon dioxide from power plant flue gas.
Report of the Working Group on Strengthening the Biosecurity of the United States
2009-10-01
affecting humans and granted the USDA authority comparable to that of the CDC to regulate entities that possess, use, and transfer BSAT that present a... fruitful history in academia, and includes research on pathogens that only recently have been designated “select agents and toxins.” This open...risk, with less emphasis on biosecurity and biodefense, and fail to consider issues that affect U.S. national security (e.g., selection of an agent
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks.
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-04-12
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes' resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach.
Invited article: Neurology education research.
Stern, Barney J; Lowenstein, Daniel H; Schuh, Lori A
2008-03-11
There is a need to rigorously study the neurologic education of medical students, neurology residents, and neurologists to determine the effectiveness of our educational efforts. We review the status of neurologic education research as it pertains to the groups of interest. We identify opportunities and impediments for education research. The introduction of the Accreditation Council for Graduate Medical Education core competencies, the Accreditation Council of Continuing Medical Education requirement to link continuing medical education to improved physician behavior and patient care, and the American Board of Medical Specialties/American Board of Psychiatry and Neurology-mandated maintenance of certification program represent research opportunities. Challenges include numerous methodologic issues such as definition of the theoretical framework of the study, adequate sample size ascertainment, and securing research funding. State-of-the-art education research will require multidisciplinary research teams and innovative funding strategies. The central goal of all concerned should be defining educational efforts that improve patient outcomes.
Cook, John T.; Black, Maureen; Chilton, Mariana; Cutts, Diana; Ettinger de Cuba, Stephanie; Heeren, Timothy C.; Rose-Jacobs, Ruth; Sandel, Megan; Casey, Patrick H.; Coleman, Sharon; Weiss, Ingrid; Frank, Deborah A.
2013-01-01
This review addresses epidemiological, public health, and social policy implications of categorizing young children and their adult female caregivers in the United States as food secure when they live in households with “marginal food security,” as indicated by the U.S. Household Food Security Survey Module. Existing literature shows that households in the US with marginal food security are more like food-insecure households than food-secure households. Similarities include socio-demographic characteristics, psychosocial profiles, and patterns of disease and health risk. Building on existing knowledge, we present new research on associations of marginal food security with health and developmental risks in young children (<48 mo) and health in their female caregivers. Marginal food security is positively associated with adverse health outcomes compared with food security, but the strength of the associations is weaker than that for food insecurity as usually defined in the US. Nonoverlapping CIs, when comparing odds of marginally food-secure children’s fair/poor health and developmental risk and caregivers’ depressive symptoms and fair/poor health with those in food-secure and -insecure families, indicate associations of marginal food security significantly and distinctly intermediate between those of food security and food insecurity. Evidence from reviewed research and the new research presented indicates that households with marginal food security should not be classified as food secure, as is the current practice, but should be reported in a separate discrete category. These findings highlight the potential underestimation of the prevalence of adverse health outcomes associated with exposure to lack of enough food for an active, healthy life in the US and indicate an even greater need for preventive action and policies to limit and reduce exposure among children and mothers. PMID:23319123
Settlement preferences in the disaster-prone areas of Brantas River
NASA Astrophysics Data System (ADS)
Hariyani, S.
2018-01-01
Kota Lama is one of the urban villages in Malang city that has settlements along the Brantas River. Kota Lama experienced three landslides and flooding in 2015 and one in 2016. Those disasters caused the community to take action of post-disaster recovery, yet the people still choose to remain living in Kota Lama. Therefore, the study aims at determining the preferences of the citizens living in disaster-prone areas in Brantas River. The research used a factor analysis of 12 variables: 1) neighbourhood situation, 2) air condition, 3) relations between neighbours, 4) security, 5) location, 6) customs, 7) ethnic diversity, 8) the presence of social groups, 9) the community’s customs and habits, 10) proximity to the economic facilities, 11) adequate educational facilities, and 12) adequate medical/health facilities. The results show that two factors have been formed, namely Factor 1 (access) comprising variables of neighbourhood situation, air condition, relations between neighbours, location, ethnic diversity, the presence of a social group, supporting positive habits at home, close to the economic facilities, educational facilities, as well as medical facilities, and Factor 2 (assurance) consisting of customs and security.
ERIC Educational Resources Information Center
Social and Labour Bulletin, 1983
1983-01-01
This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)
Blockchain technology for improving clinical research quality.
Benchoufi, Mehdi; Ravaud, Philippe
2017-07-19
Reproducibility, data sharing, personal data privacy concerns and patient enrolment in clinical trials are huge medical challenges for contemporary clinical research. A new technology, Blockchain, may be a key to addressing these challenges and should draw the attention of the whole clinical research community.Blockchain brings the Internet to its definitive decentralisation goal. The core principle of Blockchain is that any service relying on trusted third parties can be built in a transparent, decentralised, secure "trustless" manner at the top of the Blockchain (in fact, there is trust, but it is hardcoded in the Blockchain protocol via a complex cryptographic algorithm). Therefore, users have a high degree of control over and autonomy and trust of the data and its integrity. Blockchain allows for reaching a substantial level of historicity and inviolability of data for the whole document flow in a clinical trial. Hence, it ensures traceability, prevents a posteriori reconstruction and allows for securely automating the clinical trial through what are called Smart Contracts. At the same time, the technology ensures fine-grained control of the data, its security and its shareable parameters, for a single patient or group of patients or clinical trial stakeholders.In this commentary article, we explore the core functionalities of Blockchain applied to clinical trials and we illustrate concretely its general principle in the context of consent to a trial protocol. Trying to figure out the potential impact of Blockchain implementations in the setting of clinical trials will shed new light on how modern clinical trial methods could evolve and benefit from Blockchain technologies in order to tackle the aforementioned challenges.
49 CFR 1.27 - Delegations to the General Counsel.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...
49 CFR 1.27 - Delegations to the General Counsel.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...
49 CFR 1.27 - Delegations to the General Counsel.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) (Security and research and development activities), as implemented by 49 CFR part 15 (Protection of Sensitive Security Information), relating to the determination that information is Sensitive Security Information, in consultation and coordination with the Office of Intelligence, Security and Emergency Response...
Meet EPA Scientist Jeff Szabo, Ph.D.
EPA scientist Jeff Szabo, Ph.D., has worked for the EPA’s National Homeland Security Research Center since 2005. He conducts and manages water security research projects at EPA’s Test and Evaluation facility.
77 FR 16846 - Published Privacy Impact Assessments on the Web
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-22
... Security Advanced Research Projects Agency (HSARPA), S&T Directorate seeks to develop physiological and behavioral screening technologies that will enable security officials to test the effectiveness of current... FAST research is adding a new type of research, the Passive Methods for Precision Behavioral Screening...
Ease Security Limits on Research, Panel Says
ERIC Educational Resources Information Center
Monastersky, Richard
2007-01-01
Security restrictions imposed since 2001 have unnecessarily constrained university researchers, and those controls should be loosened in order to enhance the nation's economic and strategic competitiveness, says a report issued by the National Research Council of the National Academies. The report's authors, a committee of high-ranking officials…
Delibegović, Samir; Mehmedovic, Zlatan
2018-05-01
During laparoscopic appendectomy, the base of the appendix is usually secured by loop ligature or stapling device. Hem-o-lok and DS clips have been shown as alternative techniques. The aim of this study was to compare the clinical outcomes of various forms of securing the base of the appendix, in order to find the most suitable method. The study included 120 patients with acute appendicitis randomly divided into four groups with 30 patients in each. In the first group, the base of the appendix was secured using an Endoloop, in the second group using a stapling device, in the third group using Hem-o-lok, and in the fourth group using a DS clip. The primary outcome was overall morbidity following securing the base of the appendix. Secondary outcomes were time of application and operative procedure, total length of stay, and surgical outcome. No morbidity was recorded in any group. The time of application was significantly longer in the Endoloop group than in the Stapler (P < 0.0001), Hem-o-lok (P < 0.0001), and DS clips (P < 0.0001) groups. The time of application in the Stapler group was significantly shorter than in the Hem-o-lok (P < 0.0001) and the DS clips (P < 0.0001) groups. The time of the operative procedure was significantly longer in the Endoloop than in the Stapler group (P < 0.0001). The time of the operative procedure in the Stapler group was significantly shorter than in the DS clips group (P < 0.0001) but did not differ significantly from the Hem-o-lok group (P = 0.199). The time of the operative procedure in the Hem-o-lok group was significantly shorter than in the DS clips group (P = 0.044). All forms of closure of the appendix base are acceptable, but Hem-o-lok and DS clips have the best potential for further development, and will probably become the method of choice in securing the base of the appendix.
Park, Chang-Seop
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... lack of current and accurate information concerning the securities of Cargo Connection Logistics... Group BDC, Inc., Cargo Connection Logistics Holding, Inc., Diapulse Corporation of America, Globus... current and accurate information concerning the securities of Altus Pharmaceuticals, Inc. because it has...
Group Psychotherapeutic Factors and Perceived Social Support Among Veterans With PTSD Symptoms.
Cox, Daniel W; Owen, Jess J; Ogrodniczuk, John S
2017-02-01
One of the most potent protective factors against psychiatric symptoms after military trauma is perceived social support. Although group psychotherapy has been linked with increasing social support, no research has evaluated which therapeutic mechanisms are associated with this increase beyond symptom reduction. We investigated which interpersonal therapeutic factors were related to changes in social support, beyond posttraumatic stress disorder (PTSD) symptom reduction. Participants were 117 veterans in a multimodal outpatient group psychotherapy treatment designed to reduce PTSD symptoms and interpersonal difficulties. Generally, therapeutic factors were related to improvements in social support from baseline to posttreatment beyond the effects of PTSD symptom reduction. Specifically, social learning was associated with changes in appraisal support, secure emotional expression was associated with changes in tangible support, and neither was associated with changes in belonging support. Depending on the goals of treatment, understanding these variations are important so clinicians and researchers can appropriately design and target their interventions to facilitate desired changes.
A longitudinal study of administrative segregation.
O'Keefe, Maureen L; Klebe, Kelli J; Metzner, Jeffrey; Dvoskin, Joel; Fellner, Jamie; Stucker, Alysha
2013-01-01
The use of administrative segregation for inmates with and without mental illness has generated considerable criticism. Segregated inmates are locked in single cells for 23 hours per day, are subjected to rigorous security procedures, and have restricted access to programs. In this study, we examined whether inmates in segregation would show greater deterioration over time on psychological symptoms than would comparison offenders. The subjects were male inmates, with and without mental illness, in administrative segregation, general population, or special-needs prison. Subjects completed the Brief Symptom Inventory at regular intervals for one year. Results showed differentiation between groups at the outset and statistically significant but small positive change over time across all groups. All groups showed the same change pattern such that there was not the hypothesized differential change of inmates within administrative segregation. This study advances the empirical research, but replication research is needed to make a better determination of whether and under what conditions harm may or may not occur to inmates in solitary confinement.
Code of Federal Regulations, 2011 CFR
2011-04-01
... of research reports by brokers or dealers distributing securities. 230.139 Section 230.139 Commodity... ACT OF 1933 General § 230.139 Publications or distributions of research reports by brokers or dealers... section, a broker's or dealer's publication or distribution of a research report about an issuer or any of...
Code of Federal Regulations, 2010 CFR
2010-04-01
... of research reports by brokers or dealers distributing securities. 230.139 Section 230.139 Commodity... ACT OF 1933 General § 230.139 Publications or distributions of research reports by brokers or dealers... section, a broker's or dealer's publication or distribution of a research report about an issuer or any of...
Homeland Security Collaboration: Catch Phrase or Preeminent Organizational Construct?
2009-09-01
collaborative effort? C. RESEARCH METHODOLOGY This research project utilized a modified case study methodology. The traditional case study method ...discussing the research method , offering smart practices and culminate with findings and recommendations. Chapter II Homeland Security Collaboration...41 Centers for Regional Excellence, “Building Models.” 16 Chapter III Research Methodology: Modified Case Study Method is
Security Force Assistance: Cases and Policy
2018-02-02
Biddle, Stephen (Principal Investigator) Berman, Eli (Co-PI) National Bureau of Economic Research, Inc. 1050 Massachusetts Ave. Cambridge, MA...2 February 2018 Sponsoring organization: Office of Naval Research (ONR) Performing organization: National Bureau of Economic Research, Inc...Professor and Chair of Economics , University of California San Diego, and Research Director for International Security Studies at the UC Institute
Proximity under Threat: The Role of Physical Distance in Intergroup Relations
Wohl, Michael J. A.; Van Bavel, Jay J.
2016-01-01
Throughout human history, social groups have invested immense amounts of wealth and time to keep threatening out-groups at a distance. In the current research, we explored the relationship between intergroup threat, physical distance, and discrimination. Specifically, we examined how intergroup threat alters estimates of physical distance to out-groups and how physical proximity affects intergroup relations. Previous research has found that people judge threatening out-groups as physically close. In Studies 1 and 2, we examined ways to attenuate this bias. In Study 1 a secure (vs. permeable) US-Mexico border reduced the estimated proximity to Mexico City among Americans who felt threatened by Mexican immigration. In Study 2, intergroup apologies reduced estimates of physical proximity to a threatening cross-town rival university, but only among participants with cross-group friendships. In Study 3, New York Yankees fans who received an experimental induction of physical proximity to a threatening out-group (Boston Red Sox) had a stronger relationship between their collective identification with the New York Yankees and support for discriminatory policies toward members of the out-group (Red Sox fans) as well as how far they chose to sit from out-group members (Red Sox fans). Together, these studies suggest that intergroup threat alters judgment of physical properties, which has important implications for intergroup relations. PMID:27467267
Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library
ERIC Educational Resources Information Center
McMullen, Karen D.; Kane, Laura Townsend
2008-01-01
In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…
Cyber security issues in online games
NASA Astrophysics Data System (ADS)
Zhao, Chen
2018-04-01
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
Security analysis of cyber-physical system
NASA Astrophysics Data System (ADS)
Li, Bo; Zhang, Lichen
2017-05-01
In recent years, Cyber-Physical System (CPS) has become an important research direction of academic circles and scientific and technological circles at home and abroad, is considered to be following the third wave of world information technology after the computer, the Internet. PS is a multi-dimensional, heterogeneous, deep integration of open systems, Involving the computer, communication, control and other disciplines of knowledge. As the various disciplines in the research theory and methods are significantly different, so the application of CPS has brought great challenges. This paper introduces the definition and characteristics of CPS, analyzes the current situation of CPS, analyzes the security threats faced by CPS, and gives the security solution for security threats. It also discusses CPS-specific security technology, to promote the healthy development of CPS in information security.
2011-01-01
CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute, a federally funded...Marine Corps, the defense agencies, and the defense Intelligence Community. For more information on the International Security and Defense Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] M (2003) PLC (f/k/a Marconi PLC), Mayfair Mining & Minerals, Inc.,MM2 Group, Inc., Nayna Networks, Inc., NCT Group, Inc., and Neptune Industries... securities of M (2003) PLC (f/k/a Marconi PLC) because it has not filed any periodic reports since the period...
Blanquer, Ignacio; Hernandez, Vicente; Segrelles, Damià; Torres, Erik
2007-01-01
Today most European healthcare centers use the digital format for their databases of images. TRENCADIS is a software architecture comprising a set of services as a solution for interconnecting, managing and sharing selected parts of medical DICOM data for the development of training and decision support tools. The organization of the distributed information in virtual repositories is based on semantic criteria. Different groups of researchers could organize themselves to propose a Virtual Organization (VO). These VOs will be interested in specific target areas, and will share information concerning each area. Although the private part of the information to be shared will be removed, special considerations will be taken into account to avoid the access by non-authorized users. This paper describes the security model implemented as part of TRENCADIS. The paper is organized as follows. First introduces the problem and presents our motivations. Section 1 defines the objectives. Section 2 presents an overview of the existing proposals per objective. Section 3 outlines the overall architecture. Section 4 describes how TRENCADIS is architected to realize the security goals discussed in the previous sections. The different security services and components of the infrastructure are briefly explained, as well as the exposed interfaces. Finally, Section 5 concludes and gives some remarks on our future work.
NASA Technical Reports Server (NTRS)
Gilliam, D. P.; Powell, J. D.
2002-01-01
This paper presents a portion of an overall research project on the generation of the network security assessment instrument to aid developers in assessing and assuring the security of software in the development and maintenance lifecycles.
Workarounds to computer access in healthcare organizations: you want my password or a dead patient?
Koppel, Ross; Smith, Sean; Blythe, Jim; Kothari, Vijay
2015-01-01
Workarounds to computer access in healthcare are sufficiently common that they often go unnoticed. Clinicians focus on patient care, not cybersecurity. We argue and demonstrate that understanding workarounds to healthcare workers' computer access requires not only analyses of computer rules, but also interviews and observations with clinicians. In addition, we illustrate the value of shadowing clinicians and conducing focus groups to understand their motivations and tradeoffs for circumvention. Ethnographic investigation of the medical workplace emerges as a critical method of research because in the inevitable conflict between even well-intended people versus the machines, it's the people who are the more creative, flexible, and motivated. We conducted interviews and observations with hundreds of medical workers and with 19 cybersecurity experts, CIOs, CMIOs, CTO, and IT workers to obtain their perceptions of computer security. We also shadowed clinicians as they worked. We present dozens of ways workers ingeniously circumvent security rules. The clinicians we studied were not "black hat" hackers, but just professionals seeking to accomplish their work despite the security technologies and regulations.
78 FR 4393 - Applications for New Awards; Minorities and Retirement Security Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-22
... conducting research across a variety of relevant disciplines and fields (for example, business, economics... original research-based high school or college curricula for minority and low-income students designed to... Security Administration (SSA). The MRS Program will provide grants to support research by graduate students...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-06
... DEPARTMENT OF TRANSPORTATION Enabling a Secure Environment for Vehicle-to-Infrastructure Research Workshop; Notice of Public Meeting AGENCY: ITS Joint Program Office, Research and Innovative Technology Administration, U.S. Department of Transportation. ACTION: Notice. The U.S. Department of Transportation (USDOT...
Lachat, Carl; Roberfroid, Dominique; Van den Broeck, Lien; Van den Briel, Natalie; Nago, Eunice; Kruger, Annamarie; Holdsworth, Michelle; Garimoi Orach, Christopher; Kolsteren, Patrick
2015-07-01
Malnutrition in Africa has not improved compared with other regions in the world. Investment in the build-up of a strong African research workforce is essential to provide contextual solutions to the nutritional problems of Africa. To orientate this process, we reviewed nutrition research carried out in Africa and published during the last decade. We assessed nutrition research from Africa published between 2000 and 2010 from MEDLINE and EMBASE and analysed the study design and type of intervention for studies indexed with major MeSH terms for vitamin A deficiency, protein-energy malnutrition, obesity, breast-feeding, nutritional status and food security. Affiliations of first authors were visualised as a network and power of affiliations was assessed using centrality metrics. Africa. Africans, all age groups. Most research on the topics was conducted in Southern (36%) and Western Africa (34%). The intervention studies (9%; n 95) mainly tested technological and curative approaches to the nutritional problems. Only for papers on protein-energy malnutrition and obesity did lead authorship from Africa exceed that from non-African affiliations. The 10% most powerfully connected affiliations were situated mainly outside Africa for publications on vitamin A deficiency, breast-feeding, nutritional status and food security. The development of the evidence base for nutrition research in Africa is focused on treatment and the potential for cross-African networks to publish nutrition research from Africa remains grossly underutilised. Efforts to build capacity for effective nutrition action in Africa will require forging a true academic partnership between African and non-African research institutions.
Addressing the Economic Security Issues Facing Same-Sex Couples.
ERIC Educational Resources Information Center
Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael
1999-01-01
Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Aspen Group Resources Corp., Commercial Concepts, Inc., Desert Health Products, Inc., Equalnet Communications Corp., Geneva Steel Holdings Corp... securities of Commercial Concepts, Inc. because it has not filed any periodic reports since the period ended...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-02
... audited by independent public accountants to all CDS Clearing Members engaged in security-based swap... clearing security-based swaps a report by independent public accountants regarding CME Group's system of... CME Group Inc. by independent public accountant regarding its system of internal accounting control...
Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
American Council on Education, Washington, DC.
Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…
77 FR 22622 - AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc., CardioVascular BioTherapeutics, Inc., and 1st Centennial... that there is a lack of current and accurate information concerning the securities of 1st Centennial...
78 FR 46851 - Controlled Group Regulation Examples
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-02
.... Investment Company Z, which keeps its books and makes its returns on the basis of the calendar year, at the... that illustrate the controlled group rules related to regulated investment companies (RICs). These... Government securities or the securities of other regulated investment companies) of any one issuer, (ii) the...
Attachment theory and theory of planned behavior: an integrative model predicting underage drinking.
Lac, Andrew; Crano, William D; Berger, Dale E; Alvaro, Eusebio M
2013-08-01
Research indicates that peer and maternal bonds play important but sometimes contrasting roles in the outcomes of children. Less is known about attachment bonds to these 2 reference groups in young adults. Using a sample of 351 participants (18 to 20 years of age), the research integrated two theoretical traditions: attachment theory and theory of planned behavior (TPB). The predictive contribution of both theories was examined in the context of underage adult alcohol use. Using full structural equation modeling, results substantiated the hypotheses that secure peer attachment positively predicted norms and behavioral control toward alcohol, but secure maternal attachment inversely predicted attitudes and behavioral control toward alcohol. Alcohol attitudes, norms, and behavioral control each uniquely explained alcohol intentions, which anticipated an increase in alcohol behavior 1 month later. The hypothesized processes were statistically corroborated by tests of indirect and total effects. These findings support recommendations for programs designed to curtail risky levels of underage drinking using the tenets of attachment theory and TPB. (PsycINFO Database Record (c) 2013 APA, all rights reserved).
Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.
Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang
2014-09-01
RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.
Effective user management with high strength crypto -key in dynamic group environment in cloud
NASA Astrophysics Data System (ADS)
Kumar, P. J.; Suganya, P.; Karthik, G.
2017-11-01
Cloud Clusters consists of various collections of files which are being accessed by multiple users of Cloud. The users are managed as a group and the association of the user to a particular group is dynamic in nature. Every group has a manager who handles the membership of a user to a particular group by issuing keys for encryption and decryption. Due to the dynamic nature of a user he/she may leave the group very frequently. But an attempt can be made by the user who has recently left the group to access a file maintained by that group. Key distribution becomes a critical issue while the behavior of the user is dynamic. Existing techniques to manage the users of group in terms of security and key distribution has been investigated so that to arrive at an objective to identify the scopes to increase security and key management scheme in cloud. The usage of various key combinations to measure the strength of security and efficiency of user management in dynamic cloud environment has been investigated.
76 FR 72967 - Aviation Security Advisory Committee (ASAC) Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-28
...The Transportation Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) via telephone conference on December 15, 2011, to establish working groups and set the agenda for future activity. This meeting will be open to the public.
Secure multi-party communication with quantum key distribution managed by trusted authority
Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen
2013-07-09
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Secure multi-party communication with quantum key distribution managed by trusted authority
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
2015-01-06
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Building a highly available and intrusion tolerant Database Security and Protection System (DSPS).
Cai, Liang; Yang, Xiao-Hu; Dong, Jin-Xiang
2003-01-01
Database Security and Protection System (DSPS) is a security platform for fighting malicious DBMS. The security and performance are critical to DSPS. The authors suggested a key management scheme by combining the server group structure to improve availability and the key distribution structure needed by proactive security. This paper detailed the implementation of proactive security in DSPS. After thorough performance analysis, the authors concluded that the performance difference between the replicated mechanism and proactive mechanism becomes smaller and smaller with increasing number of concurrent connections; and that proactive security is very useful and practical for large, critical applications.
Security and Resilience | Grid Modernization | NREL
Security and Resilience Security and Resilience NREL develops tools and solutions to enable a more Consortium, NREL collaborates with industry, academia, and other research organizations to find solutions to
Usable SPACE: Security, Privacy, and Context for the Mobile User
NASA Astrophysics Data System (ADS)
Jutla, Dawn
Users breach the security of data within many financial applications daily as human and/or business expediency to access and use information wins over corporate security policy guidelines. Recognizing that changing user context often requires different security mechanisms, we discuss end-to-end solutions combining several security and context mechanisms for relevant security control and information presentation in various mobile user situations. We illustrate key concepts using Dimitri Kanevskys (IBM Research) early 2000s patented inventions for voice security and classification.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Eipeldauer, Mary D; Shelander Jr, Bruce R
2012-01-01
The southeast is a highly suitable environment for establishing a series of nuclear safety, security and safeguards 'professional development' courses. Oak Ridge National Laboratory (ORNL) provides expertise in the research component of these subjects while the Y-12 Nuclear Security Complex handles safeguards/security and safety applications. Several universities (i.e., University of Tennessee, Knoxville (UTK), North Carolina State University, University of Michigan, and Georgia Technology Institute) in the region, which offer nuclear engineering and public policy administration programs, and the Howard Baker Center for Public Policy make this an ideal environment for learning. More recently, the Institute for Nuclear Security (INS) wasmore » established between ORNL, Y-12, UTK and Oak Ridge Associate Universities (ORAU), with a focus on five principal areas. These areas include policy, law, and diplomacy; education and training; science and technology; operational and intelligence capability building; and real-world missions and applications. This is a new approach that includes professional development within the graduate research assistant program addressing global needs in nuclear security, safety and safeguards.« less
Information security: where computer science, economics and psychology meet.
Anderson, Ross; Moore, Tyler
2009-07-13
Until ca. 2000, information security was seen as a technological discipline, based on computer science but with mathematics helping in the design of ciphers and protocols. That perspective started to change as researchers and practitioners realized the importance of economics. As distributed systems are increasingly composed of machines that belong to principals with divergent interests, incentives are becoming as important to dependability as technical design. A thriving new field of information security economics provides valuable insights not just into 'security' topics such as privacy, bugs, spam and phishing, but into more general areas of system dependability and policy. This research programme has recently started to interact with psychology. One thread is in response to phishing, the most rapidly growing form of online crime, in which fraudsters trick people into giving their credentials to bogus websites; a second is through the increasing importance of security usability; and a third comes through the psychology-and-economics tradition. The promise of this multidisciplinary research programme is a novel framework for analysing information security problems-one that is both principled and effective.
Bahrain: Reform, Security, and U.S. Policy
2017-09-29
responsibility for bombings and other attacks primarily against security officials. The Bahrain government’s use of repression against the dissent...activity of violent, underground groups that, among their tactics, detonate bombs and improvised explosive devices (IEDs) against security forces. These...issued its first public statement in April 2013 and has since claimed responsibility for about 20 bombings against security personnel, including one
Matrix Game Methodology - Support to V2010 Olympic Marine Security Planners
2011-02-01
OMOC was called the Integrated Safety /Security Matrix Game – Marine III, and was held 16-17 June 2009. This was the most extensive and complex of...Protection Matrix Game Marine Two .................................................. 12 3.3 Integrated Safety /Security Matrix Game – Marine III...Integrated Safety /Security Matrix Game – Marine III Scenarios........................... 53 ISSMG Marine III – Team Groupings
ERIC Educational Resources Information Center
Vaughn, Brian E.; Coppola, Gabrielle; Verissimo, Manuela; Monteiro, Ligia; Santos, Antonio Jose; Posada, German; Carbonell, Olga A.; Plata, Sandra J.; Waters, Harriet S.; Bost, Kelly K.; McBride, Brent; Shin, Nana; Korth, Bryan
2007-01-01
The secure-base phenomenon is central to the Bowlby/Ainsworth theory of attachment and is also central to the assessment of attachment across the lifespan. The present study tested whether mothers' knowledge about the secure-base phenomenon, as assessed using a recently designed wordlist prompt measure for eliciting attachment-relevant stories,…
Securing Cyberspace: Approaches to Developing an Effective Cyber-Security Strategy
2011-05-15
attackers, cyber - criminals or even teenage hackers. Protecting cyberspace is a national security priority. President Obama’s National Security...prefers to engage international law enforcement to investigate and catch cyber criminals .40 International cooperation could resolve jurisdictional...sheltered them. Similarly, a state that fails to prosecute cyber - criminals , or who gives safe haven to individuals or groups that conduct cyber-attacks
After Globalization Future Security in a Technology Rich World
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gilmartin,T J
2001-08-17
Over the course of the year 2000, five workshops were conducted by the Center for Global Security Research at the Lawrence Livermore National Laboratory on threats to international security in the 2015 to 2020 timeframe due to the global availability of advanced technology. These workshops focused on threats that are enabled by nuclear, missile, and space technology; military technology; information technology; bio technology; and geo systems technology. The participants included US national leaders and experts from the Department of Energy National Laboratories; the Department of Defense: Army, Navy, Air Force, Office of the Secretary of Defense, Defense Threat Reduction Agency,more » and Defense Advanced Research Projects Agency; the Department of State, NASA, Congressional technical staff, the intelligence community, universities and university study centers, think tanks, consultants on security issues, and private industry. For each workshop the process of analysis involved identification and prioritization of the participants' perceived most severe threat scenarios (worst nightmares), discussion of the technologies which enabled those threats, and ranking of the technologies' threat potentials. The threats ranged from local/regional to global, from intentional to unintended to natural, from merely economic to massively destructive, and from individual and group to state actions. We were not concerned in this exercise with defining responses to the threats, although our assessment of each threat's severity included consideration of the ease or difficulty with which it might be executed or countered. At the concluding review, we brought the various workshops' participants together, added senior participant/reviewers with broad experience and national responsibility, and discussed the workshop findings to determine what is most certain or uncertain, and what might be needed to resolve our uncertainties. This paper summarizes the consenses and important variations of both the reviewers and the participants.« less
NASA Astrophysics Data System (ADS)
Gaudio, P.; Malizia, A.; Gelfusa, M.; Murari, A.; Parracino, S.; Poggi, L. A.; Lungaroni, M.; Ciparisse, J. F.; Di Giovanni, D.; Cenciarelli, O.; Carestia, M.; Peluso, E.; Gabbarini, V.; Talebzadeh, S.; Bellecci, C.
2017-01-01
Nowadays the intentional diffusion in air (both in open and confined environments) of chemical contaminants is a dramatic source of risk for the public health worldwide. The needs of a high-tech networks composed by software, diagnostics, decision support systems and cyber security tools are urging all the stakeholders (military, public, research & academic entities) to create innovative solutions to face this problem and improve both safety and security. The Quantum Electronics and Plasma Physics (QEP) Research Group of the University of Rome Tor Vergata is working since the 1960s on the development of laser-based technologies for the stand-off detection of contaminants in the air. Up to now, four demonstrators have been developed (two LIDAR-based and two DIAL-based) and have been used in experimental campaigns during all 2015. These systems and technologies can be used together to create an innovative solution to the problem of public safety and security: the creation of a network composed by detection systems: A low cost LIDAR based system has been tested in an urban area to detect pollutants coming from urban traffic, in this paper the authors show the results obtained in the city of Crotone (south of Italy). This system can be used as a first alarm and can be coupled with an identification system to investigate the nature of the threat. A laboratory dial based system has been used in order to create a database of absorption spectra of chemical substances that could be release in atmosphere, these spectra can be considered as the fingerprints of the substances that have to be identified. In order to create the database absorption measurements in cell, at different conditions, are in progress and the first results are presented in this paper.
Security Approaches in Using Tablet Computers for Primary Data Collection in Clinical Research
Wilcox, Adam B.; Gallagher, Kathleen; Bakken, Suzanne
2013-01-01
Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project. PMID:25848559
Security approaches in using tablet computers for primary data collection in clinical research.
Wilcox, Adam B; Gallagher, Kathleen; Bakken, Suzanne
2013-01-01
Next-generation tablets (iPads and Android tablets) may potentially improve the collection and management of clinical research data. The widespread adoption of tablets, coupled with decreased software and hardware costs, has led to increased consideration of tablets for primary research data collection. When using tablets for the Washington Heights/Inwood Infrastructure for Comparative Effectiveness Research (WICER) project, we found that the devices give rise to inherent security issues associated with the potential use of cloud-based data storage approaches. This paper identifies and describes major security considerations for primary data collection with tablets; proposes a set of architectural strategies for implementing data collection forms with tablet computers; and discusses the security, cost, and workflow of each strategy. The paper briefly reviews the strategies with respect to their implementation for three primary data collection activities for the WICER project.
ERIC Educational Resources Information Center
Waddell, Stanie Adolphus
2013-01-01
Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…
ERIC Educational Resources Information Center
Noah, Philip D., Jr.
2013-01-01
The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…
Independent Review of Aviation Technology and Research Information Analysis System (ATRIAS) Database
1994-02-01
capability to support the Federal Aviation Administration (FAA)/ Aviation Security Research and Development Service’s (ACA) Explosive Detection...Systems (EDS) programs and Aviation Security Human Factors Program (ASHFP). This review was conducted by an independent consultant selected by the FAA...sections 2 and 3 of the report. Overall, ATRIAS was found to address many technology application areas relevant to the FAA’s aviation security programs
An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
Boubiche, Sabrina; Boubiche, Djallel Eddine; Bilami, Azzedine; Toral-Cruz, Homero
2016-01-01
Data aggregation processes aim to reduce the amount of exchanged data in wireless sensor networks and consequently minimize the packet overhead and optimize energy efficiency. Securing the data aggregation process is a real challenge since the aggregation nodes must access the relayed data to apply the aggregation functions. The data aggregation security problem has been widely addressed in classical homogeneous wireless sensor networks, however, most of the proposed security protocols cannot guarantee a high level of security since the sensor node resources are limited. Heterogeneous wireless sensor networks have recently emerged as a new wireless sensor network category which expands the sensor nodes’ resources and capabilities. These new kinds of WSNs have opened new research opportunities where security represents a most attractive area. Indeed, robust and high security level algorithms can be used to secure the data aggregation at the heterogeneous aggregation nodes which is impossible in classical homogeneous WSNs. Contrary to the homogeneous sensor networks, the data aggregation security problem is still not sufficiently covered and the proposed data aggregation security protocols are numberless. To address this recent research area, this paper describes the data aggregation security problem in heterogeneous wireless sensor networks and surveys a few proposed security protocols. A classification and evaluation of the existing protocols is also introduced based on the adopted data aggregation security approach. PMID:27077866
IRBs and Security Research: Myths, Facts and Mission Creep
2008-04-07
discovering the US Government’s regula- tions that govern human subject research. This paper dis- cusses those regulations, their application to research on...ity and other human factors issues, many are surprised to discover that they must comply with regulations govern- ing the use of human beings as...security researchers are discovering the US Government?s regulations that govern human subject research. This paper discusses those regulations, their
Measuring Information Security Performance with 10 by 10 Model for Holistic State Evaluation.
Bernik, Igor; Prislan, Kaja
Organizations should measure their information security performance if they wish to take the right decisions and develop it in line with their security needs. Since the measurement of information security is generally underdeveloped in practice and many organizations find the existing recommendations too complex, the paper presents a solution in the form of a 10 by 10 information security performance measurement model. The model-ISP 10×10M is composed of ten critical success factors, 100 key performance indicators and 6 performance levels. Its content was devised on the basis of findings presented in the current research studies and standards, while its structure results from an empirical research conducted among information security professionals from Slovenia. Results of the study show that a high level of information security performance is mostly dependent on measures aimed at managing information risks, employees and information sources, while formal and environmental factors have a lesser impact. Experts believe that information security should evolve systematically, where it's recommended that beginning steps include technical, logical and physical security controls, while advanced activities should relate predominantly strategic management activities. By applying the proposed model, organizations are able to determine the actual level of information security performance based on the weighted indexing technique. In this manner they identify the measures they ought to develop in order to improve the current situation. The ISP 10×10M is a useful tool for conducting internal system evaluations and decision-making. It may also be applied to a larger sample of organizations in order to determine the general state-of-play for research purposes.
2017-04-13
Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be...policy, and law . The research question is whether the Departments of Homeland Security (DHS) and Defense (DOD) have federal statutory authority to... law ); Department of Homeland Security; Department of Defense; establish standards; physical protection and security; national security 16. SECURITY
DOE Office of Scientific and Technical Information (OSTI.GOV)
Halvorson, C S
The FY09 budgets for homeland security research and development programs in the U.S. are summarized. Homeland security policy developments that can influence future efforts are discussed. Initial indications of the new administration direction on homeland security R&D are summarized. An overview of the Optics and Photonics in Global Homeland Security V conference is presented.
Exploring the Educational Needs of the Homeland Security Community
ERIC Educational Resources Information Center
France, Paul
2012-01-01
This study involved an evaluation of the subjective perspectives held by a panel of 16 homeland security subject matter experts to determine what the needs of the homeland security professional community are for educational programs. The researcher examined the knowledge, skills, and abilities deemed important in homeland security to determine…
[Role of creative discussion in the learning of critical reading of scientific articles].
Cobos-Aguilar, Héctor; Viniegra-Velázquez, Leonardo; Pérez-Cortés, Patricia
2011-01-01
To compare two active educational strategies on critical reading (two and three stages) for research learning in medical students. Four groups were conformed in a quasi-experimental design. The medical student group, related to three stages (critical reading guide resolution, creative discussion, group discussion) g1, n = 9 with school marks > 90 and g2, n = 19 with a < 90, respectively. The two-stage groups (guide resolution and group discussion) were conformed by pre-graduate interns, g3, n = 17 and g4, n = 12, who attended social security general hospitals. A validated and consistent survey with 144 items was applied to the four groups before and after educational strategies. Critical reading with its subcomponents: interpretation, judgment and proposal were evaluated with 47, 49 and 48 items, respectively. The case control studies, cohort studies, diagnostic test and clinical trial designs were evaluated. Nonparametric significance tests were performed to compare the groups and their results. A bias calculation was performed for each group. The highest median was obtained by the three-stage groups (g1 and g2) and so were the medians in interpretation, judgment and proposal. The several research design results were higher in the same groups. An active educational strategy with three stages is superior to another with two stages in medical students. It is advisable to perform these activities in goal of better learning in our students.
2012-03-06
Proceedings Executive Summary 3. DATES COVERED (From - To) 3/25/2010-3/26/2010 4. TITLE AND SUBTITLE Stigma and Barriers To Care: Caring for Those...Health and National Security, directed to addressing stigma and barriers to care, brought together a diverse group of leaders in order to expand our...researchers and health care planners across mental health, health care systems, military and disaster care and the specific issues of stigma and barriers
1988-01-01
amphibius study group co nce pt pa per, L’S Na xa I War C’ol lege ( )SDept.); 1). B3. [<ii.kin, "’No Bastions for the Be’ar’’ t rnna polis: US N aval...Tracking Study results indicated that "level of pay" was only the fifth most important reason young males decided not to enlist. The first four ...the Institute for National Strategic Studies , hosts about two dozen Senior Fellows who engage in original research on national security issues. NDU
2008-03-01
and virtual elimination of vehicular emissions of pollutants and greenhouse gases. Low- cost, high-volume manufacturing processes and development...intended to help achieve energy security and virtually eliminate vehicular emissions of pollutants and greenhouse gases. This goal is being pursued...the coolant system, for example, and the humidification system must be integrated with the air blower. Construction of the power plant is usually
DOE Office of Scientific and Technical Information (OSTI.GOV)
Janssens-Maenhout, Greet; Kusumi, R.; Daures, Pascal A.
2010-06-16
The renaissance of efforts to expand the use of nuclear energy requires the parallel development of a renewed and more sophisticated work force. Growth in the nuclear sector with high standard of safety, safeguards and security requires skilled staff for design, operations, inspections etc. High-quality nuclear technology educational programs are diminished from past years, and the ability of universities to attract students and to meet future staffing requirements of the nuclear industry is becoming seriously compromised. Thus, education and training in nuclear engineering and sciences is one of the cornerstones for the nuclear sector. Teaching in the nuclear field stillmore » seems strongly influenced by national history but it is time to strengthen resources and collaborate. Moreover with the current nuclear security threats it becomes critical that nuclear technology experts master the basic principles not only of safety, but also of nuclear safeguards, nonproliferation and nuclear security. In Europe the European Nuclear Education Network (ENEN) Association has established the certificate 'European Master of Science in Nuclear Engineering (EMSNE)' as the classic nuclear engineering program covering reactor operation and nuclear safety. However, it does not include courses on nonproliferation, safeguards, or dual-use technologies. The lack of education in nuclear safeguards was tackled by the European Safeguards Research and Development Association (ESARDA), through development and implementation of safeguards course modules. Since 2005 the ESARDA Working Group, called the Training and Knowledge Management Working Group, (TKMWG) has worked with the Joint Research Centre (JRC) in Ispra, Italy to organize a Nuclear Safeguards and Nonproliferation course. This five-day course is held each spring at the JRC, and continues to show increasing interest as evidenced by the positive responses of international lecturers and students. The standard set of lectures covers a broad range of subjects, including nuclear material accountancy principles, legal definitions and the regulatory base and inspection tools and techniques. This 60% core part is given by representatives from regulatory bodies (The International Atomic Energy Agency (IAEA), Institute for Radiological Protection and Nuclear Safety, Directorate General for Nuclear Energy and Transport), industry (AREVA, British Nuclear Group), and research (Stockholm University, Hamburg University, Joint Research Centre-Institute of Transuranic Elements, and Joint Research Centre-Institute for the Protection of the Citizen). The remaining part is completed with topical lectures addressed by invited lecturers, such as from Pacific Northwest National Laboratory and the IAEA addressing topics of physical protection, illicit trafficking, the Iraq case study, exercises, including satellite imagery interpretation etc. With this structure of a stable core plus a variable set of invited lectures, the course will remain sustainable and up-to-date. A syllabus provides the students a homogeneous set of information material in nuclear safeguards and nonproliferation matters at the European and international level. In this way, the ESARDA TKMWG aims to contribute to a two-fold scientific-technical and political-juridical education and training.« less
Jacquez, Geoffrey M; Essex, Aleksander; Curtis, Andrew; Kohler, Betsy; Sherman, Recinda; Emam, Khaled El; Shi, Chen; Kaufmann, Andy; Beale, Linda; Cusick, Thomas; Goldberg, Daniel; Goovaerts, Pierre
2017-07-01
As the volume, accuracy and precision of digital geographic information have increased, concerns regarding individual privacy and confidentiality have come to the forefront. Not only do these challenge a basic tenet underlying the advancement of science by posing substantial obstacles to the sharing of data to validate research results, but they are obstacles to conducting certain research projects in the first place. Geospatial cryptography involves the specification, design, implementation and application of cryptographic techniques to address privacy, confidentiality and security concerns for geographically referenced data. This article defines geospatial cryptography and demonstrates its application in cancer control and surveillance. Four use cases are considered: (1) national-level de-duplication among state or province-based cancer registries; (2) sharing of confidential data across cancer registries to support case aggregation across administrative geographies; (3) secure data linkage; and (4) cancer cluster investigation and surveillance. A secure multi-party system for geospatial cryptography is developed. Solutions under geospatial cryptography are presented and computation time is calculated. As services provided by cancer registries to the research community, de-duplication, case aggregation across administrative geographies and secure data linkage are often time-consuming and in some instances precluded by confidentiality and security concerns. Geospatial cryptography provides secure solutions that hold significant promise for addressing these concerns and for accelerating the pace of research with human subjects data residing in our nation's cancer registries. Pursuit of the research directions posed herein conceivably would lead to a geospatially encrypted geographic information system (GEGIS) designed specifically to promote the sharing and spatial analysis of confidential data. Geospatial cryptography holds substantial promise for accelerating the pace of research with spatially referenced human subjects data.
Privacy and Security in Mobile Health (mHealth) Research.
Arora, Shifali; Yttri, Jennifer; Nilse, Wendy
2014-01-01
Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions-some in real time-while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions.
Privacy and Security in Mobile Health (mHealth) Research
Arora, Shifali; Yttri, Jennifer; Nilsen, Wendy
2014-01-01
Research on the use of mobile technologies for alcohol use problems is a developing field. Rapid technological advances in mobile health (or mHealth) research generate both opportunities and challenges, including how to create scalable systems capable of collecting unprecedented amounts of data and conducting interventions—some in real time—while at the same time protecting the privacy and safety of research participants. Although the research literature in this area is sparse, lessons can be borrowed from other communities, such as cybersecurity or Internet security, which offer many techniques to reduce the potential risk of data breaches or tampering in mHealth. More research into measures to minimize risk to privacy and security effectively in mHealth is needed. Even so, progress in mHealth research should not stop while the field waits for perfect solutions. PMID:26259009
Perioperative complications and early follow-up with 100 TVT-SECUR procedures.
Neuman, Menahem
2008-01-01
Our objective was to evaluate the complications and early follow-up of the tension-free vaginal tape (TVT)-SECUR, a new minimally invasive anti-incontinence operative procedure. A prospective, observational, and consecutive patient series was conducted. Perioperative and 12-month postoperative data were prospectively collected for the first 50 patients against the next consecutive 50 patients, among which TVT-SECUR specific surgical measurements were adopted (Canadian Task Force classification 2). In private hospital operative theatres, the TVT-SECUR operation was performed. Patients with urodynamically proved stress urinary incontinence were enrolled in this study after detailed informed consent was given. The TVT-SECUR, in the hammock shape to mimic the TVT-obturator placement, yet with no skin incisions, required neither bladder catheterization nor intraoperative diagnostic cystoscopy. The clinical and surgical data of 100 consecutive patients with TVT-SECUR were collected prospectively. Two patients had urinary obstructions and needed surgical tape-tension relief. One patient had a 50 mL paravesical self-remitting hematoma. At the first-month postoperative follow-up appointment, the objective therapeutic failure rate for the TVT-SECUR procedure among the 50 patients was 20.0% (10 patients). But when the tape was placed close to the urethra with no space allowed in between, the failure rate in the second patient group went down to 8.0% (4 patients); yet no further postoperative bladder outlet obstruction was diagnosed. Four (8.0%) patients in the first group had vaginal wall penetration with the inserters, requiring withdrawal, reinsertion, and vaginal wall repair. This was avoided with the second patient group by facilitating the inserters' introduction by widening the submucosal tunnel to 12 mm. Six (12.0%) other patients in the first group needed postoperative trimming of a vaginally extruded tape segment, performed in the office with satisfactory results. This problem was addressed later by making the submucosal dissection deeper to avoid intimate proximity of the tape with the vaginal mucosa. Consequently the tape protrusion rate was reduced to 8% (4 patients). Five (10.0%) patients in the first group had unintended tape removal at the time of inserter removal, necessitating the use of a second TVT-SECUR. This was addressed by meticulous detachment of the inserter before its withdrawal, after which no further unintended tape displacements were recorded. No clinical signs for bowel, bladder, or urethral injuries; intraoperative bleeding; or postoperative infections were evident. Telephone interview at the end of 12 months postoperatively was completed with 44 (88.0%) of the first patient group and 46 (92%) of the second patient group. In all, 39 (88.6%) and 43 (93.5%) of the telephone-interviewed patients of the first and second groups, respectively, reported objective urinary continence. The TVT-SECUR, a new midurethral sling, was associated with early safety and efficacy problems. These were identified and rectified, to make the TVT-SECUR a safe and effective anti-incontinence procedure. Operative complications associated with the TVT, such as bladder penetration and postoperative outlet obstruction, and TVT-obturator complications, such as postoperative thigh pain and bladder outlet obstruction, may be reduced with the TVT-SECUR. The first 100 operations' cumulative data analysis yielded some insights, including the necessity of meticulous and proper dissection before placement of the tape and the need for applying minimal extra tension to the tape. However, long-term comparative data collection will be required to draw solid conclusions regarding the appropriate position of this operative technique within the spectrum of anti-incontinence operations.
Ramsauer, Brigitte; Lotzin, Annett; Mühlhan, Christine; Romer, Georg; Nolte, Tobias; Fonagy, Peter; Powell, Bert
2014-01-30
Psychopathology in women after childbirth represents a significant risk factor for parenting and infant mental health. Regarding child development, these infants are at increased risk for developing unfavorable attachment strategies to their mothers and for subsequent behavioral, emotional and cognitive impairments throughout childhood. To date, the specific efficacy of an early attachment-based parenting group intervention under standard clinical outpatient conditions, and the moderators and mediators that promote attachment security in infants of mentally ill mothers, have been poorly evaluated. This randomized controlled clinical trial tests whether promoting attachment security in infancy with the Circle of Security (COS) Intervention will result in a higher rate of securely attached children compared to treatment as usual (TAU). Furthermore, we will determine whether the distributions of securely attached children are moderated or mediated by variations in maternal sensitivity, mentalizing, attachment representations, and psychopathology obtained at baseline and at follow-up. We plan to recruit 80 mother-infant dyads when infants are aged 4-9 months with 40 dyads being randomized to each treatment arm. Infants and mothers will be reassessed when the children are 16-18 months of age. Methodological aspects of the study are systematic recruitment and randomization, explicit inclusion and exclusion criteria, research assessors and coders blinded to treatment allocation, advanced statistical analysis, manualized treatment protocols and assessments of treatment adherence and integrity. The aim of this clinical trial is to determine whether there are specific effects of an attachment-based intervention that promotes attachment security in infants. Additionally, we anticipate being able to utilize data on maternal and child outcome measures to obtain preliminary indications about potential moderators of the intervention and inform hypotheses about which intervention may be most suitable when offered in a clinical psychiatric outpatient context. Current Controlled Trials ISRCTN88988596.
2014-01-01
Background Psychopathology in women after childbirth represents a significant risk factor for parenting and infant mental health. Regarding child development, these infants are at increased risk for developing unfavorable attachment strategies to their mothers and for subsequent behavioral, emotional and cognitive impairments throughout childhood. To date, the specific efficacy of an early attachment-based parenting group intervention under standard clinical outpatient conditions, and the moderators and mediators that promote attachment security in infants of mentally ill mothers, have been poorly evaluated. Methods/Design This randomized controlled clinical trial tests whether promoting attachment security in infancy with the Circle of Security (COS) Intervention will result in a higher rate of securely attached children compared to treatment as usual (TAU). Furthermore, we will determine whether the distributions of securely attached children are moderated or mediated by variations in maternal sensitivity, mentalizing, attachment representations, and psychopathology obtained at baseline and at follow-up. We plan to recruit 80 mother-infant dyads when infants are aged 4-9 months with 40 dyads being randomized to each treatment arm. Infants and mothers will be reassessed when the children are 16-18 months of age. Methodological aspects of the study are systematic recruitment and randomization, explicit inclusion and exclusion criteria, research assessors and coders blinded to treatment allocation, advanced statistical analysis, manualized treatment protocols and assessments of treatment adherence and integrity. Discussion The aim of this clinical trial is to determine whether there are specific effects of an attachment-based intervention that promotes attachment security in infants. Additionally, we anticipate being able to utilize data on maternal and child outcome measures to obtain preliminary indications about potential moderators of the intervention and inform hypotheses about which intervention may be most suitable when offered in a clinical psychiatric outpatient context. Trial registration Current Controlled Trials ISRCTN88988596 PMID:24476106
Atienza, Audie A; Zarcadoolas, Christina; Vaughon, Wendy; Hughes, Penelope; Patel, Vaishali; Chou, Wen-Ying Sylvia; Pritts, Joy
2015-01-01
This study examined consumers' attitudes and perceptions regarding mobile health (mHealth) technology use in health care. Twenty-four focus groups with 256 participants were conducted in 5 geographically diverse locations. Participants were also diverse in age, education, race/ethnicity, gender, and rural versus urban settings. Several key themes emerged from the focus groups. Findings suggest that consumer attitudes regarding mHealth privacy/security are highly contextualized, with concerns depending on the type of information being communicated, where and when the information is being accessed, who is accessing or seeing the information, and for what reasons. Consumers frequently considered the tradeoffs between the privacy/security of using mHealth technologies and the potential benefits. Having control over mHealth privacy/security features and trust in providers were important issues for consumers. Overall, this study found significant diversity in attitudes regarding mHealth privacy/security both within and between traditional demographic groups. Thus, to address consumers' concerns regarding mHealth privacy and security, a one-size-fits-all approach may not be adequate. Health care providers and technology developers should consider tailoring mHealth technology according to how various types of information are communicated in the health care setting, as well as according to the comfort, skills, and concerns individuals may have with mHealth technology.
2016-06-08
Affairs June 8, 2016 Congressional Research Service 7-5700 www.crs.gov R43838 A Shift in the International Security Environment: Potential...Implications for Defense Congressional Research Service Summary World events have led some observers, starting in late 2013, to conclude that the...Defense Congressional Research Service Contents Introduction
28 CFR 524.72 - CIM assignment categories.
Code of Federal Regulations, 2010 CFR
2010-07-01
... groups (e.g., prison gangs), which have a history of disrupting operations and security in either state... assignment categories. CIM cases are classified according to the following assignments: (a) Witness Security... safety of these individuals. There are two types of Witness Security cases: Department of Justice...
NASA Astrophysics Data System (ADS)
Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
MacInnes, Douglas; Kinane, Catherine; Parrott, Janet; Mansfield, Jacqueline; Craig, Tom; Eldridge, Sandra; Marsh, Ian; Chan, Claire; Hounsome, Natalia; Harrison, George; Priebe, Stefan
2016-09-29
There is a lack of research in forensic settings examining therapeutic relationships. A structured communication approach, placing patients' perspectives at the heart of discussions about their care, was used to improve patients' quality of life in secure settings. The objectives were to: • Establish the feasibility of the trial design • Determine the variability of the outcomes of interest • Estimate the costs of the intervention • If necessary, refine the intervention METHODS: A pilot cluster randomised controlled trial was conducted. Data was collected from July 2012 to January 2015 from participants in 6 medium secure in-patient services in London and Southern England. 55 patients and 47 nurses were in the intervention group with 57 patients and 45 nurses in the control group. The intervention comprised 6 nurse-patient meetings over a 6 month period. Patients rated their satisfaction with a range of domains followed by discussions on improving patient identified problems. Assessments took place at baseline, 6 months, and 12 months. Participants were not blind to their allocated group. The primary outcome was self-reported quality of life collected by a researcher blind to participants' allocation status. The randomisation procedures and intervention approach functioned well. The measures used were understood by the participants and gave relevant outcome information. The response rates were good with low patient withdrawal rates. The quality of life estimated treatment effect was 0.2 (95 % CI: -0.4 to 0.8) at 6 months and 0.4 (95 % CI: -0.3 to 1.1) indicating the likely extreme boundaries of effect in the main trial. The estimated treatment effect of the primary outcome is clinically important, and a positive effect of the intervention is not ruled out. The estimate of the ICC for the primary outcome at 6 and 12 months was 0.04 (0.00 to 0.17) and 0.05 (0.00 to 0.18). The cost of the intervention was £529 per patient. The trial design was viable as the basis for a full-scale trial. A full trial is justified to estimate the effect of the intervention with greater certainty. The variability of the outcomes could be used to calculate numbers needed for a full-scale trial. Ratings of need for therapeutic security may be useful in any future study. Current Controlled Trials ISRCTN34145189 . Retrospectively registered 22 June 2012.
Kim, Min-Seok; Hong, Yun-Chul; Yook, Ji-Hoo; Kang, Mo-Yeol
2017-10-01
To investigate the effects of job security on new development of depressive episode, suicide ideation, and decline in self-rated health. Data from the Korea Welfare Panel Study from 2012 to 2015 were analysed. A total of 2912 waged workers self-assessed their depressive episode, suicide ideation, and health annually by answering the questionnaire. Participants were divided into three groups according to the level of job security: high, intermediate and low. To evaluate the influence of job security, we performed survival analysis after stratification by gender with adjustment for covariates. The result was further stratified by whether the respondent was the head of household. After adjusting for covariates, men in low job security group showed significantly higher hazard ratios (HRs) for depression (HR 1.27, 95% CI 1.01-1.60), suicide ideation (HR 3.25, 95% CI 1.72-6.16), and decline in self-rated health (HR 1.73, 95% CI 1.16-2.59). Women showed significantly higher HR of depression in the intermediate (HR 1.37, 95% CI 1.01-1.87) and low (HR 1.50, 95% CI 1.12-1.99) job security group. Male head of household with low job security showed significantly higher HR of depression, suicide ideation, and decline in self-rated health. Non-head-of-household women with intermediate and low job security showed higher risk of depression than those with high job security. We found that perceived job insecurity is associated with the new development of depressive episode, suicide ideation, and decline in self-rated health.
Technologies to counter aviation security threats
NASA Astrophysics Data System (ADS)
Karoly, Steve
2017-11-01
The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.
Technology Assessment and Roadmap for the Emergency Radiation Dose Assessment Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Turteltaub, K W; Hartman-Siantar, C; Easterly, C
2005-10-03
A Joint Interagency Working Group (JIWG) under the auspices of the Department of Homeland Security Office of Research and Development conducted a technology assessment of emergency radiological dose assessment capabilities as part of the overall need for rapid emergency medical response in the event of a radiological terrorist event in the United States. The goal of the evaluation is to identify gaps and recommend general research and development needs to better prepare the Country for mitigating the effects of such an event. Given the capabilities and roles for responding to a radiological event extend across many agencies, a consensus ofmore » gaps and suggested development plans was a major goal of this evaluation and road-mapping effort. The working group consisted of experts representing the Departments of Homeland Security, Health and Human Services (Centers for Disease Control and the National Institutes of Health), Food and Drug Administration, Department of Defense and the Department of Energy's National Laboratories (see appendix A for participants). The specific goals of this Technology Assessment and Roadmap were to: (1) Describe the general context for deployment of emergency radiation dose assessment tools following terrorist use of a radiological or nuclear device; (2) Assess current and emerging dose assessment technologies; and (3) Put forward a consensus high-level technology roadmap for interagency research and development in this area. This report provides a summary of the consensus of needs, gaps and recommendations for a research program in the area of radiation dosimetry for early response, followed by a summary of the technologies available and on the near-term horizon. We then present a roadmap for a research program to bring present and emerging near-term technologies to bear on the gaps in radiation dose assessment and triage. Finally we present detailed supporting discussion on the nature of the threats we considered, the status of technology today, promising emerging technologies and references for further reading.« less
Homeland Security Strategic Research Action Plan 2012 - 2016
EPA’s Homeland Security research plan outline and how it will address science and technological gaps and improve the Agency’s ability to carry out its responsibilities associated with preparing for and responding to, terrorist attacks, and other disasters.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-26
... received by December 19, 2012. SUMMARY: This Request For Comments (RFC) is issued by the Cyber Security and... plan was developed under the leadership of the Cyber Security and Information Assurance Research and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Camelot Entertainment Group, Inc., Cavico Corp., Global 8 Environmental Technologies, Inc., GTC Telecom Corp., ICF Corporation, and... concerning the securities of GTC Telecom Corp. because it has not filed any periodic reports since the period...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Abviva, Inc., ACTIS Global Ventures, Inc., aeroTelesis, Inc., Amwest Insurance Group, Inc., and Auto Underwriters of America, Inc.; Order of... concerning the securities of Auto Underwriters of America, Inc. because it has not filed any periodic reports...
Tommaselli, Giovanni A; Di Carlo, Costantino; Gargano, Virginia; Formisano, Carmen; Scala, Mariamaddalena; Nappi, Carmine
2010-10-01
To reduce complications of transobturator tension-free vaginal tape, single-incision devices were introduced in the last years. We here report a comparison between the tension-free vaginal tape-obturator (TVT-O) and the TVT-Secur techniques in terms of efficacy and safety. Eighty-four patients with stress urinary incontinence (SUI) were scheduled to undergo TVT-O or TVT-Secur. Duration of the procedure, subjective estimate of blood loss, intraoperative and postoperative complications, postoperative postvoidal residue (PVR), time to first voiding, and pain level were recorded. Urodynamic tests, PVR, Incontinence Questionnaire Short Form (ICIQ-SF), King's Health Questionnaire, and a urinary diary were performed before and 12 months after procedure. No differences in terms of cure rate were observed between the two groups (81.6% vs. 83.8%). Complication rate in the TVT-Secur group was lower (8.1%) than in the TVT-O group (15.8%), but not significant. Both techniques seem to be effective and safe, with a low incidence of complications in both groups.
Clinical Risk Assessment in Intensive Care Unit
Asefzadeh, Saeed; Yarmohammadian, Mohammad H.; Nikpey, Ahmad; Atighechian, Golrokh
2013-01-01
Background: Clinical risk management focuses on improving the quality and safety of health care services by identifying the circumstances and opportunities that put patients at risk of harm and acting to prevent or control those risks. The goal of this study is to identify and assess the failure modes in the ICU of Qazvin's Social Security Hospital (Razi Hospital) through Failure Mode and Effect Analysis (FMEA). Methods: This was a qualitative-quantitative research by Focus Discussion Group (FDG) performed in Qazvin Province, Iran during 2011. The study population included all individuals and owners who are familiar with the process in ICU. Sampling method was purposeful and the FDG group members were selected by the researcher. The research instrument was standard worksheet that has been used by several researchers. Data was analyzed by FMEA technique. Results: Forty eight clinical errors and failure modes identified, results showed that the highest risk probability number (RPN) was in respiratory care “Ventilator's alarm malfunction (no alarm)” with the score 288, and the lowest was in gastrointestinal “not washing the NG-Tube” with the score 8. Conclusions: Many of the identified errors can be prevented by group members. Clinical risk assessment and management is the key to delivery of effective health care. PMID:23930171
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Hsien-Hsin S
The overall objective of this research project is to develop novel architectural techniques as well as system software to achieve a highly secure and intrusion-tolerant computing system. Such system will be autonomous, self-adapting, introspective, with self-healing capability under the circumstances of improper operations, abnormal workloads, and malicious attacks. The scope of this research includes: (1) System-wide, unified introspection techniques for autonomic systems, (2) Secure information-flow microarchitecture, (3) Memory-centric security architecture, (4) Authentication control and its implication to security, (5) Digital right management, (5) Microarchitectural denial-of-service attacks on shared resources. During the period of the project, we developed several architectural techniquesmore » and system software for achieving a robust, secure, and reliable computing system toward our goal.« less
State-of-the-art research on electromagnetic information security
NASA Astrophysics Data System (ADS)
Hayashi, Yu-ichi
2016-07-01
As information security is becoming increasingly significant, security at the hardware level is as important as in networks and applications. In recent years, instrumentation has become cheaper and more precise, computation has become faster, and capacities have increased. With these advancements, the threat of advanced attacks that were considerably difficult to carry out previously has increased not only in military and diplomatic fields but also in general-purpose manufactured devices. This paper focuses on the problem of the security limitations concerning electromagnetic waves (electromagnetic information security) that has rendered attack detection particularly difficult at the hardware level. In addition to reviewing the mechanisms of these information leaks and countermeasures, this paper also presents the latest research trends and standards.
Tyfield, David
2011-07-01
There is a growing consensus that we are facing epochal challenges in global food security. Moreover, these challenges are multiple and complex. Meeting these challenges will involve nothing less than a wholesale socio-technical transition of the agri-food system. Optimizing the efficacy of the contribution of research to such a food security agenda will probably also need new institutional mechanisms and career structures to facilitate new kinds of collaborations and ongoing, longer-term projects. In short, the multiple challenges of food security demand a different political economy of research for effective intervention by science. In making this argument, the paper summarizes the major findings of a recent report regarding the potential impact of so-called 'disruptive' low-carbon innovations in China.
Williams, Riccardo; Leone, Luigi; Faedda, Noemi; Natalucci, Giulia; Bellini, Benedetta; Salvi, Elisa; Verdecchia, Paola; Cerutti, Rita; Arruda, Marco; Guidetti, Vincenzo
2017-12-01
It is widely recognised that there are associations between headache, psychiatric comorbidity and attachment insecurity in both adults and children. The aims of this study were: 1) to compare perceived attachment security and anxiety in children and adolescents with migraine without aura and a healthy control group; 2) to test whether the child's perceived security of attachment to the mother and the father mediated the association between migraine and anxiety. One hundred children and adolescents with Migraine without Aura were compared with a control group of 100 children without headache. The Security Scale (measures perceived security of attachments) and the Self-Administered Psychiatric Scales for Children and Adolescents, a measure of anxiety symptoms, were administered to all participants. The clinical group had lower attachment security than the control group and higher scores on all anxiety scales. Anxiety was negatively correlated with attachment. Children's attachment to their mother mediated the increase in global anxiety in the clinical group. Insecure paternal attachment was associated with greater insecurity in maternal attachment, suggesting that there is a complex pathway from migraine to anxiety symptoms mediated by perceived insecurity of paternal attachment and hence also by perceived insecurity of maternal attachment. These results suggest that insecure parental attachment may exacerbate anxiety in children and adolescents with migraine and point to the importance of multimodal interventions, perhaps taking account of family relationships, for children and adolescents with migraine.
Multinational Experiment 6 (MNE 6) Doctrine Note: Security Transitions
2010-10-28
to Transition in Northern Ireland In Armagh, Northern Ireland , public perception became a key driver of the security transition and shaped what had...government and non-state actors, including religious and tribal affiliations, genders , age groups and geographic areas provides a richer basis for planning...functions necessary to maintain security; gaps may also emerge within particular elements of the security and justice sectors. Partners may lack
The International Criminal Court as a Component of U.S. National Security Strategy
2012-04-21
Security Strategy 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER LTC Jonathan R. Hirsch, U.S. Army...98) Prescribed by ANSI Std. Z39.18 USAWC CIVILIAN RESEARCH PROJECT THE INTERNATIONAL CRIMINAL COURT AS A COMPONENT OF U.S...Security Strategy FORMAT: Civilian Research Project DATE: 21 April 2012 WORD COUNT: 11,629 PAGES: 46 KEY TERMS: Lawfare, Contractor
Secure Learning and Learning for Security: Research in the Intersection
2010-05-13
researchers to consider how Machine Learning and Statistics might be leveraged for constructing intelli - gent attacks. In a similar vein, security...Quantiles S am pl e Q ua nt ile s...8217 Residuals in Flow 144 Theoretical Quantiles S am pl e Q ua nt ile s 0 1 2 3 4 5 6 7 5. 0e + 07 1. 0e + 08 1. 5e + 08 Comparing Actual and Synthetic
The Health Services Research Workforce: Current Stock
McGinnis, Sandra; Moore, Jean
2009-01-01
Objective To examine the size and characteristics of the health services research (HSR) workforce; the job satisfaction, job security, and future plans reported by the workforce; and the future of the HSR workforce supply. Data Sources (1) AcademyHealth active and lapsed members since 2000 and annual research meeting presenters and interest group participants; (2) principal investigators of research projects listed in the HSRProj database; and (3) authors of articles published in two HSR journals. Study Design Data on investigators conducting HSR in selected venues were collected and compared in order to identify the percentage of the HSR workforce represented in the “core” versus related disciplines and to investigate the extent to which the “core” researchers publish, present, or participate in disciplinary venues. Principal Findings The field appears to have grown dramatically since 1995, from an estimated 5,000 health services researchers to an estimated 11,596 in 2007. This is a broad workforce characterized by various levels of involvement in the field. Some researchers self-identify with the field of HSR, while others are associated primarily with venues related to specific disciplines. Many researchers who identify with HSR also publish in venues related to multiple other disciplines. Conclusions The field may face future challenges related to demographic change, such as an aging workforce and an increased need for diversity. International collaboration appears common, and in the future the field may need to be defined internationally rather than nationally. At the same time, there are also many indications that HSR is a good field to work in. Health services researchers reported high levels of satisfaction with their profession and current employer, as well as little desire to change jobs and little concern about job security. PMID:20459584
Walker, Jennifer L; Holben, David H; Kropf, Mary L; Holcomb, John P; Anderson, Heidi
2007-11-01
Food insecurity has been negatively associated with social capital (a measure of perceived social trust and community reciprocity) and health status. Yet, these factors have not been studied extensively among women from households participating in the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the WIC Farmers' Market Nutrition Program. A cross-sectional, self-administered, mailed survey was conducted in Athens County, Ohio, to examine the household food security status, social capital, and self-rated health status of women from households receiving WIC benefits alone (n=170) and those from households receiving both WIC and Farmers' Market Nutrition Program benefits (n=65), as well as the relationship of food security, social capital, and self-rated health status. Household food security and perceived health status were not significantly different between groups; however, high social capital was greater (chi(2)=8.156, P=0.004) among WIC, compared to WIC/Farmers' Market Nutrition Program group respondents. Overall, household food insecurity was inversely associated with perceived health status (r=-0.229, P=0.001) and social capital (r=0.337, P<0.001). Enabling networking among clients, leading to client-facilitated programs and projects, and developing programs that strengthen social capital, including community-based mentoring programs and nutrition education programs that are linked to community-based activities, are needed, as is additional research to verify these findings.
Privacy, security, and the public health researcher in the era of electronic health record research
Sarwate, Anand D.
2016-01-01
Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools. PMID:28210428
Privacy, security, and the public health researcher in the era of electronic health record research.
Goldstein, Neal D; Sarwate, Anand D
2016-01-01
Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-18
... research, development, engineering and production of border security-related systems; and (iii) to insert.... Patricia A. Brink, Director of Civil Enforcement, Antitrust Division. [FR Doc. 2012-14766 Filed 6-15-12; 8...
Water Shortage: Lessons in Conservation From the Great California Drought, 1976-1977
NASA Astrophysics Data System (ADS)
Showstack, Randy
Legislation moving quickly through both houses of the U.S. Congress would establish a fund to promote and support research and development to increase the security of the nation's water infrastructure from source to faucet.The House of Representatives bill, "The Water Infrastructure Security and Research and Development Act" (HR 3178), would provide $12 million per year for fiscal years 2002-2006 for a number of research areas. These include assessing water supply systems for physical vulnerabilities, including biological, chemical, and radiological contamination; devising real-time systems to monitor water for contamination; determining mitigation options; and upgrading security technologies.
Secured web-based video repository for multicenter studies
Yan, Ling; Hicks, Matt; Winslow, Korey; Comella, Cynthia; Ludlow, Christy; Jinnah, H. A; Rosen, Ami R; Wright, Laura; Galpern, Wendy R; Perlmutter, Joel S
2015-01-01
Background We developed a novel secured web-based dystonia video repository for the Dystonia Coalition, part of the Rare Disease Clinical Research network funded by the Office of Rare Diseases Research and the National Institute of Neurological Disorders and Stroke. A critical component of phenotypic data collection for all projects of the Dystonia Coalition includes a standardized video of each participant. We now describe our method for collecting, serving and securing these videos that is widely applicable to other studies. Methods Each recruiting site uploads standardized videos to a centralized secured server for processing to permit website posting. The streaming technology used to view the videos from the website does not allow downloading of video files. With appropriate institutional review board approval and agreement with the hosting institution, users can search and view selected videos on the website using customizable, permissions-based access that maintains security yet facilitates research and quality control. Results This approach provides a convenient platform for researchers across institutions to evaluate and analyze shared video data. We have applied this methodology for quality control, confirmation of diagnoses, validation of rating scales, and implementation of new research projects. Conclusions We believe our system can be a model for similar projects that require access to common video resources. PMID:25630890
Secure multi-party communication with quantum key distribution managed by trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less
Quantum Secure Group Communication.
Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M
2018-03-01
We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.
Alternative Futures: United States Air Force Security Police in the Twenty-First Century
1988-04-01
34What policies should today’s Air Force leadership be pursuing to prepare for tomorrow’s combat support and security police roles?’ The monograph...Further, it addresses the capability of the Air Force to respond to its future combat support and security police missions and their integration into the...security police organizations. His most recent assignments were as the deputy commander of a combat support group and the commander of a security police
Updating energy security and environmental policy: Energy security theories revisited.
Proskuryakova, L
2018-06-18
The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.
Raby, K Lee; Roisman, Glenn I; Booth-LaForce, Cathryn
2015-11-01
A longstanding question for attachment theory and research is whether genetically based characteristics of the child influence the development of attachment security and its stability over time. This study attempted to replicate and extend recent findings indicating that the developmental stability of attachment security is moderated by oxytocin receptor (OXTR) genetic variants. Using longitudinal data from over 550 individuals, there was no evidence that OXTR rs53576 moderated the association between attachment security during early childhood and overall coherence of mind ("security") during the Adult Attachment Interview at age 18 years. Additional analyses involving a second commonly investigated OXTR variant (rs2254298) and indices of individuals' dismissing and preoccupied attachment states of mind also failed to provide robust evidence for oxytonergic moderation of the stability in attachment security across development. The discussion focuses on research strategies for investigating genetic contributions to attachment security across the life span. (c) 2015 APA, all rights reserved).
Earned-secure attachment status in retrospect and prospect.
Roisman, Glenn L; Padrón, Elena; Sroufe, L Alan; Egeland, Byron
2002-01-01
Past research with the Berkeley Adult Attachment Interview demonstrates that retrospectively defined earned-secures (who coherently describe negative childhood experiences) parent as effectively as do continuous-secures (who coherently describe positive childhood experiences), but manifest liabilities in the form of depressive symptomatology. This article presents data from a 23-year longitudinal study that replicate and extend prior research, testing a key premise that earned-secures so defined actually have a history of insecure attachments that change over time and/or endure consistently harsh or ineffective parenting in their youth. Discrepant with assumptions, retrospective earned-secures were not more likely than continuous-secures to have been anxiously attached in infancy and were observed in childhood and adolescence to have encountered among the most supportive and structured maternal parenting in a high-risk sample. Prospectively defined earned-secures (operationalized using participants' infant attachment classifications) did indeed go on to have success in their close relationships, many without reporting relatively high levels of internalizing distress in adulthood.
A Complex Systems Approach to More Resilient Multi-Layered Security Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Nathanael J. K.; Jones, Katherine A.; Bandlow, Alisa
In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for amore » performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (P I) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.« less