A Cyber Security Self-Assessment Method for Nuclear Power Plants
DOE Office of Scientific and Technical Information (OSTI.GOV)
Glantz, Clifford S.; Coles, Garill A.; Bass, Robert B.
2004-11-01
A cyber security self-assessment method (the Method) has been developed by Pacific Northwest National Laboratory. The development of the Method was sponsored and directed by the U.S. Nuclear Regulatory Commission. Members of the Nuclear Energy Institute Cyber Security Task Force also played a substantial role in developing the Method. The Method's structured approach guides nuclear power plants in scrutinizing their digital systems, assessing the potential consequences to the plant of a cyber exploitation, identifying vulnerabilities, estimating cyber security risks, and adopting cost-effective protective measures. The focus of the Method is on critical digital assets. A critical digital asset is amore » digital device or system that plays a role in the operation, maintenance, or proper functioning of a critical system (i.e., a plant system that can impact safety, security, or emergency preparedness). A critical digital asset may have a direct or indirect connection to a critical system. Direct connections include both wired and wireless communication pathways. Indirect connections include sneaker-net pathways by which software or data are manually transferred from one digital device to another. An indirect connection also may involve the use of instructions or data stored on a critical digital asset to make adjustments to a critical system. The cyber security self-assessment begins with the formation of an assessment team, and is followed by a six-stage process.« less
77 FR 28894 - Maritime Vulnerability Self-Assessment Tool
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-16
... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Maritime Vulnerability Self... maritime vulnerability self- assessment tool. SUMMARY: The Transportation Security Administration (TSA... conducting vulnerability assessments became available and usage of the TMSARM has dropped off considerably...
Evaluation of power system security and development of transmission pricing method
NASA Astrophysics Data System (ADS)
Kim, Hyungchul
The electric power utility industry is presently undergoing a change towards the deregulated environment. This has resulted in unbundling of generation, transmission and distribution services. The introduction of competition into unbundled electricity services may lead system operation closer to its security boundaries resulting in smaller operating safety margins. The competitive environment is expected to lead to lower price rates for customers and higher efficiency for power suppliers in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing. In power system security assessment, the following issues are discussed (1) The description of probabilistic methods for power system security assessment; (2) The computation time of simulation methods; (3) on-line security assessment for operation. A probabilistic method using Monte-Carlo simulation is proposed for power system security assessment. This method takes into account dynamic and static effects corresponding to contingencies. Two different Kohonen networks, Self-Organizing Maps and Learning Vector Quantization, are employed to speed up the probabilistic method. The combination of Kohonen networks and Monte-Carlo simulation can reduce computation time in comparison with straight Monte-Carlo simulation. A technique for security assessment employing Bayes classifier is also proposed. This method can be useful for system operators to make security decisions during on-line power system operation. This dissertation also suggests an approach for allocating transmission transaction costs based on reliability benefits in transmission services. The proposed method shows the transmission transaction cost of reliability benefits when transmission line capacities are considered. The ratio between allocation by transmission line capacity-use and allocation by reliability benefits is computed using the probability of system failure.
Independent Assessment Plan: LAV-25
1989-06-27
Pages. Enter the total Block 7. Performing Organization Name(s) and number of pages. Address(es. Self -explanatory. Block 16. Price Code, Enter...organization Blocks 17. - 19. Security Classifications. performing the report. Self -explanatory. Enter U.S. Security Classification in accordance with U.S...Security Block 9. S oonsorina/Monitoring Acenc Regulations (i.e., UNCLASSIFIED). If form .Names(s) and Address(es). Self -explanatory. contains classified
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63095; File No. SR-MSRB-2010-10] Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Consisting of Amendments to Rule A-13 To Increase Transaction Assessments for Certain Municipal Securities Transactions Reported to the Board and To...
Lyles, Courtney R.; Wolf, Michael S.; Schillinger, Dean; Davis, Terry C.; DeWalt, Darren; Dahlke, Allison R.; Curtis, Laura; Seligman, Hilary K.
2013-01-01
OBJECTIVE Food insecurity is hypothesized to make diabetes self-management more difficult. We conducted a longitudinal assessment of food insecurity with several diabetes self-care measures. RESEARCH DESIGN AND METHODS We conducted a secondary, observational analysis of 665 low-income patients with diabetes, all of whom received self-management support as part of a larger diabetes educational intervention. We analyzed baseline food insecurity (measured by the U.S. Department of Agriculture Food Security module) in relation to changes in hemoglobin A1c (HbA1c) as well as self-reported diabetes self-efficacy and daily fruit and vegetable intake. We examined longitudinal differences using generalized estimating equation linear regression models, controlling for time, age, sex, race, income, and intervention arm. RESULTS Overall, 57% of the sample had an income <$15,000. Participants who were food insecure (33%) were younger, had less income, and were more likely to be unemployed compared with participants who were food secure. At baseline, those who were food insecure had higher mean HbA1c values (8.4% vs. 8.0%) and lower self-efficacy and fruit and vegetable intake than those who were food secure (all P < 0.05). Compared with food-secure individuals, participants who were food insecure had significantly greater improvements in HbA1c over time (0.38% decrease compared with 0.01% decrease; P value for interaction <0.05) as well as in self-efficacy (P value for interaction <0.01). There was no significant difference in HbA1c by food security status at follow-up. CONCLUSIONS Participants experiencing food insecurity had poorer diabetes-related measures at baseline but made significant improvements in HbA1c and self-efficacy. Low-income patients who were food insecure may be particularly receptive to diabetes self-management support, even if interventions are not explicitly structured to address finances or food security challenges. PMID:23275354
Antle, John M.; Stoorvogel, Jetse J.; Valdivia, Roberto O.
2014-01-01
This article presents conceptual and empirical foundations for new parsimonious simulation models that are being used to assess future food and environmental security of farm populations. The conceptual framework integrates key features of the biophysical and economic processes on which the farming systems are based. The approach represents a methodological advance by coupling important behavioural processes, for example, self-selection in adaptive responses to technological and environmental change, with aggregate processes, such as changes in market supply and demand conditions or environmental conditions as climate. Suitable biophysical and economic data are a critical limiting factor in modelling these complex systems, particularly for the characterization of out-of-sample counterfactuals in ex ante analyses. Parsimonious, population-based simulation methods are described that exploit available observational, experimental, modelled and expert data. The analysis makes use of a new scenario design concept called representative agricultural pathways. A case study illustrates how these methods can be used to assess food and environmental security. The concluding section addresses generalizations of parametric forms and linkages of regional models to global models. PMID:24535388
Antle, John M; Stoorvogel, Jetse J; Valdivia, Roberto O
2014-04-05
This article presents conceptual and empirical foundations for new parsimonious simulation models that are being used to assess future food and environmental security of farm populations. The conceptual framework integrates key features of the biophysical and economic processes on which the farming systems are based. The approach represents a methodological advance by coupling important behavioural processes, for example, self-selection in adaptive responses to technological and environmental change, with aggregate processes, such as changes in market supply and demand conditions or environmental conditions as climate. Suitable biophysical and economic data are a critical limiting factor in modelling these complex systems, particularly for the characterization of out-of-sample counterfactuals in ex ante analyses. Parsimonious, population-based simulation methods are described that exploit available observational, experimental, modelled and expert data. The analysis makes use of a new scenario design concept called representative agricultural pathways. A case study illustrates how these methods can be used to assess food and environmental security. The concluding section addresses generalizations of parametric forms and linkages of regional models to global models.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-19
... securities laws. It is suggested that the Company consult with corporate/securities counsel in assessing its... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68053; File No. SR-NASDAQ-2012-118] Self... Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice...
Toth, Sheree L; Rogosch, Fred A; Sturge-Apple, Melissa; Cicchetti, Dante
2009-01-01
Relations among maternal depression, child attachment, and children's representations of parents and self were examined. Participants included toddlers and their mothers with a history of major depressive disorder (n= 63) or no history of mental disorder (n= 68). Attachment was assessed at 20 and 36 months and representations of parents and self were assessed at 36 and 48 months. Depressive symptoms were assessed at all 3 time points. While early-occurring maternal depression had a negative impact on children's negative and positive representations of parents, attachment security mediated the relation between depressive symptoms and negative representations. Attachment security served as an intervening variable between maternal depression and changes in children's negative representations of self. Implications for prevention are highlighted.
ERIC Educational Resources Information Center
Davies, Patrick T.; Forman, Evan M.; Rasi, Jennifer A.; Stevens, Kristopher I.
2002-01-01
Evaluated new self-report measure assessing children's strategies for preserving emotional security in context of interparental conflict. Factor analyses of the Security in the Interparental Subsystem (SIS) Scale supported a 7-factor solution. The SIS demonstrated satisfactory internal consistency and test-retest reliability. Support for test…
The relation of attachment security status to effortful self-regulation: A meta-analysis.
Pallini, Susanna; Chirumbolo, Antonio; Morelli, Mara; Baiocco, Roberto; Laghi, Fiorenzo; Eisenberg, Nancy
2018-05-01
Secure attachment relationships have been described as having a regulatory function in regard to children's emotions, social cognition, and behavior. Although some theorists and researchers have argued that attachment affects children's self-regulation, most attachment theorists have not strongly emphasized this association. The goal of the current meta-analysis was to determine the magnitude of the relation between attachment security status and effortful control (EC)/top-down self-regulation in children up to 18 years of age. One hundred six papers met the inclusion criteria and 101 independent samples were used in analyses. When secure attachment status was compared with insecure attachment status, a significant relation (effect size [ES]) with EC favoring children with a secure attachment was found (100 studies; 20,350 participants; r = .20). A stronger relation was found when the same coder evaluated attachment than when the coder was different and when the measure of attachment was continuous; other moderators were not significant. Securely attached children were higher in EC than their avoidant (r = .10) or resistant (r = .17) counterparts. Children with organized attachments were higher in EC than those with disorganized attachments (r = .17), although this finding could be due to publication bias. For some comparisons of subgroups (B vs. A, B vs. C, and/or D vs. all others), moderation was found by source of information (higher ES for same reporter), age at assessment of EC and/or attachment (higher ES at older ages), method of attachment (lower ES for observational measures), time difference between assessments or research design (higher ESs for smaller time differences and concurrent findings), and published versus unpublished studies (higher ES for unpublished studies for A vs. B). (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Execution of a self-directed risk assessment methodology to address HIPAA data security requirements
NASA Astrophysics Data System (ADS)
Coleman, Johnathan
2003-05-01
This paper analyzes the method and training of a self directed risk assessment methodology entitled OCTAVE (Operationally Critical Threat Asset and Vulnerability Evaluation) at over 170 DOD medical treatment facilities. It focuses specifically on how OCTAVE built interdisciplinary, inter-hierarchical consensus and enhanced local capabilities to perform Health Information Assurance. The Risk Assessment Methodology was developed by the Software Engineering Institute at Carnegie Mellon University as part of the Defense Health Information Assurance Program (DHIAP). The basis for its success is the combination of analysis of organizational practices and technological vulnerabilities. Together, these areas address the core implications behind the HIPAA Security Rule and can be used to develop Organizational Protection Strategies and Technological Mitigation Plans. A key component of OCTAVE is the inter-disciplinary composition of the analysis team (Patient Administration, IT staff and Clinician). It is this unique composition of analysis team members, along with organizational and technical analysis of business practices, assets and threats, which enables facilities to create sound and effective security policies. The Risk Assessment is conducted in-house, and therefore the process, results and knowledge remain within the organization, helping to build consensus in an environment of differing organizational and disciplinary perspectives on Health Information Assurance.
Energy efficiency in urban management: Russian and world experience
NASA Astrophysics Data System (ADS)
Pryadko, Igor
2017-10-01
The article discusses the role of energetics in creating a comfortable and safe environment of modern megacities, and the problem is considered in the socio-economic aspect. The object is the energy security of the city, and the subject is the influence of urban society on the formation of energy security. In particular, the problems are raised: ecological problems of urban energy supply, the condition of surface layer of the atmosphere near electric power lines. The author assesses the actions, implemented by the urban authorities in Mytischi, in the southwestern areas of New Moscow. The author assesses these sample areas on the basis of Ch. Landry’s concept of self-training, designated for municipal authorities and urban communities, and offers several successfully implemented self-study cases and in the light of modern methods of ensuring energy security. The forecasts of creation of energy-safe space, made by modern sociologist-urbanist Leo Hollis, are taken into account. The author also considers some of the economic aspects of biosphere safety. In particular, he insists that biosphere safety, convenience, and comfort have developed into competitive advantages in the housing market.
Boldt, Lea J.; Kochanska, Grazyna; Yoon, Jeung Eun; Nordling, Jamie Koenig
2014-01-01
We examined children’s attachment security with their mothers and fathers in a community sample (N = 100). At 25 months, mothers, fathers, and trained observers completed Attachment Q-Set (AQS). At 100 months, children completed Kerns Security Scale (KSS) for each parent. Children’s adaptation (behavior problems and competence in broader ecologies of school and peer group, child- and parent-reported) was assessed at 100 months. By and large, the child’s security with the mother and father was modestly to robustly concordant across both relationships, depending on the assessment method. Observers’ AQS security scores predicted children’s self-reported security 6 years later. For children with low AQS security scores with mothers, variations in security with fathers had significant implications for adaptation: Those whose security with fathers was also low reported the most behavior problems and were seen as least competent in broader ecologies, but those whose security with fathers was high reported few problems and were seen as competent. Security with fathers, observer-rated and child-reported, predicted children’s higher competence in broader ecologies. A cumulative index of the history of security from toddler age to middle childhood, integrating measures across both relationships and diverse methodologies, was significantly associated with positive adaptation at 100 months. PMID:24605850
Attachment, self-worth, and peer-group functioning in middle childhood.
Booth-Laforce, Cathryn; Oh, Wonjung; Kim, Angel Hayoung; Rubin, Kenneth H; Rose-Krasnor, Linda; Burgess, Kim
2006-12-01
We evaluated links between peer-group functioning and indicators of attachment security in relation to both mother and father in middle childhood, among 73 10-year-olds (37 girls). Children's perceptions of security with both parents, coping styles with mother, and self-worth were assessed. Classmates, teachers, and mothers evaluated the participants' peer-related behavioral characteristics. Children's perceptions of security to both parents were related to others' appraisals of their social competence; perceptions of security to father were related to lower aggression. We did not find child gender effects, but children had higher security scores in relation to mother than to father. Self-worth perceptions mediated the relation between attachment and social competence.
76 FR 75553 - Completion of the Broker Self-Assessment Outreach Pilot
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-02
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Completion of the Broker Self...: General notice. SUMMARY: This document announces the completion of the Broker Self- Assessment (BSA... July 2009. CBP has decided to end the BSA pilot without a plan to proceed with another Importer Self...
Safe teleradiology: information assurance as project planning methodology.
Collmann, Jeff; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2005-01-01
The Georgetown University Medical Center Department of Radiology used a tailored version of OCTAVE, a self-directed information security risk assessment method, to design a teleradiology system that complied with the regulation implementing the security provisions of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The system addressed threats to and vulnerabilities in the privacy and security of protected health information. By using OCTAVE, Georgetown identified the teleradiology program's critical assets, described threats to the assurance of those assets, developed and ran vulnerability scans of a system pilot, evaluated the consequences of security breaches, and developed a risk management plan to mitigate threats to program assets, thereby implementing good information assurance practices. This case study illustrates the basic point that prospective, comprehensive planning to protect the privacy and security of an information system strategically benefits program management as well as system security.
ERIC Educational Resources Information Center
Aspelmeier, Jeffery E.; Elliott, Ann N.; Smith, Christopher H.
2007-01-01
Objective: The present study tests a model linking attachment, childhood sexual abuse (CSA), and adult psychological functioning. It expands on previous work by assessing the degree to which attachment security moderates the relationship between a history of child sexual abuse and trauma-related symptoms in college females. Method: Self-reports of…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-27
... the FINRA By-Laws to provide an alternative method of calculating the Trading Activity Fee (``TAF... Change 1. Purpose The TAF is one of the member regulatory fees FINRA uses to fund its member regulation... enforcement activities.\\3\\ In general, the TAF is assessed for the sale of all exchange registered securities...
Self-assembling membranes and related methods thereof
Capito, Ramille M; Azevedo, Helena S; Stupp, Samuel L
2013-08-20
The present invention relates to self-assembling membranes. In particular, the present invention provides self-assembling membranes configured for securing and/or delivering bioactive agents. In some embodiments, the self-assembling membranes are used in the treatment of diseases, and related methods (e.g., diagnostic methods, research methods, drug screening).
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-05
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT) AGENCY: National Protection and Programs Directorate...), Office of Infrastructure Protection (IP), Sector Outreach and Programs Division (SOPD), previously named...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0069] Assessment Questionnaire--IP Sector Specific Agency Risk Self Assessment Tool (IP-SSARSAT) AGENCY: National Protection and Programs Directorate...), Office of Infrastructure Protection (IP), Sector Specific Agency Executive Management Office (SSA EMO...
Attachment at work and performance.
Neustadt, Elizabeth A; Chamorro-Premuzic, Tomas; Furnham, Adrian
2011-09-01
This paper examines the relations between self-reported attachment orientation at work and personality, self-esteem, trait emotional intelligence (aka emotional self-efficacy), and independently assessed career potential and job performance. Self-report data were collected from 211 managers in an international business in the hospitality industry; independent assessments of these managers' job performance and career potential were separately obtained from the organization. A self-report measure of romantic attachment was adapted for application in the work context; a two-factor solution was found for this measure. Secure/autonomous attachment orientation at work was positively related to self-esteem, trait emotional intelligence, extraversion, agreeableness, and conscientiousness, and also to job performance. Not only was secure/autonomous attachment orientation at work statistically predictive of job performance, but the new measure also made a distinct contribution, beyond conscientiousness, to this prediction.
Longitudinal Relation Between General Well-Being and Self-Esteem.
Barendregt, Charlotte S; van der Laan, André M; Bongers, Ilja L; van Nieuwenhuizen, Chijs
2016-12-01
This study investigated the longitudinal relation between general well-being and self-esteem of male adolescents with severe psychiatric disorders. Moreover, the transition out of secure residential care was studied. Adolescents ( N = 172) were assessed three times with 6 months between each assessment. The sample comprised adolescents who were admitted throughout the entire study ( n = 116) and who had been discharged at 6/12 months follow-up ( n = 56). General well-being and self-esteem were stable concepts over time. The relation between general well-being and self-esteem differed for both groups. Among the admitted group general well-being positively predicted self-esteem and self-esteem negatively predicted general well-being from Time 2 to Time 3. Among the discharged adolescents, self-esteem at Time 1 positively predicted general well-being at Time 2 and general well-being at Time 2 positively predicted self-esteem at Time 3. Changing social contexts, as well as problems experienced during the transition out of secure care, might affect this relationship.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-28
... rule change relating to FINRA's Trading Activity Fee (``TAF'') rate for transactions in covered equity... the FINRA By-Laws to adjust the rate of FINRA's TAF for transactions in Covered Securities that are equity securities.\\6\\ The TAF, along with the Personnel Assessment and the Gross Income Assessment fees...
Food insecurity and diabetes self-management among food pantry clients.
Ippolito, Matthew M; Lyles, Courtney R; Prendergast, Kimberly; Marshall, Michelle Berger; Waxman, Elaine; Seligman, Hilary Kessler
2017-01-01
To examine the association between level of food security and diabetes self-management among food pantry clients, which is largely not possible using clinic-based sampling methods. Cross-sectional descriptive study. Community-based food pantries in California, Ohio and Texas, USA, from March 2012 through March 2014. Convenience sample of adults with diabetes queuing at pantries (n 1237; 83 % response). Sampled adults were stratified as food secure, low food secure or very low food secure. We used point-of-care glycated Hb (HbA1c) testing to determine glycaemic control and captured diabetes self-management using validated survey items. The sample was 70 % female, 55 % Latino/Hispanic, 25 % white and 10 % black/African American, with a mean age of 56 years. Eighty-four per cent were food insecure, one-half of whom had very low food security. Mean HbA1c was 8·1 % and did not vary significantly by food security status. In adjusted models, very-low-food-secure participants, compared with both low-food-secure and food-secure participants, had poorer diabetes self-efficacy, greater diabetes distress, greater medication non-adherence, higher prevalence of severe hypoglycaemic episodes, higher prevalence of depressive symptoms, more medication affordability challenges, and more food and medicine or health supply trade-offs. Few studies of the health impact of food security have been able to examine very low food security. In a food pantry sample with high rates of food insecurity, we found that diabetes self-management becomes increasingly difficult as food security worsens. The efficacy of interventions to improve diabetes self-management may increase if food security is simultaneously addressed.
Executive Guide: Information Security Management. Learning From Leading Organizations
1998-05-01
data. In September 1996, we reported that audit reports and agency self - assessments issued during the previous 2 years showed that weak information...company has developed an efficient and disciplined process for ensuring that information security-related risks to business operations are considered and...protection group at the utility was required to approve all new applications to indicate that risks had been adequately considered. Providing self
Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine
2018-01-01
Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961–2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements. PMID:29489830
Macdiarmid, Jennie I; Clark, Heather; Whybrow, Stephen; de Ruiter, Henri; McNeill, Geraldine
2018-01-01
Nutrition security describes the adequacy of the food supply to meet not only energy but also macronutrient and micronutrient requirements for the population. The aim of this study was to develop a method to assess trends in national nutrition security and the contribution of imports to nutrition security, using the UK as a case study. Food supply data from FAO food balance sheets and national food composition tables were used to estimate the nutrient content of domestically produced food, imported food and exported food. Nutrition security was defined as the total nutrient supply (domestic production, minus exports, plus imports) to meet population-level nutrient requirements. The results showed that the UK was nutrition secure over the period 1961-2011 for energy, macronutrients and key micronutrients, with the exception of total carbohydrates and fibre, which may be due to the loss of fibre incurred by processing cereals into refined products. The supply of protein exceeded population requirements and could be met with domestic production alone. Even excluding all meat there was sufficient protein for population requirements. The supply of total fat, saturated fat and sugar considerably exceeded the current dietary recommendation. As regards nutrition security in 2010, the UK was reliant on imported foods to meet energy, fibre, total carbohydrate, iron, zinc and vitamin A requirements. This analysis demonstrates the importance of including nutrients other than energy to determine the adequacy of the food supply. The methodology also provides an alternative perspective on food security and self-sufficiency by assessing the dependency on imports to meet population level nutritional requirements.
Kim, Min-Seok; Hong, Yun-Chul; Yook, Ji-Hoo; Kang, Mo-Yeol
2017-10-01
To investigate the effects of job security on new development of depressive episode, suicide ideation, and decline in self-rated health. Data from the Korea Welfare Panel Study from 2012 to 2015 were analysed. A total of 2912 waged workers self-assessed their depressive episode, suicide ideation, and health annually by answering the questionnaire. Participants were divided into three groups according to the level of job security: high, intermediate and low. To evaluate the influence of job security, we performed survival analysis after stratification by gender with adjustment for covariates. The result was further stratified by whether the respondent was the head of household. After adjusting for covariates, men in low job security group showed significantly higher hazard ratios (HRs) for depression (HR 1.27, 95% CI 1.01-1.60), suicide ideation (HR 3.25, 95% CI 1.72-6.16), and decline in self-rated health (HR 1.73, 95% CI 1.16-2.59). Women showed significantly higher HR of depression in the intermediate (HR 1.37, 95% CI 1.01-1.87) and low (HR 1.50, 95% CI 1.12-1.99) job security group. Male head of household with low job security showed significantly higher HR of depression, suicide ideation, and decline in self-rated health. Non-head-of-household women with intermediate and low job security showed higher risk of depression than those with high job security. We found that perceived job insecurity is associated with the new development of depressive episode, suicide ideation, and decline in self-rated health.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-09
... financings and the required disclosures of business relationships and methods of doing business, including... written disclosure to the issuer from the earliest stages of its relationship with the issuer that it is... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65263; File No. SR-MSRB-2011-09] Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Withdrawal of Proposed New Rule A... Commission (the ``Commission'') a proposed rule change pursuant to Section 19(b)(1) of the Securities... municipal advisor assessments, and (ii) new Form A-11-Interim. Notice of the proposed rule change was...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-08
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61620; File No. SR-DTC-2010-04] Self-Regulatory... Change To Modify Its Registered Transfer Agent Notification Methods for Assumption or Termination of... transfer agent notification methods for assumption or termination of services. II. Self-Regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-18
..., other than a single equity option or a security futures product, whose value is based, in whole or in... Change To Amend its Fee Schedule To Assess Fees for Derivative Securities Products January 11, 2012..., effective January 9, 2012, to create a separate fee and rebate structure for Derivative Securities Products...
Wright-Brown, Salena; Sekula, Kathleen; Gillespie, Gordon; Zoucha, Rick
A successful career as an emergency department registered nurse (RN) requires the ability to respond quickly to a wide variety of potentially life-threatening illnesses and injuries. The unpredictable nature of this work can evoke emotional and physical stress on the RN beyond that which might be experienced by nurses who work in more stable, controlled, and predictable environments. Emergency healthcare is predicated on unexpected illness or injury leading to unscheduled episodic work. Additional stress is placed on the RN by the potential for violence that occurs in emergency departments. This mixed method pilot study describes the experiences of RNs who have been injured by violence while working in an emergency department. The study included an assessment of the job satisfaction of RNs in the emergency department based on Porter's Need Satisfaction Scale. This scale addresses need fulfillment in five categories: security, social, esteem, autonomy, and self-actualization. The self-actualization subscale measures satisfaction with personal growth, worthwhile accomplishments, and self-fulfillment. During the second strand of the study, phenomenological informed interviews were held with RNs who had been injured while on duty in an emergency department. The findings indicate that the largest reported gaps between the current state and the desired state were found in the area of security and self-actualization. RNs in the emergency department who answered the survey indicated that they desired a safe, secure worksite where they could achieve personal growth, worthwhile accomplishments, and self-fulfillment; but they were not satisfied with their current status in these areas.
2015-01-01
self - esteem . • Vulnerability to flattery or the promise of a better job: Often coupled with anger/revenge or adventure/thrill. • Ingratiation: A...conduct a self -assessment or access an on-site assessment that DHS cybersecurity professionals facilitate. To learn more about the CRR or to download...procedures to handle communication errors. 5 In 2012, workgroup member, the Petroleum Safety Author- ity of Norway, released a self -assessment schema for
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226
Security threat assessment of an Internet security system using attack tree and vague sets.
Chang, Kuei-Hu
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-26
... Request; Voluntary Self- Disclosure of Antiboycott Violations AGENCY: Bureau of Industry and Security... Administration Regulations (EAR) by providing a method for industry to voluntarily self-disclose antiboycott violations. Companies wishing to voluntarily self-disclose antiboycott may submit pertinent information, as...
Lyles, Courtney R; Wolf, Michael S; Schillinger, Dean; Davis, Terry C; Dewalt, Darren; Dahlke, Allison R; Curtis, Laura; Seligman, Hilary K
2013-06-01
Food insecurity is hypothesized to make diabetes self-management more difficult. We conducted a longitudinal assessment of food insecurity with several diabetes self-care measures. We conducted a secondary, observational analysis of 665 low-income patients with diabetes, all of whom received self-management support as part of a larger diabetes educational intervention. We analyzed baseline food insecurity (measured by the U.S. Department of Agriculture Food Security module) in relation to changes in hemoglobin A1c (HbA1c) as well as self-reported diabetes self-efficacy and daily fruit and vegetable intake. We examined longitudinal differences using generalized estimating equation linear regression models, controlling for time, age, sex, race, income, and intervention arm. Overall, 57% of the sample had an income <$15,000. Participants who were food insecure (33%) were younger, had less income, and were more likely to be unemployed compared with participants who were food secure. At baseline, those who were food insecure had higher mean HbA1c values (8.4% vs. 8.0%) and lower self-efficacy and fruit and vegetable intake than those who were food secure (all P < 0.05). Compared with food-secure individuals, participants who were food insecure had significantly greater improvements in HbA1c over time (0.38% decrease compared with 0.01% decrease; P value for interaction <0.05) as well as in self-efficacy (P value for interaction <0.01). There was no significant difference in HbA1c by food security status at follow-up. Participants experiencing food insecurity had poorer diabetes-related measures at baseline but made significant improvements in HbA1c and self-efficacy. Low-income patients who were food insecure may be particularly receptive to diabetes self-management support, even if interventions are not explicitly structured to address finances or food security challenges.
Assessing Grant Allocation Methods for Federal Homeland Security Urban Area Assistance Funding
2015-12-01
ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA ASSISTANCE FUNDING by Craig Mohar December 2015 Thesis Co-Advisors: Kathleen...REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE ASSESSING GRANT ALLOCATION METHODS FOR FEDERAL HOMELAND SECURITY URBAN AREA...the Department of Homeland Security (DHS) is critical for building and sustaining preparedness in urban areas. According to the 9/11 Commission Report
NASA Astrophysics Data System (ADS)
Khe Sun, Pak; Vorona-Slivinskaya, Lubov; Voskresenskay, Elena
2017-10-01
The article highlights the necessity of a complex approach to assess economic security of municipalities, which would consider municipal management specifics. The approach allows comparing the economic security level of municipalities, but it does not describe parameter differences between compared municipalities. Therefore, there is a second method suggested: parameter rank order method. Applying these methods allowed to figure out the leaders and outsiders of the economic security among municipalities and rank all economic security parameters according to the significance level. Complex assessment of the economic security of municipalities, based on the combination of the two approaches, allowed to assess the security level more accurate. In order to assure economic security and equalize its threshold values, one should pay special attention to transportation system development in municipalities. Strategic aims of projects in the area of transportation infrastructure development in municipalities include the following issues: contribution into creating and elaborating transportation logistics and manufacture transport complexes, development of transportation infrastructure with account of internal and external functions of the region, public transport development, improvement of transport security and reducing its negative influence on the environment.
Crudden, Adele; O'Mally, Jamie; Antonelli, Karla
2016-01-01
Social problem-solving skills and transportation self-efficacy were assessed for 48 vocational rehabilitation consumers with visual disabilities who required assistance securing work transportation. Social problem solving was at the upper end of the normed average; transportation self-efficacy averaged 101.5 out of 140. Level of vision loss was not associated with score differences; urban residence related to slightly higher self-efficacy than suburban or rural residency. Participants appeared to have the skills necessary to secure employment transportation, but were less confident about transportation-seeking activities that required more initiative of social interaction. Training and information might help consumers gain confidence in these tasks and increase viable transportation options.
Nebbitt, Von E; Lombe, Margaret; Chu, Yoosun; Sinha, Aakanksha; Tirmazi, Tagi
2016-01-01
This paper assesses how and/or whether household and community factors are associated with self-reported food security among young people living in public housing (N=151). Results suggest that food security was negatively related to age, particularly to older youth. Also, household size-have many people in the household, household hardships, and household conflict were negatively related to food security. On the contrary, food security was positively related to community cohesion and the presence of the extended family within the public housing neighborhood. Findings seem to suggest that non-specialty food previsions (e.g., community cohesion and family networks) may be important in understanding food security among families living in public housing. A number of program and policy implications are presented.
Subtypes of Self-Esteem and Self-Concept in Adolescent Violent and Property Offenders
ERIC Educational Resources Information Center
Vermeiren, Robert; Bogaerts, Jef; Ruchkin, Vladislav; Deboutte, Dirk; Schwab-Stone, Mary
2004-01-01
Aim: To investigate the relationship between subtypes of self-esteem/self-concept (familial, academic, social, and personal security) and antisocial behavior in adolescents (violent and property offending). Method: A self-report survey was administered in a representative group of 1466 students aged 12 to 18. Results: Both low family acceptance…
NASA Astrophysics Data System (ADS)
Tsao, Jung-Hsuan; Tung, Ching-Pin; Liu, Tzu-Ming
2014-05-01
Climate change will increase sharp risks to the water and food supply in coming decades. Although impact assessment and adaptation evaluation has been discussed a lot in recent years, the importance of adaptation implement should not be ignored. In Taiwan, and elsewhere, fallow is an option of adaptation strategy under climate change. Fallow would improve the water scarcity of domestic use, but the food security might be threatened. The trade-off effects of adaptation actions are just like the side effects of medicine which cannot be avoided. Thus, managing water resources with an integrated approach will be urgent. This study aims to establish a cross-sectoral framework for implementation the trade-off adaptation strategy. Not only fallow, but also other trade-off strategy like increasing the percentage of national grain self-sufficiency would be analyzed by a rational decision process. The recent percentage of grain self-sufficiency in Taiwan is around 32, which was decreasing from 53 thirty years ago. Yet, the goal of increasing grain self-sufficiency means much more water must be used in agriculture. In that way, domestic users may face the water shortage situation. Considering the conflicts between water supply and food security, the concepts from integrative negotiation are appropriate to apply. The implementation of trade-off adaptation strategies needs to start by quantifying the utility of water supply and food security were be quantified. Next, each side's bottom line can be found by BATNA (Best Alternative to a Negotiated Agreement) and ZOPA (Zone of Possible Agreement). ZOPA provides the entire possible outcomes, and BATNA ensures the efficiency of adaptation actions by moving along with Pareto frontier. Therefore, the optimal percentage of fallow and grain self-sufficiency can be determined. Furthermore, BATNA also provides the pathway step by step which can be a guideline of adaptation strategies. This framework allows analysts and stakeholder to systematically evaluate trade-off adaptation strategies and indicate the priority to implement.
The Fundamentals of School Security. ERIC Digest Number 132.
ERIC Educational Resources Information Center
Gaustad, Joan
This digest presents ways that school administrators can realistically assess their schools' security needs. It opens by reporting that some types of school violence are declining, such as self-reported weapon carrying and fighting on school property, which reflects an overall decline in youth violence. However, schools still must perform…
Barendregt, Charlotte S; Van der Laan, André M; Bongers, Ilja L; Van Nieuwenhuizen, Chijs
2015-07-01
Coping, general well-being and self-esteem play an important role during the process of adaptation to turning points in life-course. This study aimed to investigate the effect of coping on both the development of general well-being and self-esteem of adolescents with severe psychiatric problems in secure residential care. In addition, risk and protective factors were taken into account. Adolescents between the age of 16 and 18 (N = 172) were followed for 1.5 years. General well-being and self-esteem were assessed with the Lancashire Quality of Life Profile and the Self-Perception Profile for Adolescents, respectively. In addition, the Utrecht Coping List for Adolescents and the Structured Assessment of Violence Risk in Youth were administered. Results showed that the longitudinal relation between general well-being and self-esteem is no longer significant after adding active and passive coping to the model. The use of active coping strategies was associated with a higher self-esteem. The use of passive coping strategies was associated with a lower self-esteem and also a lower perceived general well-being. Having multiple risks in the individual and/or social/contextual domain affected the developmental pattern of general well-being. During treatment of adolescents with severe psychiatric problems in secure residential care, attention should be paid for enhancing those capabilities and skills, like coping, which help adolescents to fulfill their needs and consequently enhance their well-being. Enhancing the well-being of adolescents might in the long run decrease the chance of reoffending and/or psychiatric relapse.
A Secure Base in Adolescence: Markers of Attachment Security in the Mother–Adolescent Relationship
Allen, Joseph P.; McElhaney, Kathleen Boykin; Land, Deborah J.; Kuperminc, Gabriel P.; Moore, Cynthia W.; O’Beirne-Kelly, Heather; Kilmer, Sarah Liebman
2017-01-01
This study sought to identify ways in which adolescent attachment security, as assessed via the Adult Attachment Interview, is manifest in qualities of the secure base provided by the mother–adolescent relationship. Assessments included data coded from mother–adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socioeconomically diverse sample of moderately at-risk 9th and 10th graders. This study found several robust markers of adolescent attachment security in the mother–adolescent relationship. Each of these markers was found to contribute unique variance to explaining adolescent security, and in combination, they accounted for as much as 40% of the raw variance in adolescent security. These findings suggest that security is closely connected to the workings of the mother–adolescent relationship via a secure-base phenomenon, in which the teen can explore independence in thought and speech from the secure base of a maternal relationship characterized by maternal attunement to the adolescent and maternal supportiveness. PMID:12625451
O'Shea, Laura E; Picchioni, Marco M; Dickens, Geoffrey L
2016-04-01
The Short-Term Assessment of Risk and Treatability (START) aims to assist mental health practitioners to estimate an individual's short-term risk for a range of adverse outcomes via structured consideration of their risk ("Vulnerabilities") and protective factors ("Strengths") in 20 areas. It has demonstrated predictive validity for aggression but this is less established for other outcomes. We collated START assessments for N = 200 adults in a secure mental health hospital and ascertained 3-month risk event incidence using the START Outcomes Scale. The specific risk estimates, which are the tool developers' suggested method of overall assessment, predicted aggression, self-harm/suicidality, and victimization, and had incremental validity over the Strength and Vulnerability scales for these outcomes. The Strength scale had incremental validity over the Vulnerability scale for aggressive outcomes; therefore, consideration of protective factors had demonstrable value in their prediction. Further evidence is required to support use of the START for the full range of outcomes it aims to predict. © The Author(s) 2015.
Sawada, Natsumi; Gagné, Faby M; Séguin, Louise; Kramer, Michael S; McNamara, Helen; Platt, Robert W; Goulet, Lise; Meaney, Michael J; Lydon, John E
2015-08-01
Infants born with medical problems are at risk for less optimal developmental outcomes. This may be, in part, because neonatal medical problems are associated with maternal distress, which may adversely impact infants. However, the reserve capacity model suggests that an individual's bank of psychosocial resources buffers the adverse effects of later-encountered stressors. This prospective longitudinal study examined whether preexisting maternal psychosocial resources, conceptualized as felt security in close relationships, moderate the association between neonatal medical problems and infant fussing and crying 12 months postpartum. Maternal felt security was measured by assessing its indicators in 5,092 pregnant women. At birth, infants were classified as healthy or having a medical problem. At 12 months, experience sampling was used to assess daily maternal reports of fussing and crying in 135 mothers of infants who were healthy or had medical problems at birth. Confirmatory factor analyses revealed that attachment, relationship quality, self-esteem, and social support can be conceptualized as indicators of a single felt security factor. Multiple regression analyses revealed that prenatal maternal felt security interacts with infant health at birth to predict fussing and crying at 12 months. Among infants born with medical problems, higher felt security predicted decreased fussing and crying. Maternal felt security assessed before birth dampens the association between neonatal medical problems and subsequent infant behavior. This supports the hypothesis that psychosocial resources in reserve can be called upon in the face of a stressor to reduce its adverse effects on the self or others. (c) 2015 APA, all rights reserved).
Web-based self-management for patients with multiple sclerosis: a practical, randomized trial.
Miller, Deborah M; Moore, Shirley M; Fox, Robert J; Atreja, Ashish; Fu, Alex Z; Lee, Jar-Chi; Saupe, Welf; Stadtler, Maria; Chakraborty, Swati; Harris, C M; Rudick, Richard A
2011-01-01
No studies have addressed the use of electronic personal health records (e-PHRs) for self-management in complex neurological disorders. We assessed and tested an Internet-based self-management system that utilized the e-PHR and determined its impact on self-assessed well-being, clinician-assessed well-being, and healthcare utilization in patients with multiple sclerosis (MS). Subjects were randomized to usual care (a secure Web-based messaging system) or active intervention, which included secure messaging, self-monitoring, self-management of MS symptoms, and communication about upcoming clinic visits. Computers and Internet access were provided. Subjects were included if they had MS, lived within the county or region surrounding our MS center, had at least two appointments at our center in the previous 12 months, and demonstrated basic typing and computer skills. Study duration was 12 months. Of 220 subjects completing informed consent, 206 met the inclusion criteria. At the study's end, 83 subjects remained in the usual care group and 84 in the enhanced care group. Both groups used the available system components. The groups did not significantly differ on the primary endpoints or healthcare utilization. Self-management support is an emerging aspect of chronic care management. We established the feasibility of conducting a randomized, controlled trial using e-PHRs for patient self-management. We did not find that e-PHR-enabled self-management augmented multidisciplinary MS center-based care, possibly because the differences between interventions were not great enough.
Xu, Jianling; Ding, Yi
2015-01-01
Analyzing the early warning of food security, this paper sets the self-sufficiency rate as the principal indicator in a standpoint of supplement. It is common to use the quantitative methods to forecast and warning the insecurity. However, this paper considers more about the probable outcome when the government intervenes. By constructing the causal feedbacks among grain supplement, demand, productive input, and the policy factors to simulate the future food security in Jiangsu province, conclusions can be drawn as the following: (1) The situation of food security is insecure if the self-sufficiency rate is under 68.3% according to the development of system inertia. (2) it is difficult to guarantee the food security in Jiangsu just depending on the increase of grain sown area. (3) The valid solution to ensure the food security in Jiangsu is to improve the productivity. © 2015 Institute of Food Technologists®
2013-01-01
Background The START and SAPROF are newly developed fourth generation structured professional judgement instruments assessing strengths and protective factors. The DUNDRUM-3 and DUNDRUM-4 also measure positive factors, programme completion and recovery in forensic settings. Methods We compared these instruments with other validated risk instruments (HCR-20, S-RAMM), a measure of psychopathology (PANSS) and global function (GAF). We prospectively tested whether any of these instruments predict violence or self harm in a secure hospital setting (n = 98) and whether they had true protective effects, interacting with and off-setting risk measures. Results SAPROF and START-strengths had strong inverse (negative) correlations with the HCR-20 and S-RAMM. SAPROF correlated strongly with GAF (r = 0.745). In the prospective in-patient study, SAPROF predicted absence of violence, AUC = 0.847 and absence of self-harm AUC = 0.766. START-strengths predicted absence of violence AUC = 0.776, but did not predict absence of self-harm AUC = 0.644. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales also predicted in-patient violence (AUC 0.832 and 0.728 respectively), and both predicted in-patient self-harm (AUC 0.750 and 0.713 respectively). When adjusted for the HCR-20 total score however, SAPROF, START-S, DUNDRUM-3 and DUNDRUM-4 scores were not significantly different for those who were violent or for those who self harmed. The SAPROF had a significant interactive effect with the HCR-dynamic score. Item to outcome studies often showed a range of strengths of association with outcomes, which may be specific to the in-patient setting and patient group studied. Conclusions The START and SAPROF, DUNDRUM-3 and DUNDRUM-4 can be used to assess both reduced and increased risk of violence and self-harm in mentally ill in-patients in a secure setting. They were not consistently better than the GAF, HCR-20, S-RAMM, or PANSS when predicting adverse events. Only the SAPROF had an interactive effect with the HCR-20 risk assessment indicating a true protective effect but as structured professional judgement instruments all have additional content (items) complementary to existing risk assessments, useful for planning treatment and risk management. PMID:23890106
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-08
... assessable professional reported or required to be reported by a municipal advisor to the MSRB on Form A-11... Assessment and Form A-11- Interim. For purposes of the interim assessment, an assessable professional of a...-Interim as an assessable professional any associated person (i) Who otherwise qualifies as an assessable...
Assessment of Brazil’s Research Literature
2007-09-28
Autonomously interconnecting with real-time monitoring • Secure, survivable, self - healing , and adaptable • Resistant to jamming • Homeland and... self - healing platforms • Force Protection • Anti-swimmer technology • Detect and determine threat intent • Non-lethal response Associated CV...Brazilian strengths in chemistry and several industrially oriented R&D domains. We apply text clustering to obtain “ self -organizing tables of
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-08
... Exchange may considering revising the fee schedule to assess transaction fees rates for non-Trading Permit... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65875; File No. SR-CBOE-2011-112] Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Notice of Filing and Immediate...
Qi, Xiaoxing; Liu, Liming; Liu, Yabin; Yao, Lan
2013-06-01
Integrated food security covers three aspects: food quantity security, food quality security, and sustainable food security. Because sustainable food security requires that food security must be compatible with sustainable development, the risk assessment of sustainable food security is becoming one of the most important issues. This paper mainly focuses on the characteristics of sustainable food security problems in the major grain-producing areas in China. We establish an index system based on land resources and eco-environmental conditions and apply a dynamic assessment method based on status assessments and trend analysis models to overcome the shortcomings of the static evaluation method. Using fuzzy mathematics, the risks are categorized into four grades: negligible risk, low risk, medium risk, and high risk. A case study was conducted in one of China's major grain-producing areas: Dongting Lake area. The results predict that the status of the sustainable food security in the Dongting Lake area is unsatisfactory for the foreseeable future. The number of districts at the medium-risk range will increase from six to ten by 2015 due to increasing population pressure, a decrease in the cultivated area, and a decrease in the effective irrigation area. Therefore, appropriate policies and measures should be put forward to improve it. The results could also provide direct support for an early warning system-which could be used to monitor food security trends or nutritional status so to inform policy makers of impending food shortages-to prevent sustainable food security risk based on some classical systematic methods. This is the first research of sustainable food security in terms of risk assessment, from the perspective of resources and the environment, at the regional scale.
Hogan, Sean R; Unick, George J.; Speiglman, Richard; Norris, Jean C.
2011-01-01
This study examines barriers to economic self-sufficiency among a panel of 219 former Supplemental Security Income (SSI) drug addiction and alcoholism (DA&A) recipients following elimination of DA&A as an eligibility category for SSI disability benefits. Study participants were comprehensively surveyed at six measurement points following the policy change. Generalized estimating equations were used to examine full-sample and gender-specific barriers to economic self-sufficiency. Results indicate that access to transportation, age, and time are the strongest predictors of achieving self-sufficiency for both men and women leaving the welfare system. Gender-specific barriers are also identified. Future research needs to assess the generalizability of these results to other public assistance recipients. PMID:21625301
Los fundamentos de la seguridad escolar (The Fundamentals of School Security). ERIC Digest.
ERIC Educational Resources Information Center
Gaustad, Joan
This digest in Spanish presents ways that school administrators can realistically assess their schools' security needs. It opens by reporting that some types of school violence are declining, such as self-reported weapon carrying and fighting on school property, which reflects an overall decline in youth violence. However, schools still must…
Assessing Security of Supply: Three Methods Used in Finland
NASA Astrophysics Data System (ADS)
Sivonen, Hannu
Public Private Partnership (PPP) has an important role in securing supply in Finland. Three methods are used in assessing the level of security of supply. First, in national expert groups, a linear mathematical model has been used. The model is based on interdependency estimates. It ranks societal functions or its more detailed components, such as items in the food supply chain, according to the effect and risk pertinent to the interdependencies. Second, the security of supply is assessed in industrial branch committees (clusters and pools) in the form of indicators. The level of security of supply is assessed against five generic factors (dimension 1) and tens of business branch specific functions (dimension 2). Third, in two thousand individual critical companies, the maturity of operational continuity management is assessed using Capability Maturity Model (CMM) in an extranet application. The pool committees and authorities obtain an anonymous summary. The assessments are used in allocating efforts for securing supply. The efforts may be new instructions, training, exercising, and in some cases, investment and regulation.
Allen, Joseph P.; Porter, Maryfrances R.; McFarland, F. Christy; Marsh, Penny; McElhaney, Kathleen Boykin
2006-01-01
This study assessed the hypothesis that popularity in adolescence takes on a twofold role, both marking high levels of concurrent psychosocial adaptation, but also predicting increases over time in both positive and negative behaviors sanctioned by peer norms. This hypothesis was tested with multi-method, longitudinal data obtained on a diverse community sample of 185 adolescents. Sociometric popularity data were examined in relation to data from interview-based assessments of attachment security and ego development, observations of mother-adolescent interactions, and repeated self- and peer-report assessments of delinquency and alcohol use. Results indicated that popular adolescents displayed higher concurrent levels of ego development, secure attachment and more adaptive interactions with mothers and best friends. Longitudinal analyses supported a “popularity-socialization” hypothesis, however, in which popular adolescents were more likely to increase in behaviors that receive approval in the peer group (e.g., minor levels of drug use and delinquency) and decrease in behaviors unlikely to be well-received by peers (e.g., hostile behavior with peers). PMID:15892790
Shafii, Milad; Rafiei, Sima; Abooee, Fatemeh; Bahrami, Mohammad Amin; Nouhi, Mojtaba; Lotfi, Farhad; Khanjankhani, Khatere
2016-08-01
Hospitals as integrated parts of the wide-ranging health care systems have dominant focus on health care provision to meet, maintain and promote people's health needs of a community. This study aimed to assess the service quality of teaching hospitals of Yazd University of Medical Sciences using Fuzzy Analytical Hierarchy Process (FAHP) and Technique for Order Preference by Similarity to Ideal Solution (TOPSIS). A literature review and a qualitative method were used to obtain experts' viewpoints about the quality dimensions of hospital services to design a questionnaire. Then, using a self-made questionnaire, perceptions of 300 patients about the quality of delivered services were gathered. Finally, FAHP was applied to weigh each quality dimension and TOPSIS method to rank hospital wards. Six dimensions including responsiveness, assurance, security, tangibles, health communication and Patient orientation were identified as affecting aspects of hospital services quality among which, security and tangibles got the highest and lowest importance respectively (0.25406, 0.06883). Findings also revealed that in hospital A, orthopedics and ophthalmology wards obtained the highest score in terms of quality while cardiology department got the lowest ranking (0.954, 0.323). In hospital B, the highest and the lowest ranking was belonged to cardiology and surgical wards (0.895, 0.00) while in hospital C, surgical units were rated higher than internal wards (0.959, 0.851). Findings emphasized that the security dimension got the lowest ranking among SERVQUAL facets in studied hospitals. This requires hospital executives to pay special attention to the issue of patients' security and plan effectively for its promotion.
Assessing parental empathy: a role for empathy in child attachment.
Stern, Jessica A; Borelli, Jessica L; Smiley, Patricia A
2015-01-01
Although empathy has been associated with helping behavior and relationship quality, little research has evaluated the role of parental empathy in the development of parent-child relationships. The current study (1) establishes preliminary validity of the Parental Affective and Cognitive Empathy Scale (PACES), a method for coding empathy from parents' narrative responses to the Parent Development Interview - Revised for School-Aged Children (PDI-R-SC), and (2) tests a theoretical model of empathy and attachment. Sixty caregivers and their children completed a battery of questionnaire and interview measures, including the PDI-R-SC and the Child Attachment Interview (CAI). Caregivers' interview narratives were scored for empathy using PACES. PACES showed good interrater reliability and good convergent validity with a self-report empathy measure. Parent empathy was positively related to child attachment security (using a continuous score for narrative coherence) and emotional openness on the CAI, as well as to child perceptions of parental warmth. Moreover, parent empathy mediated the relation between parents' self-reported attachment style and their children's attachment security. Implications for attachment theory and future directions for establishing scale validity are discussed.
2012-01-01
Background We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. Methods This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. Results There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Conclusions Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'. PMID:22794187
Van Ryzin, Mark J; Leve, Leslie D
2012-04-01
In this study, the validity of a self-report measure of children's perceived attachment security (the Kerns Security Scale) was tested using adolescents. With regards to predictive validity, the Security Scale was significantly associated with (1) observed mother-adolescent interactions during conflict and (2) parent- and teacher-rated social competence. With regards to convergent validity, the Security Scale was significantly associated with all subscales of the Adult Attachment Scale (i.e., Depend, Anxiety, and Close) as measured 3 years later. Further, these links were found even after controlling for mother-child relationship quality as assessed by the Inventory of Parent and Peer Attachment (IPPA), and chi-square difference tests indicated that the Security Scale was generally a stronger predictor as compared to the IPPA. These results suggest that the Security Scale can be used to assess perceived attachment security across both childhood and adolescence, and thus could contribute significantly to developmental research during this period. Copyright © 2011 The Foundation for Professionals in Services for Adolescents. Published by Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Florida State Legislature, Tallahassee. Office of Program Policy Analysis and Government Accountability.
The 2001 Florida Legislature passed Ch. 2001-125, Laws of Florida, Section 40, which is often referred to as the Safe Passage Act. It requires all school districts to conduct a self-assessment of their school safety and security using best practices developed by the Office of Program Policy Analysis and Government Accountability (OPPAGA). It also…
Nord, Mark
2012-05-01
To estimate the effect of the US Supplemental Nutrition Assistance Program (SNAP) on the food security (consistent access to adequate food) of recipients, net of the effect of the self-selection of more food-needy households into the programme. The food security of current SNAP recipients and recent leavers is compared in cross-sectional survey data, adjusting for economic and demographic differences using multivariate logistic regression methods. A similar analysis in 2-year longitudinal panels provides additional control for selection on unobserved variables based on food security status in the previous year. Household survey data collected for the US Department of Agriculture by the US Census Bureau. Households interviewed in the Current Population Survey Food Security Supplements from 2001 to 2009. The odds of very low food security among households that continued on SNAP through the end of a survey year were 28 % lower than among those that left SNAP prior to the 30-d period during which food security was assessed. In 2-year panels with controls for the severity of food insecurity in the previous year, the difference in odds was 45 %. The results are consistent with, or somewhat higher than, the estimates from the strongest previous research designs and suggest that the ameliorative effect of SNAP on very low food security is in the range of 20-50 %.
Attachment and Self-Esteem Issues in the Lives of Female College Students.
ERIC Educational Resources Information Center
Evans, Karlin S.
Female identity is centered on interconnectedness, and it is often based on a secure attachment with the family. This study addressed the relationship between attachment and self-esteem in African American and White female college students. The Inventory of Parent and Peer Attachment (Armsden & Greenberg, 1987) was used to assess the cognitive or…
DOE Office of Scientific and Technical Information (OSTI.GOV)
Mladineo, Stephen V.; Frazar, Sarah L.; Kurzrok, Andrew J.
This paper will explore the development of a framework for conducting an assessment of safety-security-safeguards integration within a State. The goal is to examine State regulatory structures to identify conflicts and gaps that hinder management of the three disciplines at nuclear facilities. Such an analysis could be performed by a State Regulatory Authority (SRA) to provide a self-assessment or as part of technical cooperation with either a newcomer State, or to a State with a fully developed SRA.
NASA Technical Reports Server (NTRS)
Niebur, D.; Germond, A.
1993-01-01
This report investigates the classification of power system states using an artificial neural network model, Kohonen's self-organizing feature map. The ultimate goal of this classification is to assess power system static security in real-time. Kohonen's self-organizing feature map is an unsupervised neural network which maps N-dimensional input vectors to an array of M neurons. After learning, the synaptic weight vectors exhibit a topological organization which represents the relationship between the vectors of the training set. This learning is unsupervised, which means that the number and size of the classes are not specified beforehand. In the application developed in this report, the input vectors used as the training set are generated by off-line load-flow simulations. The learning algorithm and the results of the organization are discussed.
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
Kochanska, Grazyna; Philibert, Robert A; Barry, Robin A
2009-11-01
A broad capacity for deliberate self-regulation plays a key role in emotion regulation. This longitudinal investigation from infancy to preschool age examines genotype by environment (G x E) interaction in the development of self-regulation, using molecular measures of children's genotypes and observed measures of the quality of early mother-child relationship, as reflected in attachment organization in infancy. In 89 children, we assessed the polymorphism in the serotonin transporter gene (5-HTTLPR, ss/sl vs. ll allele status), security of attachment to mothers at 15 months in the Strange Situation, and children's ability for self-regulation at 25, 38, and 52 months, using behavioral batteries of tasks that called for deliberately suppressing a dominant response and performing instead a sub-dominant response. There was a robust G x E interaction between genetic risk and the quality of early relationship. Among children who carried a short 5-HTTLPR allele (ss/sl ), those who were insecurely attached developed poor regulatory capacities, but those who were securely attached developed as good regulatory capacities as children who were homozygotic for the long allele (ll ). There was no effect of security for ll homozygotes. Those findings, consistent with diathesis-stress model, bridge research on self-regulation in typically developing children with research on non-human primates and research on psychopathology. They also indicate that a secure attachment relationship can serve as a protective factor in the presence of risk conferred by a genotype.
2010-01-01
Background Breast cancer is a major threat to Taiwanese women's health. Despite the controversy surrounding the effectiveness of breast self-examination (BSE) in reducing mortality, BSE is still advocated by some health departments. The aim of the study is to provide information about how women decide to practice BSE and their experiences through the training process. Sixty-six women aged 27-50 were recruited. Methods A descriptive study was conducted using small group and individual in-depth interviews to collect data, and using thematic analysis and constant comparison techniques for data analysis. Results It was found that a sense of self-security became an important motivator for entering BSE training. The satisfaction in obtaining a sense of self-security emerged as the central theme. Furthermore, a ladder motivation model was developed to explain the participants' motivations for entering BSE training. The patterns of motivation include opportunity taking, clarifying confusion, maintaining health, and illness monitoring, which were connected with the risk perception for breast cancer. Conclusions We recognize that the way women decide to attend BSE training is influenced by personal and social factors. Understanding the different risk assessments women rely on in making their health decisions is essential. This study will assist researchers and health professionals to gain a better understanding of alternative ways to deal with breast health, and not to be limited by the recommendations of the health authorities. PMID:20618986
Development and initial validation of a measure of attachment security in late adulthood.
Lopez, Frederick G; Ramos, Katherine; Kim, Mijin
2018-05-10
Attachment theory-guided studies of older adults have generally relied on self-report measures that were validated on young adult samples and that focus on fears of rejection by romantic partners and on experiences of chronic discomfort with romantic intimacy as the key indicators of adult attachment security. These assessment characteristics raise important questions as to whether these measures are appropriate for use with older adults. Unlike their younger adult counterparts, older adults may face distinctive life stage-related threats to their attachment security such as declining health and autonomy, spousal loss, and increased dependence on younger family members for instrumental and emotional support. In response to these concerns, we conducted two independent studies aimed at developing and validating a novel measure of attachment security in older adults-the Late Adulthood Attachment Scale (LAAS). In study one (N = 287), exploratory structural equation modeling (ESEM) methods were used to identify and support a 2-factor structure (Fearful Avoidance, Secure Engagement) underlying LAAS scores. In study two (N = 417), ESEM and regression analyses confirmed the 2-factor structure and demonstrated the ability of LAAS scores to predict participants' well-being over a 3-month interval (n = 93). Findings from both studies support the psychometric adequacy of the LAAS as an alternative measure of attachment security for use with older adult samples. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Code of Federal Regulations, 2010 CFR
2010-04-01
... AND RELATED STATUTES INSURANCE REGULATIONS Authorization of Self-Insurers § 703.309 Increase or... negotiable securities deposited by a self-insurer insufficient to fully secure the self-insurer's LHWCA obligations, the self-insurer must, upon demand by the Office, deposit additional security in accordance with...
LANL Safeguards and Security Assurance Program. Revision 6
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
1995-04-03
The Safeguards and Security (S and S) Assurance Program provides a continuous quality improvement approach to ensure effective, compliant S and S program implementation throughout the Los Alamos National Laboratory. Any issues identified through the various internal and external assessments are documented, tracked and closed using the Safeguards and Security Issue Management Program. The Laboratory utilizes an integrated S and S systems approach to protect US Department of Energy (DOE) interests from theft or diversion of special nuclear material (SNM), sabotage, espionage, loss or theft of classified/controlled matter or government property, and other hostile acts that may cause unacceptable impactsmore » on national security, health and safety of employees and the public, and the environment. This document explains the basis, scope, and conduct of the S and S process to include: self-assessments, issue management, risk assessment, and root cause analysis. It also provides a discussion of S and S topical areas, roles and responsibilities, process flow charts, minimum requirements, methodology, terms, and forms.« less
Davies, Patrick T; Martin, Meredith J; Sturge-Apple, Melissa L; Ripple, Michael T; Cicchetti, Dante
2016-10-01
Two studies tested hypotheses about the distinctive psychological consequences of children's patterns of responding to interparental conflict. In Study 1, 174 preschool children (M = 4.0 years) and their mothers participated in a cross-sectional design. In Study 2, 243 preschool children (M = 4.6 years) and their parents participated in 2 annual measurement occasions. Across both studies, multiple informants assessed children's psychological functioning. Guided by the reformulated version of emotional security theory, behavioral observations of children's coping with interparental conflict assessed their tendencies to exhibit 4 patterns based on their function in defusing threat: secure (i.e., efficiently address direct instances of threat), mobilizing (i.e., react to potential threat and social opportunities), dominant (i.e., directly defeat threat), and demobilizing (i.e., reduce salience as a target of hostility). As hypothesized, each profile predicted unique patterns of adjustment. Greater security was associated with lower levels of internalizing and externalizing symptoms and greater social competence, whereas higher dominance was associated with externalizing problems and extraversion. In contrast, mobilizing patterns of reactivity predicted more problems with self-regulation, internalizing symptoms, externalizing difficulties, but also greater extraversion. Finally, higher levels of demobilizing reactivity were linked with greater internalizing problems and lower extraversion but also better self-regulation. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Davies, Patrick T.; Martin, Meredith J.; Sturge-Apple, Melissa L.; Ripple, Michael T.; Cicchetti, Dante
2016-01-01
Two studies tested hypotheses about the distinctive psychological consequences of children’s patterns of responding to interparental conflict. In Study 1, 174 preschool children (M = 4.0 years) and their mothers participated in a cross-sectional design. In Study 2, 243 preschool children (M = 4.6 years) and their parents participated in two annual measurement occasions. Across both studies, multiple informants assessed children’s psychological functioning. Guided by the reformulated version of emotional security theory, behavioral observations of children’s coping with interparental conflict assessed their tendencies to exhibit four patterns based on their function in defusing threat: secure (i.e., efficiently address direct instances of threat), mobilizing (i.e., react to potential threat and social opportunities), dominant (i.e., directly defeat threat), and demobilizing (i.e., reduce salience as a target of hostility). As hypothesized, each profile predicted unique patterns of adjustment. Greater security was associated with lower levels of internalizing and externalizing symptoms and greater social competence, whereas higher dominance was associated with externalizing problems and extraversion. In contrast, mobilizing patterns of reactivity predicted more problems with self-regulation, internalizing symptoms, externalizing difficulties, but also greater extraversion. Finally, higher levels of demobilizing reactivity were linked with greater internalizing problems and lower extraversion but also better self-regulation. PMID:27598256
Stability and Change in Attachment Security Across Adolescence
Allen, Joseph P.; McElhaney, Kathleen Boykin; Kuperminc, Gabriel P.; Jodl, Kathleen M.
2006-01-01
This study examined both continuity and familial, intrapsychic, and environmental predictors of change in adolescent attachment security across a two-year period from mid- to late-adolescence. Assessments included the Adult Attachment Interview, observed mother-adolescent interactions, test-based data, and adolescent self-reports obtained from an ethnically and socio-economically diverse sample of moderately at-risk adolescents interviewed at ages 16 and 18. Substantial stability in security was identified. Beyond this stability, however, relative declines in attachment security were predicted by adolescents’ enmeshed, overpersonalizing behavior with their mothers, depressive symptoms, and poverty status. Results suggest that while security may trend upward for non-stressed adolescents, stressors that overwhelm the capacity for affect regulation and that are not easily assuaged by parents predict relative declines in security. over time. PMID:15566380
Miller-Graff, Laura E; Cummings, E Mark; Bergman, Kathleen N
2016-10-01
The role of emotional security in promoting positive adjustment following exposure to marital conflict has been identified in a large number of empirical investigations, yet to date, no interventions have explicitly addressed the processes that predict child adjustment after marital conflict. The current study evaluated a randomized controlled trial of a family intervention program aimed at promoting constructive marital conflict behaviors thereby increasing adolescent emotional security and adjustment. Families (n = 225) were randomized into 1 of 4 conditions: Parent-Adolescent (n = 75), Parent-Only (n = 75), Self-Study (n = 38) and No Treatment (n = 37). Multi-informant and multi-method assessments were conducted at baseline, post-treatment and 6-month follow-up. Effects of treatment on destructive and constructive conflict behaviors were evaluated using multilevel models where observations were nested within individuals over time. Process models assessing the impact of constructive and destructive conflict behaviors on emotional insecurity and adolescent adjustment were evaluated using path modeling. Results indicated that the treatment was effective in increasing constructive conflict behaviors (d = 0.89) and decreasing destructive conflict behaviors (d = -0.30). For the Parent-Only Group, post-test constructive conflict behaviors directly predicted lower levels of adolescent externalizing behaviors at 6-month follow-up. Post-test constructive conflict skills also indirectly affected adolescent internalizing behaviors through adolescent emotional security. These findings support the use of a brief psychoeducational intervention in improving post-treatment conflict and emotional security about interparental relationships.
Patel, Nitin R; Lind, Jason D; Antinori, Nicole
2015-01-01
Background Secure email messaging is part of a national transformation initiative in the United States to promote new models of care that support enhanced patient-provider communication. To date, only a limited number of large-scale studies have evaluated users’ experiences in using secure email messaging. Objective To quantitatively assess veteran patients’ experiences in using secure email messaging in a large patient sample. Methods A cross-sectional mail-delivered paper-and-pencil survey study was conducted with a sample of respondents identified as registered for the Veteran Health Administrations’ Web-based patient portal (My HealtheVet) and opted to use secure messaging. The survey collected demographic data, assessed computer and health literacy, and secure messaging use. Analyses conducted on survey data include frequencies and proportions, chi-square tests, and one-way analysis of variance. Results The majority of respondents (N=819) reported using secure messaging 6 months or longer (n=499, 60.9%). They reported secure messaging to be helpful for completing medication refills (n=546, 66.7%), managing appointments (n=343, 41.9%), looking up test results (n=350, 42.7%), and asking health-related questions (n=340, 41.5%). Notably, some respondents reported using secure messaging to address sensitive health topics (n=67, 8.2%). Survey responses indicated that younger age (P=.039) and higher levels of education (P=.025) and income (P=.003) were associated with more frequent use of secure messaging. Females were more likely to report using secure messaging more often, compared with their male counterparts (P=.098). Minorities were more likely to report using secure messaging more often, at least once a month, compared with nonminorities (P=.086). Individuals with higher levels of health literacy reported more frequent use of secure messaging (P=.007), greater satisfaction (P=.002), and indicated that secure messaging is a useful (P=.002) and easy-to-use (P≤.001) communication tool, compared with individuals with lower reported health literacy. Many respondents (n=328, 40.0%) reported that they would like to receive education and/or felt other veterans would benefit from education on how to access and use the electronic patient portal and secure messaging (n=652, 79.6%). Conclusions Survey findings validated qualitative findings found in previous research, such that veterans perceive secure email messaging as a useful tool for communicating with health care teams. To maximize sustained utilization of secure email messaging, marketing, education, skill building, and system modifications are needed. These findings can inform ongoing efforts to promote the sustained use of this electronic tool to support for patient-provider communication. PMID:26690761
NASA Technical Reports Server (NTRS)
Kocher, Joshua E; Gilliam, David P.
2005-01-01
Secure computing is a necessity in the hostile environment that the internet has become. Protection from nefarious individuals and organizations requires a solution that is more a methodology than a one time fix. One aspect of this methodology is having the knowledge of which network ports a computer has open to the world, These network ports are essentially the doorways from the internet into the computer. An assessment method which uses the nmap software to scan ports has been developed to aid System Administrators (SAs) with analysis of open ports on their system(s). Additionally, baselines for several operating systems have been developed so that SAs can compare their open ports to a baseline for a given operating system. Further, the tool is deployed on a website where SAs and Users can request a port scan of their computer. The results are then emailed to the requestor. This tool aids Users, SAs, and security professionals by providing an overall picture of what services are running, what ports are open, potential trojan programs or backdoors, and what ports can be closed.
Grant, Amy D.; Fabel, Patricia H.; Worrall, Cathy; Brittain, Kristy; Martinez, Breanne; Lu, Z. Kevin; Davis, Robert; Doran, Georgia H.; Ziegler, Bryan
2016-01-01
Objective. To identify changes in pharmacy student self-confidence, self-perceptions, and self-awareness after completing the Birkman Method assessment and training program. Methods. Survey tools were developed to evaluate students at baseline and following the co-curricular Birkman Method program. Following IRB approval, students participating in the Birkman Method program were recruited for enrollment in this survey-based study. Results. Student self-confidence was high at baseline (mean=4 out of 5) and did not significantly change after Birkman Method testing and training. Self-perceptions regarding usual and stressed communication style and behaviors and behavioral needs under stress changed significantly after Birkman Method testing and training for these endpoints. The Birkman Method intervention resulted in a significant improvement in self-awareness, as indicated by a mean self-perception accuracy score increase of 1.6 points (95% CI: 1.3-1.9). Conclusions. A Birkman Method assessment and training program is an effective self-assessment tool for students, and may be useful for accomplishing Accreditation Council for Pharmacy Education (ACPE) 2016 Standard 4 affective domain elements, particularly self-awareness. PMID:28090097
Zhang, Li; Chen, Ying; Wang, Shu-tao; Men, Ming-xin; Xu, Hao
2015-08-01
Assessment and early warning of land ecological security (LES) in rapidly urbanizing coastal area is an important issue to ensure sustainable land use and effective maintenance of land ecological security. In this study, an index system for the land ecological security of Caofeidian new district was established based on the Pressure-State-Response (P-S-R) model. Initial assessment units of 1 km x 1 km created with the remote sensing data and GIS methods were spatially interpolated to a fine pixel size of 30 m x 30 m, which were combined with the early warning method (using classification tree method) to evaluate the land ecological security of Caofeidian in 2005 and 2013. The early warning level was classed into four categories: security with degradation potential, sub-security with slow degradation, sub-security with rapid degradation, and insecurity. Result indicated that, from 2005 to 2013, the average LES of Caofeidian dropped from 0.55 to 0.52, indicating a degradation of land ecological security from medium security level to medium-low security level. The areas at the levels of insecurity with rapid degradation were mainly located in the rapid urbanization areas, illustrating that rapid expansion of urban construction land was the key factor to the deterioration of the regional land ecological security. Industrial District, Shilihai town and Nanpu saltern, in which the lands at the levels of insecurity and sub-security with rapid degradation or slow degradation accounted for 58.3%, 98.9% and 81.2% of their respective districts, were at the stage of high early warning. Thus, land ecological security regulation for these districts should be strengthened in near future. The study could provide a reference for land use planning and ecological protection of Caofeidian new district.
Informal employment and health status in Central America.
López-Ruiz, María; Artazcoz, Lucía; Martínez, José Miguel; Rojas, Marianela; Benavides, Fernando G
2015-07-24
Informal employment is assumed to be an important but seldom studied social determinant of health, affecting a large number of workers around the world. Although informal employment arrangements constitute a permanent, structural pillar of many labor markets in low- and middle-income countries, studies about its relationship with health status are still scarce. In Central America more than 60% of non-agricultural workers have informal employment. Therefore, we aimed to assess differences in self-perceived and mental health status of Central Americans with different patterns of informal and formal employment. Employment profiles were created by combining employment relations (employees, self-employed, employers), social security coverage (yes/no) and type of contract--only for employees--(written, oral, none), in a cross-sectional study of 8,823 non-agricultural workers based on the I Central American Survey of Working Conditions and Health of 2011. Using logistic regression models, adjusted odds ratios (aOR) by country, age and occupation, of poor self-perceived and mental health were calculated by sex. Different models were first fitted separately for the three dimensions of employment conditions, then for employment profiles as independent variables. Poor self-perceived health was reported by 34% of women and 27% of men, and 30% of women and 26% of men reported poor mental health. Lack of social security coverage was associated with poor self-perceived health (women, aOR: 1.38, 95% CI: 1.13-1.67; men, aOR: 1.36, 95% CI: 1.13-1.63). Almost all employment profiles with no social security coverage were significantly associated with poor self-perceived and poor mental health in both sexes. Our results show that informal employment is a significant factor in social health inequalities among Central American workers, which could be diminished by policies aimed at increasing social security coverage.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA.
Alheeti, Khattab M Ali; Al-Ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms.
Malka, Ariel; Soto, Christopher J; Inzlicht, Michael; Lelkes, Yphtach
2014-06-01
We examine whether individual differences in needs for security and certainty predict conservative (vs. liberal) position on both cultural and economic political issues and whether these effects are conditional on nation-level characteristics and individual-level political engagement. Analyses with cross-national data from 51 nations reveal that valuing conformity, security, and tradition over self-direction and stimulation (a) predicts ideological self-placement on the political right, but only among people high in political engagement and within relatively developed nations, ideologically constrained nations, and non-Eastern European nations, (b) reliably predicts right-wing cultural attitudes and does so more strongly within developed and ideologically constrained nations, and (c) on average predicts left-wing economic attitudes but does so more weakly among people high in political engagement, within ideologically constrained nations, and within non-Eastern European nations. These findings challenge the prevailing view that needs for security and certainty organically yield a broad right-wing ideology and that exposure to political discourse better equips people to select the broad ideology that is most need satisfying. Rather, these findings suggest that needs for security and certainty generally yield culturally conservative but economically left-wing preferences and that exposure to political discourse generally weakens the latter relation. We consider implications for the interactive influence of personality characteristics and social context on political attitudes and discuss the importance of assessing multiple attitude domains, assessing political engagement, and considering national characteristics when studying the psychological origins of political attitudes.
Seger, Wolfgang; Nüchtern, Elisabeth
2015-07-01
Medical experts who practice social medicine have a strong ethical approach for their professional positions. Their reports must reflect an objective, independent, high-quality assessment of interactions between health status and the disability of individuals. However, they must simultaneously consider the societal involvement of these individuals when determining the framework of the Statutory Health Insurance and Social Security Systems. Their task is to recommend sociomedical benefits that are tailored to suit personal needs and that respect the individual life situations of the persons involved, thus complementing the efforts of healthcare professionals in clinical settings. The editorial describes the self-conception of this medical specialty on behalf of the German Society of Social Medicine and Prevention (DGSMP). Policy makers in social insurances and social security systems generally must respect independent sociomedical recommendations as a crucial point for further realistic development activities.
"New Sport" in the street: self-defence, security and space in belle epoque Paris.
Freundschuh, Aaron
2006-01-01
Near the turn of the twentieth century, traditional self-defence methods (for example, jiu-jitsu) were revamped into a more accessible and practical set of techniques and tactics for everyday use in urban public space. Framed as a "new sport" with broad public utility, early urban self-defence developed against the backdrop of heightening fears of violent crime and a burgeoning politics of security, as well as tensions provoked by the increasingly common appearance of unchaperoned, middle-class women in public. Self-defence masters pitched their innovations in an inclusive rhetoric, always with separate lessons for men and women and their respective spaces of risk. This article places modern self-defence practices in tension with historical transformations in the urban landscape, arguing that urban self-defence posited a certain subjective relation to the city that tapped simultaneously into the desire for empowerment, fantasies of criminal danger and a law-and-order tone that shaded into urban vigilantism.
Code of Federal Regulations, 2010 CFR
2010-04-01
... AND RELATED STATUTES INSURANCE REGULATIONS Authorization of Self-Insurers § 703.306 Kinds of negotiable securities that may be deposited; conditions of deposit; acceptance of deposits. A self-insurer or a self-insurer applicant electing to deposit negotiable securities to secure its obligations under...
The informatics capability maturity of integrated primary care centres in Australia.
Liaw, Siaw-Teng; Kearns, Rachael; Taggart, Jane; Frank, Oliver; Lane, Riki; Tam, Michael; Dennis, Sarah; Walker, Christine; Russell, Grant; Harris, Mark
2017-09-01
Integrated primary care requires systems and service integration along with financial incentives to promote downward substitution to a single entry point to care. Integrated Primary Care Centres (IPCCs) aim to improve integration by co-location of health services. The Informatics Capability Maturity (ICM) describes how well health organisations collect, manage and share information; manage eHealth technology, implementation, change, data quality and governance; and use "intelligence" to improve care. Describe associations of ICM with systems and service integration in IPCCs. Mixed methods evaluation of IPCCs in metropolitan and rural Australia: an enhanced general practice, four GP Super Clinics, a "HealthOne" (private-public partnership) and a Community Health Centre. Data collection methods included self-assessed ICM, document review, interviews, observations in practice and assessment of electronic health record data. Data was analysed and compared across IPCCs. The IPCCs demonstrated a range of funding models, ownership, leadership, organisation and ICM. Digital tools were used with varying effectiveness to collect, use and share data. Connectivity was problematic, requiring "work-arounds" to communicate and share information. The lack of technical, data and software interoperability standards, clinical coding and secure messaging were barriers to data collection, integration and sharing. Strong leadership and governance was important for successful implementation of robust and secure eHealth systems. Patient engagement with eHealth tools was suboptimal. ICM is positively associated with integration of data, systems and care. Improved ICM requires a health workforce with eHealth competencies; technical, semantic and software standards; adequate privacy and security; and good governance and leadership. Copyright © 2017 Elsevier B.V. All rights reserved.
Novel technology for enhanced security and trust in communication networks
NASA Astrophysics Data System (ADS)
Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit; Jannson, Tomasz
2011-06-01
A novel technology that significantly enhances security and trust in wireless and wired communication networks has been developed. It is based on integration of a novel encryption mechanism and novel data packet structure with enhanced security tools. This novel data packet structure results in an unprecedented level of security and trust, while at the same time reducing power consumption and computing/communication overhead in networks. As a result, networks are provided with protection against intrusion, exploitation, and cyber attacks and posses self-building, self-awareness, self-configuring, self-healing, and self-protecting intelligence.
Questionnaire about psychology/disease correlation–I
Ojog, DG; Pănescu, OM; Rusu, EC; Tănăsescu, MD
2011-01-01
Rationale: The existing personality inventories are exploring too general psychological features so that the possible psychology/disease associations might be leveled out. Objective: We attempt to build a tool to explore the possible correlation between certain psychological features and the most common internal disorders. Method: We have used two questionnaires containing many pairs of synonymous items (necessary for assessing the consistency of the answers). The items are divided into four main domains: preoccupation for the basal conditions of existence (health/ disease/ death, fear, money, lodging); interaction with other people; action, will/ volition, self-assertion; and preoccupation with the exterior. In this first article we are presenting the correlations between items of the first domain, based on the answers from our first 3138 respondents. Results and discussion: The concern about health is best reflected by general formulations. The desire for security is best expressed by items combining the worry about money and dwelling, and worst by items reflecting the eagerness to gain, keep or judiciously spend money. Among the various fears, those of future, darkness, and loneliness are better indicators of security concern. In assessing the anxiety about safety/ security, specific worries are more revelatory than the general ones. Precaution and inclination for order are the best indicators for the aspiration to stability. Poorer ones are the desire for cleanliness and the tendency to attachment. Health and security concerns seem to be consistently linked. The consistency evaluating system will be based upon pairs of synonymous items correlated with a10–200 or less error probability Abbreviations: PP = psychological profile; PF = personality feature; Q1/ Q2/ Q3 = first/ second/ third questionnaire; HeSD = health subdomain; SeSD = security subdomain; StSD = stability subdomain; ChiSq = chi square; ErrProb = error probability (probability of error). PMID:21505574
17 CFR 200.610 - Self-evaluation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... handicaps or organizations representing individuals with handicaps, to participate in the self-evaluation... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Self-evaluation. 200.610 Section 200.610 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION...
Secure Embedded System Design Methodologies for Military Cryptographic Systems
2016-03-31
Fault- Tree Analysis (FTA); Built-In Self-Test (BIST) Introduction Secure access-control systems restrict operations to authorized users via methods...failures in the individual software/processor elements, the question of exactly how unlikely is difficult to answer. Fault- Tree Analysis (FTA) has a...Collins of Sandia National Laboratories for years of sharing his extensive knowledge of Fail-Safe Design Assurance and Fault- Tree Analysis
Collimator with attachment mechanism and system
Kross, Brian J [Yorktown, VA; McKisson, John [Hampton, VA; Stolin, Aleksandr [Morgantown, WV; Weisenberger, Andrew G [Yorktown, VA; Zorn, Carl [Yorktown, VA
2012-07-10
A self-aligning collimator for a radiation imaging device that is secured and aligned through the use of a plurality of small magnets. The collimator allows for the rapid exchange, removal, or addition of collimators for the radiation imaging device without the need for tools. The accompanying method discloses the use of magnets and accompanying magnetic fields to align and secure collimators in a radiation imaging assembly.
Code of Federal Regulations, 2010 CFR
2010-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
Code of Federal Regulations, 2014 CFR
2014-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
Code of Federal Regulations, 2013 CFR
2013-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
Code of Federal Regulations, 2012 CFR
2012-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
Code of Federal Regulations, 2011 CFR
2011-04-01
... and trading of new derivative securities products by self-regulatory organizations that are not deemed... Forms for Self-Regulatory Organization Rule Changes and Forms for Registration of and Reporting by... listing and trading of new derivative securities products by self-regulatory organizations that are not...
Field test comparison of two dermal tolerance assessment methods of hand hygiene products.
Girard, R; Carré, E; Pires-Cronenberger, S; Bertin-Mandy, M; Favier-Bulit, M C; Coyault, C; Coudrais, S; Billard, M; Regard, A; Kerhoas, A; Valdeyron, M L; Cracco, B; Misslin, P
2008-06-01
This study aimed to compare the sensitivity and workload requirement of two dermal tolerance assessment methods of hand hygiene products, in order to select a suitable pilot testing method for field tests. An observer-rating method and a self-assessment method were compared in 12 voluntary hospital departments (autumn/winter of 2005-2006). Three test-periods of three weeks were separated by two-week intervals during which the routine products were reintroduced. The observer rating method scored dryness and irritation on four-point scales. In the self-assessment method, the user rated appearance, intactness, moisture content, and sensation on a visual analogue scale which was converted into a 10-point numerical scale. Eleven products (soaps) were tested (223/250 complete reports for observer rating, 131/251 for self-assessment). Two products were significantly less well tolerated than the routine product according to the observers, four products according to the self-assessments. There was no significant difference between the two methods when products were classified according to tolerance (Fisher's test: P=0.491). For the symptom common to both assessment methods (dryness), there is a good correlation between the two methods (Spearman's Rho: P=0.032). The workload was higher for observer rating method (288 h of observer time plus 122 h of prevention team and pharmacist time compared with 15 h of prevention team and pharmacist time for self-assessment). In conclusion, the self-assessment method was considered more suitable for pilot testing, although further time should be allocated for educational measures as the return rate of complete self-assessment forms was poor.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70263; File No. SR-NSCC-2013-09] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change.... On July 2, 2013, the National Securities Clearing Corporation filed with the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70544; File No. SR-NSCC-2013-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change... September 16, 2013, National Securities Clearing Corporation (``NSCC'') filed with the Securities and...
Assessment of global water security: moving beyond water scarcity assessment
NASA Astrophysics Data System (ADS)
Wada, Y.; Gain, A. K.; Giupponi, C.
2015-12-01
Water plays an important role in underpinning equitable, stable and productive societies, and the ecosystems on which we depend. Many international river basins are likely to experience 'low water security' over the coming decades. Hence, ensuring water security along with energy and food securities has been recognised as priority goals in Sustainable Development Goals (SDGs) by the United Nations. This water security is not rooted only in the limitation of physical resources, i.e. the shortage in the availability of freshwater relative to water demand, but also on social and economic factors (e.g. flawed water planning and management approaches, institutional incapability to provide water services, unsustainable economic policies). Until recently, advanced tools and methods are available for assessment of global water scarcity. However, integrating both physical and socio-economic indicators assessment of water security at global level is not available yet. In this study, we present the first global understanding of water security using a spatial multi-criteria analysis framework that goes beyond available water scarcity assessment. For assessing water security at global scale, the term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The Water security index is calculated by aggregating the indicators using both simple additive weighting (SAW) and ordered weighted average (OWA).
Dickens, G L; O'Shea, L E
2015-08-01
The Short-Term Assessment of Risk and Treatability (START) is a tool used in some mental health services to assess patients to see if they are at risk of violence, self-harm, self-neglect or victimization. The recommended time between assessments is 3 months but there is currently no evidence to show that this is best practice. We have investigated whether assessing at 1- or 2-month intervals would be more accurate and therefore facilitate more individualized risk management interventions. We found that many patients who were rated as low risk had been involved in risk behaviours before 3 months had passed; some patients who were rated at increased risk did not get involved in risk behaviours at all. Results are mixed for different outcomes but on balance, we think that the recommendation to conduct START assessment every 3 months is supported by the evidence. However, reassessment should be considered if risk behaviours are not prevented and teams should always consider whether risk management practices are too restrictive. The Short-Term Assessment of Risk and Treatability (START) guides assessment of potential adverse outcomes. Assessment is recommended every 3 months but there is no evidence for this interval. We aimed to inform whether earlier reassessment was warranted. We collated START assessments for N = 217 adults in a secure mental health hospital, and subsequent aggressive, self-harm, self-neglect and victimization incidents. We used receiver operating characteristic analysis to assess predictive validity; survival function analysis to examine differences between low-, medium-, and high-risk groups; and hazard function analysis to determine the optimum interval for reassessment. The START predicted aggression and self-harm at 1, 2 and 3 months. At-risk individuals engaged in adverse outcomes earlier than low-risk patients. About half warranted reassessment before 3 months due to engagement in risk behaviour before that point despite a low-risk rating, or because of non-engagement by that point despite an elevated risk rating. Risk assessment should occur at appropriate intervals so that management strategies can be individually tailored. Assessment at 3-month intervals is supported by the evidence. START assessments should be revisited earlier if risk behaviours are not prevented; teams should constantly re-evaluate the need for restrictive practices. © 2015 John Wiley & Sons Ltd.
A hierarchical detection method in external communication for self-driving vehicles based on TDMA
Al-ani, Muzhir Shaban; McDonald-Maier, Klaus
2018-01-01
Security is considered a major challenge for self-driving and semi self-driving vehicles. These vehicles depend heavily on communications to predict and sense their external environment used in their motion. They use a type of ad hoc network termed Vehicular ad hoc networks (VANETs). Unfortunately, VANETs are potentially exposed to many attacks on network and application level. This paper, proposes a new intrusion detection system to protect the communication system of self-driving cars; utilising a combination of hierarchical models based on clusters and log parameters. This security system is designed to detect Sybil and Wormhole attacks in highway usage scenarios. It is based on clusters, utilising Time Division Multiple Access (TDMA) to overcome some of the obstacles of VANETs such as high density, high mobility and bandwidth limitations in exchanging messages. This makes the security system more efficient, accurate and capable of real time detection and quick in identification of malicious behaviour in VANETs. In this scheme, each vehicle log calculates and stores different parameter values after receiving the cooperative awareness messages from nearby vehicles. The vehicles exchange their log data and determine the difference between the parameters, which is utilised to detect Sybil attacks and Wormhole attacks. In order to realize efficient and effective intrusion detection system, we use the well-known network simulator (ns-2) to verify the performance of the security system. Simulation results indicate that the security system can achieve high detection rates and effectively detect anomalies with low rate of false alarms. PMID:29315302
Davoren, Mary; Byrne, Orla; O'Connell, Paul; O'Neill, Helen; O'Reilly, Ken; Kennedy, Harry G
2015-11-23
Patients admitted to a secure forensic hospital are at risk of a long hospital stay. Forensic hospital beds are a scarce and expensive resource and ability to identify the factors predicting length of stay at time of admission would be beneficial. The DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale are designed to assess need for therapeutic security and urgency of that need while the HCR-20 predicts risk of violence. We hypothesized that items on the DUNDRUM-1 and DUNDRUM-2 scales, rated at the time of pre-admission assessment, would predict length of stay in a medium secure forensic hospital setting. This is a prospective study. All admissions to a medium secure forensic hospital setting were collated over a 54 month period (n = 279) and followed up for a total of 66 months. Each patient was rated using the DUNDRUM-1 triage security scale and DUNDRUM-2 triage urgency scale as part of a pre-admission assessment (n = 279) and HCR-20 within 2 weeks of admission (n = 187). Episodes of harm to self, harm to others and episodes of seclusion whilst an in-patient were collated. Date of discharge was noted for each individual. Diagnosis at the time of pre-admission assessment (adjustment disorder v other diagnosis), predicted legal status (sentenced v mental health order) and items on the DUNDRUM-1 triage security scale and the DUNDRUM-2 triage urgency scale, also rated at the time of pre-admission assessment, predicted length of stay in the forensic hospital setting. Need for seclusion following admission also predicted length of stay. These findings may form the basis for a structured professional judgment instrument, rated prior to or at time of admission, to assist in estimating length of stay for forensic patients. Such a tool would be useful to clinicians, service planners and commissioners given the high cost of secure psychiatric care.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
... SECURITIES AND EXCHANGE COMMISSION (Release No. 34-64487; File No. SR-NSCC-2011-02) Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Order Granting... Eligible Clearing Fund Securities May 13, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act...
Self-efficacy is associated with increased food security in novel food pantry program.
Martin, Katie S; Colantonio, Angela G; Picho, Katherine; Boyle, Katie E
2016-12-01
We examined the effect of a novel food pantry intervention (Freshplace) that includes client-choice and motivational interviewing on self-efficacy and food security in food pantry clients. The study was designed as a randomized control trial. Participants were recruited over one year from traditional food pantries in Hartford, CT. Participants were randomized to Freshplace or traditional food pantries (controls) and data collection occurred at baseline with quarterly follow-ups for 18 months. Food security was measured using the USDA 18-item Food Security Module. A newly developed scale was utilized to measure self-efficacy. Scale reliability was measured using a Cronbach alpha test; validity was measured via correlating with a related variable. Analyses included chi-square tests for bivariate analyses and hierarchical linear modeling for longitudinal analyses. A total of 227 adults were randomized to the Freshplace intervention ( n =112) or control group ( n =115). The overall group was 60% female, 73% Black, mean age=51. The new self-efficacy scale showed good reliability and validity. Self-efficacy was significantly inversely associated with very low food security ( p <.05). Being in the Freshplace intervention ( p =.01) and higher self-efficacy ( p =.04) were independently associated with decreased very low food security. The traditional food pantry model fails to recognize the influence of self-efficacy on a person's food security. A food pantry model with client-choice, motivational interviewing and targeted referral services can increase self-efficacy of clients. Prioritizing the self-efficacy of clients over the efficiency of pantry operations is required to increase food security among disadvantaged populations.
Lockhart, Ginger; Phillips, Samantha; Bolland, Anneliese; Delgado, Melissa; Tietjen, Juliet; Bolland, John
2017-01-01
This study examined prospective mediating relations among mother-adolescent attachment security, self-worth, and risk behaviors, including substance use and violence, across ages 13–17 in a sample of 901 low-income African American adolescents. Path analyses revealed that self-worth was a significant mediator between attachment security and risk behaviors, such that earlier attachment security predicted self-worth 1 year later, which in turn, predicted substance use, weapon carrying, and fighting in the 3rd year. Implications for the role of the secure base concept within the context of urban poverty are discussed. PMID:28174548
Sellers, Brian G; Viljoen, Jodi L.; Cruise, Keith R.; Nicholls, Tonia L.; Dvoskin, Joel A.
2012-01-01
The Short-Term Assessment of Risk and Treatability: Adolescent Version (START:AV) is a new structured professional judgment guide for assessing short-term risks in adolescents. The scheme may be distinguished from other youth risk assessment and treatment planning instruments by its inclusion of 23 dynamic factors that are each rated for both vulnerability and strength. In addition, START:AV is also unique in that it focuses on multiple adverse outcomes—namely, violence, self-harm, suicide, unauthorized leave, substance abuse, self-neglect, victimization, and general offending—over the short-term (i.e., weeks to months) rather than long-term (i.e., years). This paper describes a pilot implementation and preliminary evaluation of START:AV in three secure juvenile correctional facilities in the southern United States. Specifically, we examined the descriptive characteristics and psychometric properties of START:AV assessments completed by 21 case managers on 291 adolescent offenders (250 boys and 41 girls) at the time of admission. Results provide preliminary support for the feasibility of completing START:AV assessments as part of routine practice. Findings also highlight differences in the characteristics of START:AV assessments for boys and girls and differential associations between the eight START:AV risk domains. Though results are promising, further research is needed to establish the reliability and validity of START:AV assessments completed in the field. PMID:23316116
McElwain, Nancy L; Holland, Ashley S; Engle, Jennifer M; Wong, Maria S
2012-02-01
Child-mother attachment security, assessed via a modified Strange Situation procedure (Cassidy & Marvin, with the MacArthur Attachment Working Group, 1992), and parent-reported child proneness to anger were examined as correlates of observed child behavior toward mothers during a series of interactive tasks (N = 120, 60 girls). Controlling for maternal sensitivity and child gender and expressive language ability, greater attachment security, and lower levels of anger proneness were related to more child responsiveness to maternal requests and suggestions during play and snack sessions. As hypothesized, anger proneness also moderated several security-behavior associations. Greater attachment security was related to (a) more committed compliance during clean-up and snack-delay tasks for children high on anger proneness, (b) more self-assertiveness during play and snack for children moderate or high on anger proneness, and (c) more help-seeking during play and snack for children moderate or low on anger proneness. Findings further our understanding of the behavioral correlates of child-mother attachment security assessed during late toddlerhood via the Cassidy-Marvin system and underscore child anger proneness as a moderator of attachment-related differences in child behavior during this developmental period.
Safe teleradiology: information assurance as project planning methodology
NASA Astrophysics Data System (ADS)
Collmann, Jeff R.; Alaoui, Adil; Nguyen, Dan; Lindisch, David
2003-05-01
This project demonstrates use of OCTAVE, an information security risk assessment method, as an approach to the safe design and planning of a teleradiology system. By adopting this approach to project planning, we intended to provide evidence that including information security as an intrinsic component of project planning improves information assurance and that using information assurance as a planning tool produces and improves the general system management plan. Several considerations justify this approach to planning a safe teleradiology system. First, because OCTAVE was designed as a method for retrospectively assessing and proposing enhancements for the security of existing information management systems, it should function well as a guide to prospectively designing and deploying a secure information system such as teleradiology. Second, because OCTAVE provides assessment and planning tools for use primarily by interdisciplinary teams from user organizations, not consultants, it should enhance the ability of such teams at the local level to plan safe information systems. Third, from the perspective of sociological theory, OCTAVE explicitly attempts to enhance organizational conditions identified as necessary to safely manage complex technologies. Approaching information system design from the perspective of information security risk management proactively integrates health information assurance into a project"s core. This contrasts with typical approaches that perceive "security" as a secondary attribute to be "added" after designing the system and with approaches that identify information assurance only with security devices and user training. The perspective of health information assurance embraces so many dimensions of a computerized health information system"s design that one may successfully deploy a method for retrospectively assessing information security risk as a prospective planning tool. From a sociological perspective, this approach enhances the general conditions as well as establishes specific policies and procedures for reliable performance of health information assurance.
IT security evaluation - “hybrid” approach and risk of its implementation
NASA Astrophysics Data System (ADS)
Livshitz, I. I.; Neklyudov, A. V.; Lontsikh, P. A.
2018-05-01
It is relevant to evolve processes of evaluation of the IT security nowadays. Creating and application of the common evaluation approaches for an IT component, which are processed by the governmental and civil organizations, are still not solving problem. It is suggested to create a more precise and complex assessment tool for an IT security – the “hybrid” method of the IT security evaluation for a particular object, which is based on a range of adequate assessment tools.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... finding or (ii) as to which the self-regulatory organization consents, the Commission will: (A) By order... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71156; File No. SR-NSCC-2013-13] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-02
... the event any self-regulatory organization is no longer in existence or has ceased to do business in... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66461; File No. 600-7] Self-Regulatory Organizations; Midwest Securities Trust Company; Order Cancelling Clearing Agency Registration February 24, 2012...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-02
...(a)(3) of the Act \\14\\ provides that in the event any self-regulatory organization is no longer in... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66460; File No. 600-10] Self-Regulatory Organizations; Pacific Securities Depository Trust Company; Order Cancelling Clearing Agency Registration...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-18
... approve a proposed rule change of a self-regulatory organization if it finds that such proposed rule... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70848; File No. SR-NSCC-2013-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To...
Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.
Nellore, Vishwa; Xi, Sam; Dwyer, Chris
2015-12-22
Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.
ERIC Educational Resources Information Center
Duperouzel, Helen; Fish, Rebecca
2010-01-01
Background: This paper details the experiences of nine people with mild/moderate intellectual disability who self injure; looking beyond the clinical presentations in an attempt to capture the perceptions these people have of their care in a medium secure unit. Methods: A phenomenological approach was used, and during in-depth interviews, the…
NASA Astrophysics Data System (ADS)
Bermeo, A.; Couturier, S.
2017-01-01
Because of its renewed importance in international agendas, food security in sub-tropical countries has been the object of studies at different scales, although the spatial components of food security are still largely undocumented. Among other aspects, food security can be assessed using a food selfsufficiency index. We propose a spatial representation of this assessment in the densely populated rural area of the Huasteca Poblana, Mexico, where there is a known tendency towards the loss of selfsufficiency of basic grains. The main agricultural systems in this area are the traditional milpa (a multicrop practice with maize as the main basic crop) system, coffee plantations and grazing land for bovine livestock. We estimate a potential additional milpa - based maize production by smallholders identifying the presence of extensive coffee and pasture systems in the production data of the agricultural census. The surface of extensive coffee plantations and pasture land were estimated using the detailed coffee agricultural census data, and a decision tree combining unsupervised and supervised spectral classification techniques of medium scale (Landsat) satellite imagery. We find that 30% of the territory would benefit more than 50% increment in food security and 13% could theoretically become maize self-sufficient from the conversion of extensive systems to the traditional multicrop milpa system.
Imagining and Imaging Borders: Understanding Borderlands for Global Sustainability
NASA Astrophysics Data System (ADS)
Konrad, V.
2013-11-01
Borders are increasingly complex human responses and social constructions in a world where globalizing forces confront basic human concerns for security and certainty. In an effort to provide a background to assess research directions for imaging borders, this paper explores what we know about borders, and what we do not know well about borders. Borders in globalization are the meeting points of globalizing forces of security, trade and migration flows with emerging technologies, self determination and regionalization around the world. We need to know more about how: self determination fuels secessions and new borders; borders result from complex rather than simple policy and governance issues; borders depend on the political clout of borderland communities; market and migration flows impact borders; and borders are always in motion. The paper shows how these organizing principles underlie the basic themes of border governance, flows, culture, history, security and sustainability. Finally, the paper offers two brief illustrations of border imaging to link this presentation to the following discussion of the workshop.
[Assessment on ecological security spatial differences of west areas of Liaohe River based on GIS].
Wang, Geng; Wu, Wei
2005-09-01
Ecological security assessment and early warning research have spatiality; non-linearity; randomicity, it is needed to deal with much spatial information. Spatial analysis and data management are advantages of GIS, it can define distribution trend and spatial relations of environmental factors, and show ecological security pattern graphically. The paper discusses the method of ecological security spatial differences of west areas of Liaohe River based on GIS and ecosystem non-health. First, studying on pressure-state-response (P-S-R) assessment indicators system, investigating in person and gathering information; Second, digitizing the river, applying fuzzy AHP to put weight, quantizing and calculating by fuzzy comparing; Last, establishing grid data-base; expounding spatial differences of ecological security by GIS Interpolate and Assembly.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62849; File No. SR-NSCC-2010-07] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To... September 3, 2010. I. Introduction On July 1, 2010, National Securities Clearing Corporation (``NSCC...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-09
... unsettled positions in classes of securities such as illiquid municipal or corporate bonds, whose volatility... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66731; File No. SR-NSCC-2012-02] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-08
... concerning knowledge and skills gained through emergency management related courses. DATES: Comments must be... the Emergency Management Institute to self-assess the knowledge and skills gained through emergency... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2011-0008...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-27
... Management Institute to self-assess the knowledge and skills gained through emergency management-related... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2011-0008...; Emergency Management Institute Follow-Up Evaluation Survey AGENCY: Federal Emergency Management Agency, DHS...
How Much Detail Needs to Be Elucidated in Self-Harm Research?
ERIC Educational Resources Information Center
Stanford, Sarah; Jones, Michael P.
2010-01-01
Assessing self-harm through brief multiple choice items is simple and less invasive than more detailed methods of assessment. However, there is currently little validation for brief methods of self-harm assessment. This study evaluates the extent to which adolescents' perceptions of self-harm agree with definitions in the literature, and what…
Okeke, Sunday O.
2017-01-01
Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-30
... continuing effort to attract more activity in large-sized FX options. \\3\\ See Securities Exchange Act Release... SECURITIES AND EXCHANGE COMMISSION [Release No. 3464743; File No. SR-ISE-2011-35] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-11
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64805; File No. SR-ISE-2011-30] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Complex Orders July 5, 2011. I. Introduction On May 23, 2011, the International Securities Exchange, LLC...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65548; File No. SR-ISE-2011-39] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Complex Orders October 13, 2011. I. Introduction On July 1, 2011, the International Securities Exchange...
76 FR 12353 - Combined Notice of Filings #2
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-07
... PowerSecure Inc. at Washington, NC Walmart. Filed Date: 07/02/2010. Accession Number: 20100702-5029...: Self-Certification of PowerSecure Inc. at Laurinburg, NC Walmart. Filed Date: 07/02/2010. Accession...Secure, Inc. Description: Self-Certification of PowerSecure Inc. at Wilson, NC Walmart. Filed Date: 07/02...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70937; File No. SR-NSCC-2013-11] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Add a New Service to the National Securities Clearing Corporation's Obligation Warehouse (``OW...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-08
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63417; File No. SR-NSCC-2010-17] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ notice is hereby given that...
An Example of Unsupervised Networks Kohonen's Self-Organizing Feature Map
NASA Technical Reports Server (NTRS)
Niebur, Dagmar
1995-01-01
Kohonen's self-organizing feature map belongs to a class of unsupervised artificial neural network commonly referred to as topographic maps. It serves two purposes, the quantization and dimensionality reduction of date. A short description of its history and its biological context is given. We show that the inherent classification properties of the feature map make it a suitable candidate for solving the classification task in power system areas like load forecasting, fault diagnosis and security assessment.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-28
... change from interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63758; File No. SR-ISE-2011-05] Self-Regulatory... Purchase of Equity Interests by International Securities Exchange Holdings, Inc. in Ballista Holdings LLC...
Code of Federal Regulations, 2013 CFR
2013-04-01
... self-regulatory organizations. 249.819 Section 249.819 Commodity and Securities Exchanges SECURITIES... changes, advance notices and security-based swap submissions by all self-regulatory organizations. This form shall be used by all self-regulatory organizations, as defined in Section 3(a)(26) of the...
Code of Federal Regulations, 2014 CFR
2014-04-01
... self-regulatory organizations. 249.819 Section 249.819 Commodity and Securities Exchanges SECURITIES... changes, advance notices and security-based swap submissions by all self-regulatory organizations. This form shall be used by all self-regulatory organizations, as defined in Section 3(a)(26) of the...
20 CFR 404.1083 - Dividends and interest.
Code of Federal Regulations, 2011 CFR
2011-04-01
....1083 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment Income... determining your net earnings from self-employment, unless you are a dealer in stocks and securities and...
20 CFR 404.1083 - Dividends and interest.
Code of Federal Regulations, 2013 CFR
2013-04-01
....1083 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment Income... determining your net earnings from self-employment, unless you are a dealer in stocks and securities and...
20 CFR 404.1083 - Dividends and interest.
Code of Federal Regulations, 2014 CFR
2014-04-01
....1083 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment Income... determining your net earnings from self-employment, unless you are a dealer in stocks and securities and...
20 CFR 404.1083 - Dividends and interest.
Code of Federal Regulations, 2010 CFR
2010-04-01
....1083 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment Income... determining your net earnings from self-employment, unless you are a dealer in stocks and securities and...
20 CFR 404.1083 - Dividends and interest.
Code of Federal Regulations, 2012 CFR
2012-04-01
....1083 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Employment, Wages, Self-Employment, and Self-Employment Income Self-Employment Income... determining your net earnings from self-employment, unless you are a dealer in stocks and securities and...
van Gemert-Pijnen, Julia; Boer, Henk; Steehouder, Michaël F; Seydel, Erwin R
2008-01-01
Background Prior studies have shown that many patients are interested in Internet-based technology that enables them to control their own care. As a result, innovative eHealth services are evolving rapidly, including self-assessment tools and secure patient-caregiver email communication. It is interesting to explore how these technologies can be used for supporting self-care. Objective The aim of this study was to determine user-centered criteria for successful application of Internet-based technology used in primary care for supporting self-care. Methods We conducted scenario-based tests combined with in-depth interviews among 14 caregivers and 14 patients/consumers to describe the use of various self-care applications and the accompanying user problems. We focused on the user-friendliness of the applications, the quality of care provided by the applications, and the implementation of the applications in practice. Results Problems with the user-friendliness of the self-care applications concerned inadequate navigation structures and search options and lack of feedback features. Patients want to retrieve health information with as little effort as possible; however, the navigation and search functionalities of the applications appeared incapable of handling patients’ health complaints efficiently. Among caregivers, the lack of feedback and documentation possibilities caused inconvenience. Caregivers wanted to know how patients acted on their advice, but the applications did not offer an adequate feedback feature. Quality of care problems were mainly related to insufficient tailoring of information to patients’ needs and to efficiency problems. Patients expected personalized advice to control their state of health, but the applications failed to deliver this. Language (semantics) also appeared as an obstacle to providing appropriate and useful self-care advice. Caregivers doubted the reliability of the computer-generated information and the efficiency and effectiveness of secure email consultation. Legal or ethical issues with respect to possible misuse of email consultation also caused concerns. Implementation problems were mainly experienced by caregivers due to unclear policy on email consultation and the lack of training for email consultations. Conclusions Patients’ and caregivers’ expectations did not correspond with their experiences of the use of the Internet-based applications for self-care. Patients thought that the applications would support them in solving their health problems. Caregivers were more reserved about the applications because of medico-legal concerns about misuse. However, the applications failed to support self-care because eHealth is more than just a technological intervention. The design of the applications should include a way of thinking about how to deliver health care with the aid of technology. The most powerful application for self-care was secure email consultation, combined with a suitable triage mechanism to empower patients’ self-awareness. Future research should focus on the effectiveness of such Web-based triage mechanisms for medical complaints and on the development of interactive features to enhance patients’ self-care. PMID:18487137
ERIC Educational Resources Information Center
Ilvonen, Ilona
2013-01-01
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-27
... associated with FINRA members have attained specified levels of competence and knowledge, consistent with... questions that assess knowledge of options since individuals wishing to sit for the Series 37 examination... through Customers and Potential Customers, 22 questions; F2: Evaluates Customers' Other Security Holdings...
The relevance of security: A latent domain of attachment relationships.
Mannarini, Stefania; Boffo, Marilisa
2014-02-01
In the present study an adult attachment dimension, latent to the constructs of security, anxiety, and avoidance, was hypothesized, wherein security was expected to occupy the most relevant position. Furthermore, the reciprocal functioning of attachment constructs and their interactions with self-esteem were explored. Four hundreds and thirty-four Italian university students responded to two adult attachment questionnaires (Attachment Style Questionnaire and Adult Attachment Questionnaire) and to the Rosenberg Self-esteem scale. A Many-Facet Rasch Measurement modeling approach was adopted. The main results can be summarized as follows: (a) security, anxiety, and avoidance are nested under one latent attachment dimension; (b) security occupies the most prominent position on the dimension; (c) security is positively associated with a moderate level of attachment anxiety and negatively related to avoidance; and (d) a positive interaction between self-esteem and security, and a negative relation between self-esteem and anxiety, were detected. Theoretical, clinical, and empirical implications of the results are further discussed. © 2013 Scandinavian Psychological Associations and John Wiley & Sons Ltd.
Risk Assessment of Power System considering the CPS of Transformers
NASA Astrophysics Data System (ADS)
Zhou, Long; Peng, Zewu; Liu, Xindong; Li, Canbing; Chen, Can
2018-02-01
This paper constructs a risk assessment framework of power system for device-level information security, analyzes the typical protection configuration of power transformers, and takes transformer gas protection and differential protection as examples to put forward a method that analyzes the cyber security in electric power system, which targets transformer protection parameters. We estimate the risk of power system accounting for the cyber security of transformer through utilizing Monte Carlo method and two indexes, which are the loss of load probability and the expected demand not supplied. The proposed approach is tested with IEEE 9 bus system and IEEE 118 bus system.
2016-09-01
HEALTHCARE’S QUANTIFIED-SELF DATA: A COMPARATIVE ANALYSIS VERSUS PERSONAL FINANCIAL ACCOUNT AGGREGATORS BASED ON PORTER’S FIVE FORCES FRAMEWORK FOR...TITLE AND SUBTITLE SECURING HEALTHCARE’S QUANTIFIED-SELF DATA: A COMPARATIVE ANALYSIS VERSUS PERSONAL FINANCIAL ACCOUNT AGGREGATORS BASED ON...Distribution is unlimited. SECURING HEALTHCARE’S QUANTIFIED-SELF DATA: A COMPARATIVE ANALYSIS VERSUS PERSONAL FINANCIAL ACCOUNT AGGREGATORS BASED ON
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63599; File No. SR-MSRB-2010-16] Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Amendments to Rule G-5, on Disciplinary Actions by Appropriate Regulatory Agencies, Remedial Notices by Registered Securities Associations; and Rule G-17, on Conduct...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69174; File No. SR-NYSEMKT-2013-26] Self... Securities March 19, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (``Act... MKT'' or ``Exchange'') filed with the Securities and Exchange Commission (``Commission'') the proposed...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70357; File No. SR-MIAX-2013-42] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate... provisions of Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70873; File No. SR-ISE-2013-56] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70872; File No. SR-ISE-2013-57] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64562; File No. SR-ISE-2011-29] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Second Market Fees May 27, 2011. Pursuant to Section 19(b)(1) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65499; File No. SR-ISE-2011-64] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67295; File No. SR-NASDAQ-2012-061] Self... Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange... the Exchange's options trading facility. \\4\\ See Securities Exchange Act Release No. 67027 (May 18...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64769; File No. SR-NSCC-2011-04] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder \\2...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... Important Notice of the availability of the comparison service for when-issued corporate securities.\\5\\ \\5... scheduled to be implemented for corporate when-issued securities and NSCC would submit a rule filing to the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69980; File No. SR-NSCC-2013-09] Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-14
... underlying securities is not open for business. The Exchange believes that the proposed changes will allow... business however that security is being traded elsewhere. For example, if the primary market is unable to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70834; File No. SR-ISE-2013-55] Self-Regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70884; File No. SR-ISE-2013-59] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... November 15, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-04
... clarify that 2102(e) applies to trading halts in new derivative securities, so as to not be confused with... derivative securities products when a temporary interruption occurs in the calculation or wide dissemination... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65425; File No. SR-ISE-2011-61] Self-Regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... Tapes, eliminated the distinction between Derivative Securities Products and Non-Derivative Securities... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71137; File No. SR-CHX-2013-22] Self-Regulatory...) \\1\\ of the Securities Exchange Act of 1934 (``Act'') \\2\\ and Rule 19b-4 thereunder,\\3\\ notice is...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64292; File No. SR-ISE-2011-22] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Network Fees April 11, 2011. Pursuant to Section 19(b)(1) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66525; File No. SR-ISE-2012-09] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Network Fees March 7, 2012. Pursuant to Section 19(b)(1) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65087; File No. SR-ISE-2011-47] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed... August 10, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
Attachment to Mother and Father at Transition to Middle Childhood.
Di Folco, Simona; Messina, Serena; Zavattini, Giulio Cesare; Psouni, Elia
2017-01-01
The present study investigated concordance between representations of attachment to mother and attachment to father, and convergence between two narrative-based methods addressing these representations in middle childhood: the Manchester Child Attachment Story Task (MCAST) and the Secure Base Script Test (SBST). One hundred and twenty 6-year-old children were assessed by separate administrations of the MCAST for mother and father, respectively, and results showed concordance of representations of attachment to mother and attachment to father at age 6.5 years. 75 children were additionally tested about 12 months later, with the SBST, which assesses scripted knowledge of secure base (and safe haven), not differentiating between mother and father attachment relationships. Concerning attachment to father, dichotomous classifications (MCAST) and a continuous dimension capturing scripted secure base knowledge (MCAST) converged with secure base scriptedness (SBST), yet we could not show the same pattern of convergence concerning attachment to mother. Results suggest some convergence between the two narrative methods of assessment of secure base script but also highlight complications when using the MCAST for measuring attachment to father in middle childhood.
17 CFR 41.3 - Application for an exemptive order pursuant to section 4f(a)(4)(B) of the Act.
Code of Federal Regulations, 2010 CFR
2010-04-01
... member of the National Association of Securities Dealers, Inc.) or equivalent self-regulatory... self-regulatory organization may submit an application for an order pursuant to this section on behalf... exemption; (4) Any provision(s) of the securities laws or rules, or of the rules of a securities self...
ERIC Educational Resources Information Center
Goldner, Limor; Berenshtein-Dagan, Tal
2016-01-01
Associations between security within the family, satisfaction of basic psychological needs, true-self behavior, and knowledge of true self, as well as levels of adjustment, were explored in a sample of early adolescents and midadolescents in Israel (N = 302, mean age = 14.19 years). Both security within the family and needs satisfaction were found…
Psychological Security and Self-Efficacy among Syrian Refugee Students inside and outside the Camps
ERIC Educational Resources Information Center
ALharbi, Bassam H. M.
2017-01-01
The present study aimed to identify the degree of psychological security and self-efficacy among the Syrian refugee students inside and outside the camps. The sample consisted of 600 students from Syrian refugees inside and outside the camps in the second semester of the academic year 2014-2015. Scales for psychological security and self-efficacy…
Situated Usability Testing for Security Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.
2011-03-02
While usability testing is well established, assessing the usability of security software, tools, or methods deserves more careful consideration. It has been argued that dealing with security has become too difficult for individuals or organizations to manage effectively or to use conveniently. As difficult as it is for system administrators and developers to deal with, security is even more challenging for casual users. Indeed, it is much too easy for casual/home users to configure the security of their systems in non-optimal ways that leave their systems inadvertently insecure. This is exacerbated by the fact that casual users are focused onmore » matters other than security, and likely would prefer not even to think about security. This brief report argues that when security and/or privacy are part of the equation, traditional methods for usability testing should be re-considered. The purpose of this brief report is to argue for and outline a method associated with a new approach to usability testing for examining usable security issues.« less
Wichmann, Theresia; Buchheim, Anna; Menning, Hans; Schenk, Ingmar; George, Carol; Pokorny, Dan
2016-01-01
In the last few decades, there has been an increase of experimental research on automatic unconscious processes concerning the evaluation of the self and others. Previous research investigated implicit aspects of romantic attachment using self-report measures as explicit instruments for assessing attachment style. There is a lack of experimental procedures feasible for neurobiological settings. We developed a reaction time (RT) experiment using a narrative attachment measure with an implicit nature and were interested to capture automatic processes, when the individuals’ attachment system is activated. We aimed to combine attachment methodology with knowledge from implicit measures by using a decision RT paradigm. This should serve as a means to capture implicit aspects of attachment. This experiment evaluated participants’ response to prototypic attachment sentences in association with their own attachment classification, measured with the Adult Attachment Projective Picture System (AAP). First the AAP was administered as the standardized interview procedure to 30 healthy participants, which were classified into a secure or insecure group. In the following experimental session, both experimenter and participants were blind with respect to classifications. One hundred twenty eight prototypically secure or insecure sentences related to the eight pictures of the AAP were presented to the participants. Their response and RTs were recorded. Based on the response (accept, reject) a continuous security scale was defined. Both the AAP classification and security scale were related to the RTs. Differentiated study hypotheses were confirmed for insecure sentences, which were accepted faster by participants from the insecure attachment group (or with lower security scale), and rejected faster by participants from secure attachment group (or with higher security scale). The elaborating unconscious processes were more activated by insecure sentences with potential attachment conflicts. The introduced paradigm is able to contribute to an experimental approach in attachment research. The RT analysis with the narrative procedure might be of interest for a broader variety of questions in experimental and neurophysiological settings to capture unconscious processes in association with internal working models of attachment. An electrophysiological model based on preliminary research is proposed for assessing the preconscious neuronal network related to secure or insecure attachment representations. PMID:27853426
Use of microcomputers for self-assessment and continuing education in anaesthesia.
Schmulian, C; Kenny, G N; Campbell, D
1982-01-01
The suitability of computer-assisted self-assessment was evaluated as a means of quality assurance in anaesthesia. Altogether 202 anaesthetists participated in four trials of the method. Analyses of their performance in a self-assessment programme dealing with obstetric anaesthesia showed significant differences in the levels of knowledge of anaesthetists practising for different numbers of years. The acceptability of computer-assisted self-assessment ranged from 91% to 100% for the four trials. Similar programs have been shown to be of value in medical education and thus computer-assisted self-assessment appears to fulfil simultaneously the functions of self-assessment and continuing education. The criteria for a method of quality assurance are met. PMID:6800476
Lyons-Ruth, Karlen; Bureau, Jean-Francois; Holmes, Bjarne; Easterbrooks, Ann; Brooks, Nancy Hall
2012-01-01
The primary objective was to assess whether prospectively observed quality of parent-child interaction in infancy and middle childhood contributed to the prediction of borderline symptoms and recurrent suicidality/self-injury in late adolescence. Adolescents (mean 19.9 years) from 56 families participating in a longitudinal study since infancy (retention rate 74%) were assessed on the SCID-II for symptoms of borderline personality disorder, including suicidality/self-injury. Early clinical risk was indexed by clinical referral to parent-infant services. Attachment security and parent-child interaction were assessed from videotape at 18 months and 8 years. Severity of childhood abuse was rated from interview and self-report measures. Maternal withdrawal in infancy was a significant predictor of both borderline symptoms and suicidality/self-injury in late adolescence. Disorganizedcontrolling child behavior at age 8 contributed independently to the prediction of borderline symptoms. The effect of maternal withdrawal was independent of, and additive to, variability explained by severity of childhood abuse. Borderline symptoms and suicidality/self-injury may be preceded developmentally by disturbed interactions as early as 18 months of age. A parent-child transactional model is proposed to account for the findings. PMID:23123044
Triboelectric-Based Transparent Secret Code.
Yuan, Zuqing; Du, Xinyu; Li, Nianwu; Yin, Yingying; Cao, Ran; Zhang, Xiuling; Zhao, Shuyu; Niu, Huidan; Jiang, Tao; Xu, Weihua; Wang, Zhong Lin; Li, Congju
2018-04-01
Private and security information for personal identification requires an encrypted tool to extend communication channels between human and machine through a convenient and secure method. Here, a triboelectric-based transparent secret code (TSC) that enables self-powered sensing and information identification simultaneously in a rapid process method is reported. The transparent and hydrophobic TSC can be conformed to any cambered surface due to its high flexibility, which extends the application scenarios greatly. Independent of the power source, the TSC can induce obvious electric signals only by surface contact. This TSC is velocity-dependent and capable of achieving a peak voltage of ≈4 V at a resistance load of 10 MΩ and a sliding speed of 0.1 m s -1 , according to a 2 mm × 20 mm rectangular stripe. The fabricated TSC can maintain its performance after reciprocating rolling for about 5000 times. The applications of TSC as a self-powered code device are demonstrated, and the ordered signals can be recognized through the height of the electric peaks, which can be further transferred into specific information by the processing program. The designed TSC has great potential in personal identification, commodity circulation, valuables management, and security defense applications.
Ahn, Eunjong; Kim, Hyunjun; Sim, Sung-Han; Shin, Sung Woo; Shin, Myoungsu
2017-01-01
Recently, self-healing technologies have emerged as a promising approach to extend the service life of social infrastructure in the field of concrete construction. However, current evaluations of the self-healing technologies developed for cementitious materials are mostly limited to lab-scale experiments to inspect changes in surface crack width (by optical microscopy) and permeability. Furthermore, there is a universal lack of unified test methods to assess the effectiveness of self-healing technologies. Particularly, with respect to the self-healing of concrete applied in actual construction, nondestructive test methods are required to avoid interrupting the use of the structures under evaluation. This paper presents a review of all existing research on the principles of ultrasonic test methods and case studies pertaining to self-healing concrete. The main objective of the study is to examine the applicability and limitation of various ultrasonic test methods in assessing the self-healing performance. Finally, future directions on the development of reliable assessment methods for self-healing cementitious materials are suggested. PMID:28772640
Fast Computation and Assessment Methods in Power System Analysis
NASA Astrophysics Data System (ADS)
Nagata, Masaki
Power system analysis is essential for efficient and reliable power system operation and control. Recently, online security assessment system has become of importance, as more efficient use of power networks is eagerly required. In this article, fast power system analysis techniques such as contingency screening, parallel processing and intelligent systems application are briefly surveyed from the view point of their application to online dynamic security assessment.
20 CFR 404.1065 - Self-employment coverage.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 404.1065 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... Self-employment coverage. For an individual to have self-employment coverage under social security, the individual must be engaged in a trade or business and have net earnings from self-employment that can be...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-17
... Request; National Security and Critical Technology Assessments of the U.S. Industrial Base AGENCY: Bureau... Federal agencies, conducts assessments of U.S. industrial base sectors deemed critical to U.S. national... needs of these critical market segments in order to maintain a strong U.S. industrial base. II. Method...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63309; File No. SR-MSRB-2010-16] Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Amendments to Rule G-5, on Disciplinary Actions by Appropriate Regulatory Agencies, Remedial Notices by Registered Securities Associations; and Rule G-17, on Conduct of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-23
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62523; File No. SR-ISE-2010-73] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change Relating to... Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-25
... same underlying security would be detrimental to the success of this new product offering and would... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69161; File No. SR-NYSEArca-2013-26] Self... Certain Securities March 18, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71172; File No. SR-MIAX-2013-58] Self...) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby...'') filed with the Securities and Exchange Commission (``Commission'') a proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71066; File No. SR-ISE-2013-66] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70362; File No. SR-ISE-2013-42] Self-Regulatory..., 2013, International Securities Exchange, LLC (``Exchange'') filed with the Securities and Exchange...\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to list and trade options on the Nations VolDex...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70198; File No. SR-DTC-2013-09] Self-Regulatory... Change To Eliminate Special Procedures for Securities Offered Pursuant to Regulation S, Category 3, Under the Securities Act of 1933 August 14, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64488; File No. SR-FICC-2011-03] Self... Clearing Fund Securities and Eligible Participants Fund Securities May 13, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ notice is hereby given that on May 10, 2011...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61510; File No. SR-FINRA-2010-003] Self... Change, as Modified by Amendment No. 1, Relating to Trade Reporting of OTC Equity Securities and Restricted Equity Securities February 5, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-20
... security-based swaps. The new legislation was intended among other things to enhance the authority of... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66156; File No. SR-FINRA-2012-004] Self... (Application of Rules to Security-Based Swaps) January 13, 2012. Pursuant to Section 19(b)(1) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61762; File No. SR-NSCC-2010-02] Self-Regulatory Organizations; The National Securities Clearing Corporation; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Aggregate Obligations in Certain Securities Transactions Designated for Settlement on a Trade-for-Trade Basis Marc...
ERIC Educational Resources Information Center
Clarke, Marlon
2011-01-01
As organizations have become more dependent on networked information systems (IS) to conduct their business operations, their susceptibility to various threats to information security has also increased. Research has consistently identified the inappropriate security behavior of the users as the most significant of these threats. Various factors…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... option, derivative, security-based swap, or other financial instrument overlying a security, the value of... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70626; File No. SR-EDGX-2013-36] Self...) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is...
Rao, Sathya; Broadbear, Jillian H; Thompson, Katherine; Correia, Anna; Preston, Martin; Katz, Paul; Trett, Robert
2017-10-01
Borderline personality disorder (BPD) is associated with frequent self-harm and suicidal behaviours. This study compared physician-assessed self-harm risk and intervention choice according to a (i) standard risk assessment and (ii) BPD-specific risk assessment methods. Forty-five junior and senior mental health physicians were assigned to standard or BPD-specific risk training groups. The assessment utilized a BPD case vignette containing four scenarios describing high/low lethality self-harm and chronic/new patterns of self-harm behaviour. Participants chose from among four interventions, each corresponding to a risk category. Standard and BPD-specific groups were alike in their assessment of self-harm risk. Divergence occurred on intervention choice for assessments of low lethality, chronic risk ( p<.01) and high lethality, chronic risk ( p<.005). Overall, psychiatrists were more likely than their junior colleagues to correctly assess risk and management options. Although standard and BPD-specific methods are well aligned for assessing self harm-associated risk, BPD-specific training raised awareness of BPD-appropriate interventions, particularly in the context of chronic patterns of self-harm behaviour. Wider dissemination of BPD-specific risk training may enhance the confidence of mental health clinicians in identifying the nature of self-harm risk as well as the most clinically appropriate interventions for clients with BPD.
Singh, Abhinav; Purohit, Bharathi M
2017-06-01
To assess patient satisfaction, self-rated oral health and associated factors, including periodontal status and dental caries, among patients covered for dental insurance through a National Social Security Scheme in New Delhi, India. A total of 1,498 patients participated in the study. Satisfaction levels and self-rated oral-health scores were measured using a questionnaire comprising 12 closed-ended questions. Clinical data were collected using the Community Periodontal Index (CPI) and the decayed, missing and filled teeth (DMFT) index. Regression analysis was conducted to evaluate factors associated with dental caries, periodontal status and self-rated oral health. Areas of concern included poor cleanliness within the hospital, extensive delays for appointments, waiting time in hospital and inadequate interpersonal and communication skills among health-care professionals. Approximately 51% of the respondents rated their oral health as fair to poor. Younger age, no tobacco usage, good periodontal status and absence of dental caries were significantly associated with higher oral health satisfaction, with odds ratios of 3.94, 2.38, 2.58 and 2.09, respectively (P ≤ 0.001). The study indicates poor satisfaction levels with the current dental care system and a poor self-rated oral health status among the study population. Some specific areas of concern have been identified. These findings may facilitate restructuring of the existing dental services under the National Social Security Scheme towards creating a better patient care system. © 2017 FDI World Dental Federation.
Mikulincer, M; Gillath, O; Halevy, V; Avihou, N; Avidan, S; Eshkoli, N
2001-12-01
Five studies examined the effects of chronic and contextual activation of attachment security on reactions to others' needs. The sense of attachment security was contextually primed by asking participants to recollect personal memories, read a story, or look at a picture of supportive others or by subliminally exposing them to proximity-related words. This condition was compared against the priming of neutral themes, positive affect, or attachment-insecurity schemas. Then reports of empathy and personal distress or the accessibility of empathy and personal-distress memories were assessed. Attachment-security priming strengthened empathic reactions and inhibited personal distress. Self-reports of attachment anxiety and avoidance were inversely related to empathy, and attachment anxiety was positively related to personal distress. The discussion emphasizes the relevance of attachment theory for explaining reactions to others' needs.
17 CFR 201.420 - Appeal of determinations by self-regulatory organizations.
Code of Federal Regulations, 2014 CFR
2014-04-01
... self-regulatory organizations. 201.420 Section 201.420 Commodity and Securities Exchanges SECURITIES... Review § 201.420 Appeal of determinations by self-regulatory organizations. (a) Application for review... by a self-regulatory organization determination as to which a notice is required to be filed with the...
17 CFR 201.420 - Appeal of determinations by self-regulatory organizations.
Code of Federal Regulations, 2011 CFR
2011-04-01
... self-regulatory organizations. 201.420 Section 201.420 Commodity and Securities Exchanges SECURITIES... Review § 201.420 Appeal of determinations by self-regulatory organizations. (a) Application for review... by a self-regulatory organization determination as to which a notice is required to be filed with the...
17 CFR 201.420 - Appeal of determinations by self-regulatory organizations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... self-regulatory organizations. 201.420 Section 201.420 Commodity and Securities Exchanges SECURITIES... Review § 201.420 Appeal of determinations by self-regulatory organizations. (a) Application for review... by a self-regulatory organization determination as to which a notice is required to be filed with the...
17 CFR 201.420 - Appeal of determinations by self-regulatory organizations.
Code of Federal Regulations, 2012 CFR
2012-04-01
... self-regulatory organizations. 201.420 Section 201.420 Commodity and Securities Exchanges SECURITIES... Review § 201.420 Appeal of determinations by self-regulatory organizations. (a) Application for review... by a self-regulatory organization determination as to which a notice is required to be filed with the...
17 CFR 201.420 - Appeal of determinations by self-regulatory organizations.
Code of Federal Regulations, 2013 CFR
2013-04-01
... self-regulatory organizations. 201.420 Section 201.420 Commodity and Securities Exchanges SECURITIES... Review § 201.420 Appeal of determinations by self-regulatory organizations. (a) Application for review... by a self-regulatory organization determination as to which a notice is required to be filed with the...
Vernham, Zarah; Tapp, James; Moore, Estelle
2016-05-01
Incidents of aggression and self-harm in forensic mental health inpatient settings present a significant challenge to practitioners in terms of safely managing and reducing the harm they cause. Research has been conducted to explore the possible predictors of these incidents and has identified a range of environmental, situational, and individual risk factors. However, despite the often interpersonal nature of the majority of aggressive incidents, few studies have investigated forensic inpatient interpersonal styles as predictors of aggression and even fewer have explored the potential interpersonal function of self-harming behaviors. The current study investigated the predictive validity of the Chart of Interpersonal Reactions in Closed Living Environments (CIRCLE) for incidents of verbal and physical aggression, and self-harm recorded from 204 high-secure forensic inpatients. Means comparisons, correlations, and receiver operating characteristics (ROC) were conducted on recorded incident data at 12, 24, and 48 months following baseline assessment using the CIRCLE. Dominant and coercive interpersonal styles were significant predictors of aggression, and a coercive interpersonal style was a significant predictor of self-harm, over the recorded time periods. When categorizing the inpatients on the basis of short- and long-term admissions, these findings were only replicated for inpatients with shorter lengths of stay. The findings support previous research which has demonstrated the benefits of assessing interpersonal style for the purposes of risk planning and management of forensic inpatients. The predictive value may be time-limited in terms of stage of admission. © The Author(s) 2015.
Belavy, D
2014-11-01
Self-assessment and audit in anaesthesia require a systematic approach to postoperative data collection. The increasing prevalence of mobile internet technology offers a new data collection method for anaesthetists. In this paper, a system for mobile internet data collection is described and the preliminary experience with its use is presented. The system was developed by the author and combined an open source survey application and a short message service (SMS) gateway to send SMS messages to patients after their anaesthesia and surgery. The messages requested patients to complete an online Quality of Recovery survey questionnaire if they had a smartphone. The results were immediately available. A preliminary survey of consenting patients with available mobile telephone numbers in a private practice was undertaken by the author. A total of 123 procedures were eligible for follow-up and survey requests were sent to 94 patients. Sixty-five surveys were completed. This represents 69% of surveys requested, demonstrating that mobile phone technology can be used to provide significant amounts of data for quality assurance. However, the implementation of a mobile internet data collection system requires consideration of privacy principles, security and ethical handling of data.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-02
... reasonable fees incurred for processing such orders. \\3\\ See Securities Exchange Act Release No. 61152... orders is an equitable allocation of reasonable fees because such orders require processing and the assessment of such fees allows the Exchange to recoup costs incurred processing such orders, as well as...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-08
... under EPC? c. Should EPCs permit the investments of green building measures if sufficient savings or.... weekdays at the above address. Due to security measures at the HUD Headquarters building, an advance... assessment and auditing protocol for PHA's undertaking self-direct EPCs? Could a Green Physical Needs...
If Maslow Created a Composition Course: A New Look at Motivation in the Classroom.
ERIC Educational Resources Information Center
Boone, Beth; Hill, Ada S.
The needs hierarchy developed by Abraham Maslow lends itself to the composition classroom. The hierarchy depicts five distinct need levels through which an individual travels: basic, safety/security, belonging/peer acceptance, ego/esteem, and self-actualization. From teacher observations and students' comments, need levels can be assessed and…
ERIC Educational Resources Information Center
Toth, Sheree L.; Rogosch, Fred A.; Sturge-Apple, Melissa; Cicchetti, Dante
2009-01-01
Relations among maternal depression, child attachment, and children's representations of parents and self were examined. Participants included toddlers and their mothers with a history of major depressive disorder (n=63) or no history of mental disorder (n=68). Attachment was assessed at 20 and 36 months and representations of parents and self…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-20
... Effectiveness of Proposed Rule Change Relating to Fees and Rebates for Adding and Removing Liquidity December 13... and rebates for adding and removing liquidity. The text of the proposed rule change is available on... currently assesses a per contract transaction charge to market participants that add or remove liquidity...
Negotiable Collateral Damage: Civil Liberties Versus National Security in Times of Threat
2011-06-01
physiological, safety, love, esteem , and self -actualization.7 For the individual, defense protects the ability to satisfy these five needs. In his...physical security, ontological security, sociation, self - esteem , and transcendence.8 For the state, the most basic needs are those of its...the hierarchy of needs, falling into the realm of self - esteem and transcendence. The framers of the Constitution appreciated this, sacrificing some
Attention focus and self-touch in toddlers: The moderating effect of attachment security.
Ito-Jäger, Sachiyo; Howard, Amanda R; Purvis, Karyn B; Cross, David R
2017-08-01
The superior self-regulation and attention-regulation abilities of securely attached children have been repeatedly demonstrated. However, the mechanisms that allow securely attached children to exhibit higher levels of attention focus than insecurely attached (anxious-ambivalent and anxious-avoidant) children need to be explored. One possible mechanism that has been hypothesized to play a role in focusing attention is self-touch. Previous research has shown that 10-year-old children exhibit more bilateral self-touch (i.e., both hands are simultaneously moving onto each other or on the body, and both hands are in contact with each other or with the body), but not lateral self-touch (i.e., one hand is moving on the other hand or on the body, and the hand is in contact with the other hand or with the body), when they focus attention on a task. Because bilateral coordination is still developing during childhood, we expected that lateral self-touch, instead of bilateral self-touch, may be associated with attention focus for toddlers. The objectives of the present study were to examine whether securely attached toddlers exhibit more self-touch, particularly lateral self-touch, while they focus on a task than while they do not focus on a task. We expected to find that the association between lateral self-touch and attention focus is not as strong for insecurely attached toddlers. Data from forty-nine mother-child dyads were employed for analyses. The attachment classification of the children was determined using the Strange Situation. The duration of attention focus and self-touch behavior during a reading task were coded. An association between lateral self-touch and attention focus was found for children of all attachment classifications. This association was particularly strong for securely attached children. We discuss the possibility that securely attached toddlers may use lateral self-touch to regulate attention. Copyright © 2017 Elsevier Inc. All rights reserved.
Measuring relational security in forensic mental health services
Chester, Verity; Alexander, Regi T.; Morgan, Wendy
2017-01-01
Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment. PMID:29234515
Measuring relational security in forensic mental health services.
Chester, Verity; Alexander, Regi T; Morgan, Wendy
2017-12-01
Aims and method Relational security is an important component of care and risk assessment in mental health services, but the utility of available measures remains under-researched. This study analysed the psychometric properties of two relational security tools, the See Think Act (STA) scale and the Relational Security Explorer (RSE). Results The STA scale had good internal consistency and could highlight differences between occupational groups, whereas the RSE did not perform well as a psychometric measure. Clinical implications The measures provide unique and complimentary perspectives on the quality of relational security within secure services, but have some limitations. Use of the RSE should be restricted to its intended purpose; to guide team discussions about relational security, and services should refrain from collecting and aggregating this data. Until further research validates their use, relational security measurement should be multidimensional and form part of a wider process of service quality assessment.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-20
... other things, amended the FINRA Rule 6700 Series to: (1) Expand TRACE to include Agency Debt Securities... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63709; File No. SR-FINRA-2011-001] Self... Securities Exchange Act of 1934 [[Page 3685
PMU-Aided Voltage Security Assessment for a Wind Power Plant
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jiang, Huaiguang; Zhang, Yingchen; Zhang, Jun Jason
2015-10-05
Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This papermore » proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant's point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.« less
Susceptibility of South Korea to hydrologic extremes affecting the global food system
NASA Astrophysics Data System (ADS)
Puma, M. J.; Chon, S. Y.
2015-12-01
Food security in South Korea is closely linked to trade in the global food system. The country's production of major grains declined from 5.8 million metric tons (mmt) in 1998 to 4.8 mmt in 2014, which coincided with a shift in grain self sufficiency from 43% down to 24% over this same period. Many factors led to these changes, including reductions in domestic agricultural land, governmental policies supporting industry over agriculture, and a push towards trade liberalization. South Korea's self sufficiency is now one of the lowest among Organisation for Economic Co-operation and Development (OECD) countries, leaving it vulnerable to disruptions in the global food system. Here we explore this vulnerability by assessing how global trade disruptions would affect Korea's food security. We impose historical extreme drought and flood events that would possibly affect today's major food producing regions concurrently. Next we compute food supply deficits in South Korea that might result from these events. Our analyses provide a framework for formulating domestic food policies to enhance South Korea's food security in the increasingly fragile global food system.
Cyber security risk assessment for SCADA and DCS networks.
Ralston, P A S; Graham, J H; Hieb, J L
2007-10-01
The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65502; File No. SR-ISE-2011-63] Self-Regulatory... 240.19b-4. I. Self-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule... Exchange, and at the Commission's Public Reference Room. II. Self-Regulatory Organization's Statement of...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61690; File No. SR-NASD-2003-140] Self... Amendment Nos. 1 and 2 thereto. I. Self-Regulatory Organization's Statement of the Terms of Substance of the... and at the Commission's Public Reference Room. II. Self-Regulatory Organization's Statement of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64666; File No. SR-NSCC-2011-03] Self...\\ 17 CFR 240.19b-4(f)(4). I. Self-Regulatory Organization's Statement of Terms of Substance of the... Service. II. Self-Regulatory Organization's Statement of Purpose of, and Statutory Basis for, the Proposed...
Multiple attachments and group psychotherapy: implications for college counseling centers.
Marmarosh, Cheri L
2009-10-01
A large body of literature has supported the application of attachment theory to the understanding of college student development and the process of individual psychotherapy. Despite group treatment being one of the major methods of intervention in college counseling centers, there has been very little research guided by attachment theory that has been applied to the area of group psychotherapy. Many current assessment instruments used in college counseling centers can be supported with attachment theory, and many group therapy interventions are aimed at facilitating secure working models of self, other, and groups. This paper explores the importance of personal and group attachments in group psychotherapy and specifically addresses implications for clinical training and research in university counseling centers.
Security risk assessment: applying the concepts of fuzzy logic.
Bajpai, Shailendra; Sachdeva, Anish; Gupta, J P
2010-01-15
Chemical process industries (CPI) handling hazardous chemicals in bulk can be attractive targets for deliberate adversarial actions by terrorists, criminals and disgruntled employees. It is therefore imperative to have comprehensive security risk management programme including effective security risk assessment techniques. In an earlier work, it has been shown that security risk assessment can be done by conducting threat and vulnerability analysis or by developing Security Risk Factor Table (SRFT). HAZOP type vulnerability assessment sheets can be developed that are scenario based. In SRFT model, important security risk bearing factors such as location, ownership, visibility, inventory, etc., have been used. In this paper, the earlier developed SRFT model has been modified using the concepts of fuzzy logic. In the modified SRFT model, two linguistic fuzzy scales (three-point and four-point) are devised based on trapezoidal fuzzy numbers. Human subjectivity of different experts associated with previous SRFT model is tackled by mapping their scores to the newly devised fuzzy scale. Finally, the fuzzy score thus obtained is defuzzyfied to get the results. A test case of a refinery is used to explain the method and compared with the earlier work.
75 FR 68395 - Agency Self-Evaluation Under Section 504 of the Rehabilitation Act of 1973
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-05
...-800-325- 0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0069] Agency Self-Evaluation Under Section 504 of the Rehabilitation Act of 1973 AGENCY: Social Security Administration. ACTION: Notice and request...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61317; File No. SR-ISE-2009-103] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Market Data Fees January 8, 2010. I. Introduction On November 25, 2009, the International...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-23
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71091; File No. SR-FICC-2013-09] Self...[supreg] at FICC's Government Securities Division December 17, 2013. I. Introduction On October 28, 2013, the Fixed Income Clearing Corporation (``FICC'') filed with the Securities and Exchange Commission...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-31
.... The commenter states that such securities are likely to become more important to banks as new... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71180; File No. SR-FINRA-2013-039] Self... Securities to FINRA December 24, 2013. I. Introduction On September 16, 2013, the Financial Industry...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61979; File No. SR-FINRA-2010-003] Self..., as Modified by Amendment Nos. 1 and 2, Relating to Trade Reporting of OTC Equity Securities and Restricted Equity Securities April 23, 2010. I. Introduction On January 15, 2010, Financial Industry...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66398; File No. SR-NSCC-2012-02] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change To Enhance Its Margining Methodology as Applied to Municipal and Corporate Bonds February 15, 2012...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-20
... supervise sales of corporate securities and options, respectively. A person registering as a General... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68918; File No. SR-FINRA-2013-014] Self... Effectiveness of a Proposed Rule Change Relating to the General Securities Sales Supervisor (Series 9/10...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68491; File No. SR-ISE-2012-101] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate... Prices Until the Close of Trading on the Second Business Day Prior to Monthly Expiration in Unusual...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69659; File No. SR-MIAX-2013-22] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate... the Second Business Day Prior to Expiration in Unusual Market Conditions May 29, 2013. Pursuant to...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-06
... a number of securities and futures exchanges. Among other things, this Risk Disclosure statement... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62624; File No. SR-NFA-2010-02] Self-Regulatory... Interpretive Notice Entitled ``NFA Compliance Rule 2-30(b): Risk Disclosure Statement for Security Futures...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-10
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69302; File No. SR-NSCC-2012-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To... customers, a more accurate reflection of risks in the calculation of Clearing Fund margin, however, could...
Davoren, Mary; Hennessy, Sarah; Conway, Catherine; Marrinan, Seamus; Gill, Pauline; Kennedy, Harry G
2015-03-28
Detention in a secure forensic psychiatric hospital may inhibit engagement and recovery. Having validated the clinician rated DUNDRUM-3 (programme completion) and DUNDRUM-4 (recovery) in a forensic hospital, we set out to draft and validate scales measuring the same programme completion and recovery items that patients could use to self-rate. Based on previous work, we hypothesised that self-rating scores might be predictors of objective progress including conditional discharge. We hypothesised also that the difference between patients' and clinicians' ratings of progress in treatment and other factors relevant to readiness for discharge (concordance) would diminish as patients neared discharge. We hypothesised also that this difference in matched scores would predict objective progress including conditional discharge. In a prospective naturalistic observational cohort study in a forensic hospital, we examined whether scores on the self-rated DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales or differences between clinician and patient ratings on the same scales (concordance) would predict moves between levels of therapeutic security and conditional discharge over the next twelve months. Both scales stratified along the recovery pathway of the hospital, but clinician ratings matched the level of therapeutic security more accurately than self ratings. The clinician rated scales predicted moves to less secure units and to more secure units and predicted conditional discharge but the self-rated scores did not. The difference between clinician and self-rated scores (concordance) predicted positive and negative moves and conditional discharge, but this was not always an independent predictor as shown by regression analysis. In regression analysis the DUNDRUM-3 predicted moves to less secure places though the HCR-20 C & R score dominated the model. Moves back to more secure places were predicted by lack of concordance on the DUNDRUM-4. Conditional discharge was predicted predominantly by the DUNDRUM-3. Patients accurately self-rate relative to other patients however their absolute ratings were consistently lower (better) than clinicians' ratings and were less accurate predictors of outcomes including conditional discharge. Quantifying concordance is a useful part of the recovery process and predicts outcomes but self-ratings are not accurate predictors.
Steele, Ryan D.; Waters, Theodore E. A.; Bost, Kelly K.; Vaughn, Brian E.; Truitt, Warren; Waters, Harriet S.; Booth-LaForce, Cathryn; Roisman, Glenn I.
2015-01-01
Based on a sub-sample (N = 673) of the NICHD Study of Early Child Care and Youth Development (SECCYD) cohort, this paper reports data from a follow-up assessment at age 18 years on the antecedents of secure base script knowledge, as reflected in the ability to generate narratives in which attachment-related difficulties are recognized, competent help is provided, and the problem is resolved. Secure base script knowledge was (a) modestly to moderately correlated with more well established assessments of adult attachment, (b) associated with mother-child attachment in the first three years of life and with observations of maternal and paternal sensitivity from childhood to adolescence, and (c) partially accounted for associations previously documented in the SECCYD cohort between early caregiving experiences and Adult Attachment Interview states of mind (Booth-LaForce & Roisman, 2014) as well as self-reported attachment styles (Fraley, Roisman, Booth-LaForce, Owen, & Holland, 2013). PMID:25264703
Research Designs and Methods in Self-Assessment Studies: A Content Analysis
ERIC Educational Resources Information Center
Pastore, Serafina
2017-01-01
This paper focuses on self-assessment studies in the higher education field. In the assessment for learning perspective, self-assessment is related to reflection, metacognition, and self-regulation: all these aspects are considered as fundamental prerequisites for students' future professional development. Despite the recognition of…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-11
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61647; File No. SR-MSRB-2010-01] Self... of the self- regulatory organization pursuant to Section 19(b)(3)(A)(i) of the Act,\\3\\ and Rule 19b-4...)(1). I. Self-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-10
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62216; File No. SR-ISE-2010-51] Self-Regulatory... been prepared by the self- regulatory organization. The Exchange has filed the proposal as a ``non....19b-4(f)(6). I. Self-Regulatory Organization's Statement of the Terms of Substance of the Proposed...
Lauvrud, Christian; Nonstad, Kåre; Palmstierna, Tom
2009-01-01
Background Violence is frequent towards nurses in forensic mental health hospitals. Implications of this high risk environment have not been systematically explored. This paper explores occurrence of symptoms on post traumatic stress and their relationship to professional quality of life. Methods Self report questionnaires assessing symptoms of post traumatic stress and professional quality of life were distributed among psychiatric nurses in a high security forensic psychiatric unit with high frequency of violent behaviour. Relationships between post traumatic stress symptoms, forensic nursing experience, type of ward and compassion satisfaction, burnout and compassion fatigue were explored. Results The prevalence of post traumatic stress symptoms was low. Low scores were found on compassion satisfaction. Length of psychiatric nursing experience and low scores on compassion satisfaction were correlated to increased post traumatic stress symptoms. Conclusion Although high violence frequency, low rate of post traumatic stress symptoms and low compassion satisfaction scores was found. High staff/patient ratio and emotional distance between staff and patients are discussed as protective factors. PMID:19371413
Bennett, Michael I; Mulvey, Matthew R; Campling, Natasha; Latter, Sue; Richardson, Alison; Bekker, Hilary; Blenkinsopp, Alison; Carder, Paul; Closs, Jose; Farrin, Amanda; Flemming, Kate; Gallagher, Jean; Meads, David; Morley, Stephen; O'Dwyer, John; Wright-Hughes, Alexandra; Hartley, Suzanne
2017-12-01
Pain affects most people approaching the end of life and can be severe for some. Opioid analgesia is effective, but evidence is needed about how best to support patients in managing these medicines. To develop a self-management support toolkit (SMST) and delivery strategy and to test the feasibility of evaluating this intervention in a future definitive trial. Phase I - evidence synthesis and qualitative interviews with patients and carers. Phase II - qualitative semistructured focus groups and interviews with patients, carers and specialist palliative care health professionals. Phase III - multicentre mixed-methods single-arm pre-post observational feasibility study. Phase I - six patients and carers. Phase II - 15 patients, four carers and 19 professionals. Phase III - 19 patients recruited to intervention that experienced pain, living at home and were treated with strong opioid analgesia. Process evaluation interviews with 13 patients, seven carers and 11 study nurses. Self-Management of Analgesia and Related Treatments at the end of life (SMART) intervention comprising a SMST and a four-step educational delivery approach by clinical nurse specialists in palliative care over 6 weeks. Recruitment rate, treatment fidelity, treatment acceptability, patient-reported outcomes (such as scores on the Brief Pain Inventory, Self-Efficacy for Managing Chronic Disease Scale, Edmonton Symptom Assessment Scale, EuroQol-5 Dimensions, Satisfaction with Information about Medicines Scale, and feasibility of collecting data on health-care resource use for economic evaluation). Phase I - key themes on supported self-management were identified from evidence synthesis and qualitative interviews. Phase II - the SMST was developed and refined. The delivery approach was nested within a nurse-patient consultation. Phase III - intervention was delivered to 17 (89%) patients, follow-up data at 6 weeks were available on 15 patients. Overall, the intervention was viewed as acceptable and valued. Descriptive analysis of patient-reported outcomes suggested that interference from pain and self-efficacy were likely to be candidates for primary outcomes in a future trial. No adverse events related to the intervention were reported. The health economic analysis suggested that SMART could be cost-effective. We identified key limitations and considerations for a future trial: improve recruitment through widening eligibility criteria, refine the SMST resources content, enhance fidelity of intervention delivery, secure research nurse support at recruiting sites, refine trial procedures (including withdrawal process and data collection frequency), and consider a cluster randomised design with nurse as cluster unit. (1) The recruitment rate was lower than anticipated. (2) The content of the intervention was focused on strong opioids only. (3) The fidelity of intervention delivery was limited by the need for ongoing training and support. (4) Recruitment sites where clinical research nurse support was not secured had lower recruitment rates. (5) The process for recording withdrawal was not sufficiently detailed. (6) The number of follow-up visits was considered burdensome for some participants. (7) The feasibility trial did not have a control arm or assess randomisation processes. A future randomised controlled trial is feasible and acceptable. This study is registered as PROSPERO CRD42014013572; Current Controlled Trials ISRCTN35327119; and National Institute for Health Research (NIHR) Portfolio registration 162114. The NIHR Health Technology Assessment programme.
Investigating the Relationship between Need for Cognition and Skill in Ethical Hackers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Le Blanc, Katya; Freeman, Sarah
As technology gets more complex and increasingly connected, there is an increasing concern with cyber security. There is also a growing demand for cyber security professionals. Unfortunately there currently are not enough skilled professionals to meet that demand. In order to prepare the next generation of cyber security professionals to meet this demand, we need to understand what characteristics make skilled cyber security professionals. For this work, we focus on professionals who take an offensive approach to cyber security, so called ethical hackers. These hackers utilize many of the same skills that the adversaries that we defend against would use,more » with the goal of identifying vulnerabilities and address them before they are exploited by adversaries. A commonly held belief among ethical hackers is that hackers must possess exceptional curiosity and problem solving skills in order to be successful. Curiosity is has been studied extensively in psychology, but there is no consensus on what it is and how to measure it. Further, many existing inventories for assessing curiosity are targeted at measuring curiosity in children. Although there isn’t an accepted standard to assess curiosity in adults, a related construct, called Need for Cognition (may capture what is meant when people speak of curiosity. The Need for Cognition scale also captures the tendency toward preferring complex problems (which correlates with good problem solving skills), which may provide insight into what make skilled hackers. In addition to the Need for Cognition, we used a structured interview to assess hacker skill. Hackers rated their own skill on a scale from one to ten on a predefined list of hacker skills. They were then asked to rate a peer who they felt was most skilled in each of the skills. They were asked to rate two peers for each skill, one that they worked with directly and one person that was the most skilled in the field (these could be known by reputation only). The hypothesis is that hackers have a higher than average (i.e., compared to non-hackers) Need for cognition and that Need for Cognition will be positively correlated with self-reported and peer reported skill. We interviewed 20 cyber security researchers who specialize in offensive approaches. Based on the responses to the hacker skill inventory, we generated a self-reported skill score for each participant. We also developed a peer-rating for each participant based on the number of times each individual that was interviewed was named as the most skilled in a particular area. The results indicate that the sample of ethical hackers has a high Need for Cognition and that Need for cognition was related to both self-reported skill and peer-reported skill. The results are discussed in the context of training and recruitment of cyber security professionals.« less
Woolgar, Matthew; Tranah, Troy
2010-10-01
Young people in secure accommodation are at high risk of depression and self-harm. This study investigates the relationship between depressive symptoms, negative self-schemas and the cognitive vulnerability to depression in 38 young people in secure accommodation. The impact of a) current suicidal ideation and b) a previous history of self-harm behaviour on latent negative self-schemas was examined using a mood induction task. The low mood condition indicated these young people had a latent cognitive vulnerability to depression. However, this vulnerability was exacerbated in the context of current suicidal ideation but not by a history of self-harm behaviours. An unexpected finding was the negative self-schemas of young people from ethnic minority backgrounds were particularly susceptible to the mood induction. The findings are discussed both in terms of the cognitive vulnerabilities of adolescents detained in secure accommodation and the role of participant characteristics on the validity of mood induction studies in adolescence.
Selenius, Heidi; Leppänen Östman, Sari; Strand, Susanne
2016-10-01
Inpatient aggression among female forensic psychiatric patients has been shown to be associated with self-harm, that is considered to be a historical risk factor for violence. Research on associations between previous or current self-harm and different types of inpatient aggression is missing. The aim of this register study was to investigate the prevalence of self-harm and the type of inpatient aggression among female forensic psychiatric inpatients, and to study whether the patients' self-harm before and/or during forensic psychiatric care is a risk factor for inpatient aggression. Female forensic psychiatric patients (n = 130) from a high security hospital were included. The results showed that 88% of the female patients had self-harmed at least once during their life and 57% had been physically and/or verbally aggressive towards staff or other patients while in care at the hospital. Self-harm before admission to the current forensic psychiatric care or repeated self-harm were not significantly associated with inpatient aggression, whereas self-harm during care was significantly associated with physical and verbal aggression directed at staff. These results pointed towards self-harm being a dynamic risk factor rather than a historical risk factor for inpatient aggression among female forensic psychiatric patients. Whether self-harm is an individual risk factor or a part of the clinical risk factor 'Symptom of major mental illness' within the HCR-20V3 must be further explored among women. Thus, addressing self-harm committed by female patients during forensic psychiatric care seems to be important in risk assessments and the management of violence, especially in reducing violence against staff in high-security forensic psychiatric services.
Video calls from lay bystanders to dispatch centers - risk assessment of information security
2011-01-01
Background Video calls from mobile phones can improve communication during medical emergencies. Lay bystanders can be instructed and supervised by health professionals at Emergency Medical Communication Centers. Before implementation of video mobile calls in emergencies, issues of information security should be addressed. Methods Information security was assessed for risk, based on the information security standard ISO/IEC 27005:2008. A multi-professional team used structured brainstorming to find threats to the information security aspects confidentiality, quality, integrity, and availability. Results Twenty security threats of different risk levels were identified and analyzed. Solutions were proposed to reduce the risk level. Conclusions Given proper implementation, we found no risks to information security that would advocate against the use of video calls between lay bystanders and Emergency Medical Communication Centers. The identified threats should be used as input to formal requirements when planning and implementing video calls from mobile phones for these call centers. PMID:21958387
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shull, Doug
The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-14
... stock's previous trading day's last sale price was greater than $100) in premium in each of the front... greater than $100) in premium across all expiration months in order to receive the rebate. The Exchange... fee is within the range of fees assessed by other exchanges employing similar pricing schemes and the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-16
... trading day's last sale price was greater than $100) in premium in each of the front two expiration months... options whose underlying stock's previous trading day's last sale price was greater than $100) in premium... is within the range of fees assessed by other exchanges employing similar pricing schemes. For...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-20
... trading day's last sale price was greater than $100) in premium in each of the front two expiration months... options whose underlying stock's previous trading day's last sale price was greater than $100) in premium... employing similar pricing schemes and in some cases, is lower that the fees assessed by other exchanges. For...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-29
... directed order flow to the Exchange. RMMs are not eligible to receive Directed Orders and therefore will... Priority Customer Accounts There will be no transaction fees assessed to EEMs entering orders for the account(s) of Priority Customers.\\10\\ Similarly, NYSEAmex and PHLX do not charge transaction fees for non...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-18
... Customer. The Marketing Fee is charged only in a Market Maker's assigned classes because it is in these... provided by the MIAX. Marketing Fee MIAX will assess a Marketing Fee to all MIAX Market Makers for..., on a monthly basis, disburse collected Marketing Fees to specific Electronic Exchange Members in...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-06
... assessed different fees than other indexes.\\21\\ In addition, the concept of offering a volume discount to.... This volume discount on trading Options on Treasury Securities will serve to increase order flow, which... options transaction charge. It is also reasonable and equitable to offer a floor volume discount on...
An Assessment of User Response to Phishing Attacks: The Effects of Fear and Self-Confidence
ERIC Educational Resources Information Center
House, Deanna
2013-01-01
Phishing attacks have threatened the security of both home users and organizations in recent years. Individuals of varying levels of computer proficiency are potential targets for a phishing attack; all that is needed is an email address and Internet access. Phishing uses social engineering to fraudulently obtain information that is confidential…
Pinto, Alexandra; Veríssimo, Manuela; Gatinho, Ana; Santos, António J; Vaughn, Brian E
2015-01-01
The present study aims to test Bowlby's suggestions concerning relations between the child's attachment quality with parents and subsequently constructed models of self-worth during early childhood. In most research on this question, attachment with mothers is considered in relation to self-worth but the child's attachment with fathers is not. Neither has the peer group been studied as an influence on child self-esteem, in the context of attachment research. This study addresses these relatively unstudied influences on child self-esteem. Attachment security to mother and father was measured by the Attachment Behavior Q-Set at two and half years of age. At five years of age social acceptance was measured using two sociometric techniques, and the self-esteem with the California Child Q-Sort. Our analyses indicated that security of the attachment to father and peer acceptance are both unique, significant predictors of the childrens' self-esteem. The security of the attachment to mother was also related to child self-esteem but did not emerge as a uniquely significant predictor. Peer acceptance appeared to moderate of the effect of the security of the attachment to father on the self-esteem of children. Our results extend the relatively sparse literature relating early attachments to self-esteem during early childhood.
Zeinali, Ali; Sharifi, Hassanpasha; Enayati, Mirsalahadine; Asgari, Parviz; Pasha, Gohlamreza
2011-01-01
BACKGROUND: The purpose of present study was to create and test a model that illustrates variables that influence the development of addiction susceptibility and determine how different styles of parenting may indirectly influence the addiction susceptibility of children through the mediators of attachment style and self-regulation. METHODS: Using random cluster sampling, 508 adolescent high school boys and girls aged 14-19 years were enrolled. Data were analyzed using structural equations modeling (path analysis). RESULTS: The results showed that authoritative and permissive parenting styles were associated with secure attachment whereas authoritarian and neglectful parenting styles were associated with insecure attachment. Insecure attachment was associated with a low level of self-regulation whereas secure attachment was associated with a high level of self-regulation. We found that a low level of self-regulation increased the adolescent's addiction susceptibility whereas a high level of self-regulation decreased their addiction susceptibility. CONCLUSIONS: The findings of present study suggest the authoritative and permissive parenting styles as the most efficient styles and authoritarian and neglectful parenting styles as the most inefficient styles in terms of addiction susceptibility. Accordingly, efficient parenting style training to parents should be the main goal of drug demand reduction program. PMID:22973379
20 CFR 703.304 - Filing of Agreement and Undertaking; deposit of security.
Code of Federal Regulations, 2010 CFR
2010-04-01
... REGULATIONS Authorization of Self-Insurers § 703.304 Filing of Agreement and Undertaking; deposit of security...) granting its application to self-insure and fixing the required security deposit amount (see § 703.303... laws of the United States and the rules and regulations governing bonding companies may act as sureties...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68076; File No. SR-FINRA-2012-047] Self.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder..., Inc. (``FINRA'') filed with the Securities and Exchange Commission (``SEC'' or ``Commission'') the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66941; File No. SR-CME-2012-06] Self-Regulatory... On March 9, 2012, Chicago Mercantile Exchange (``CME'') filed with the Securities and Exchange... Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder.\\2\\ The proposed rule change was...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67481; File No. SR-CBOE-2012-068] Self...) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is... ``CBOE'') filed with the Securities and Exchange Commission (the [[Page 43880
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-16
... 1974; Department of Homeland Security United States Citizenship and Immigration Services--DHS/USCIS... of Homeland Security/ United States Citizenship and Immigration Services--SORN DHS/USCIS--013 E-Verify Self Check System of Records.'' The U.S. Citizenship and Immigration Services E-Verify Self Check...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-11
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70990; File No. SR-MSRB-2013-08] Self...\\ Securities Exchange Act Release No. 70607 (October 3, 2013), 78 FR 62736 (``Notice''). II. Description of the... dealer, acting as an underwriter or remarketing agent with no prior or future long-term economic interest...
Campus Protective Services: A Self-Instructional Training Course for Campus Security Personnel.
ERIC Educational Resources Information Center
Mullendore, Philip
While most college campuses use non-sworn personnel, mostly students, to supplement regular security or peace officer personnel, there is no legal requirement or formal strategy for training these non-sworn officers. This handbook presents a self-instructional training course for non-sworn campus security personnel and was prepared to meet…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63955; File No. SR-ISE-2010-73] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Granting Approval of a Proposed Rule Change To Modify Qualified Contingent Cross Order Rules February 24, 2011. I. Introduction On July 14, 2010, the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71073; File No. SR-CBOE-2013-102] Self..., Incorporated (``Exchange'' or ``CBOE'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-30
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71178; File No. SR-CBOE-2013-107] Self..., Incorporated (the ``Exchange'' or ``CBOE'') filed with the Securities and Exchange Commission (the ``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act'') \\1\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70877; File No. SR-MIAX-2013-48] Self-Regulatory Organizations; Miami International Securities Exchange LLC; Notice of Filing and Immediate Effectiveness of a Proposed Rule Change To Amend MIAX Rules 1302, 1304 and the MIAX Options Fee Schedule...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-29
... Proposed Rule Change 1. Purpose (a) Background In light of well publicized securities frauds that resulted... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64954; File No. SR-FINRA-2010-036] Self...-Case Referrals July 25, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63066; File No. SR-OCC-2010-13] Self-Regulatory... to the Settlement Price of Exchange-Designated Security Futures for All Cash Dividends or Distributions Paid by the Issuer of the Underlying Security October 8, 2010. I. Introduction On August 19, 2010...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67621; File No. SR-FICC-2012-05] Self... Corporation (``FICC'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change SR-FICC-2012-05 pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'').\\1...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-31
... globalization of securities markets, cross-border coordination of trading and quotation halts is important to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68526; File No. SR-FINRA-2012-010] Self... Change To Amend FINRA Rule 6440 (Trading and Quotation Halt in OTC Equity Securities) December 21, 2012...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-17
... the Securities Committee with respect to determinations of corporate issuers to accelerate or defer... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69977; File No. SR-OCC-2013-05] Self-Regulatory..., Rather Than an Adjustment Panel of the Securities Committee, Will Determine Adjustments to the Terms of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-03
... distributions or other corporate actions, that affect the underlying security or other underlying interest... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69642; File No. SR-OCC-2013-05] Self-Regulatory..., Rather Than an Adjustment Panel of the Securities Committee, Will Determine Adjustments to the Terms of...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-01
... Matching System. See Securities Exchange Act Release No. 63564 (December 16, 2010), 75 FR 80870 (December... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65633; File No. SR-CHX-2011-29] Self-Regulatory... Chicago Stock Exchange, Inc. (``CHX'' or the ``Exchange'') filed with the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66528; File No. SR-FINRA-2012-014] Self... Requirements for Credit Default Swaps) March 7, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange..., 2012, Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66965; File No. SR-NYSEARCA-2012-38] Self... Change To Amend NYSE Arca Equities Rule 5.2(j)(1), the Exchange's ``Other Securities'' Listing Standard, To Delete a Provision Providing That If a Security Listed Under the Rule Contains Redemption...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70885; File No. SR-TOPAZ-2013-11] Self..., 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule... ISE Gemini) (the ``Exchange'' or ``Topaz'') filed with the Securities and Exchange Commission...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-23
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68253; File No. SR-ICC-2012-20] Self-Regulatory... Single Name Contract November 16, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of... Clear Credit LLC (``ICC'') filed with the Securities and Exchange Commission (``Commission'') the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63319; File No. SR-FINRA-2010-060] Self... Changes to Certain FINRA Rules November 16, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange..., 2010, Financial Industry Regulatory Authority, Inc. (``FINRA'') filed with the Securities and Exchange...
ERIC Educational Resources Information Center
Tokar, David M.; Withrow, Jason R.; Hall, Rosalie J.; Moradi, Bonnie
2003-01-01
Structural equation modeling was used to test theoretically based models in which psychological separation and attachment security variables were related to career indecision and those relations were mediated through vocational self-concept crystallization. Results indicated that some components of separation and attachment security did relate to…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-30
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63368; File No. SR-NSCC-2010-15] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change Relating to Establishing an Automated Service for the Processing of Transfers, Replacements, and Exchanges of Insurance and Retirement Products...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... Rule 5270 defines the term ``related financial instrument'' as ``any option, derivative, security-based... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70625; File No. SR-EDGA-2013-29] Self...) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-08
... eliminate references in Sections E.1 and E.8 to ``Derivative Securities Products'' (``DSPs'') and ``Non-Derivative Securities Products'' (``Non-DSPs'') and to eliminate references in Section E.1 to ``Regular... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69903; File No. SR-CHX-2013-12] Self-Regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-28
... Products with that of derivative securities products, like ETFs, that are listed on the Exchange. In this regard, the Exchange believes that derivative securities products and Structured Products share certain... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68280; File No. SR-NYSEArca-2012-127] Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-15
...-Location Fee Schedule Regarding Low Latency Network Connections; Correction AGENCY: Securities And Exchange Commission. ACTION: Notice; correction. SUMMARY: The Securities and Exchange Commission published a document... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65689A; File No. SR-Phlx-2011-142] Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-07
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65861; File No. SR-ISE-2011-77] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Network and Gateway Fees December 1, 2011. Pursuant to Section 19(b)(1) of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-03
... that, due to technical limitations in order management systems and routing networks, such member... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69643; File Nos. SR-BYX-2013-008] Self... the Securities and Exchange Commission (``Commission'') pursuant to Section 19(b)(1) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-31
...); ISE Semiconductors (BYT); ISE Electronic Trading (DMA); ISE-Revere Natural Gas (FUM); ISE Water (HHO... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63761; File No. SR-ISE-2011-04] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Establish a...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65583; File No. SR-ISE-2011-68] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend the Volume Threshold for Tier-Based Rebates for Qualified Contingent Cross Orders and Solicitation Orders Executed...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65898; File No. SR-ISE-2011-78] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Amend the Threshold Levels for Tier-Based Rebates for Qualified Contingent Cross Orders and Solicitation Orders Executed...
The Westgate Service and Related Referral, Assessment, and Treatment Processes.
Bennett, Alice L
2015-12-01
The formerly named "Dangerous and Severe Personality Disorder" (DSPD) units are no longer standalone services within the criminal justice system in England and Wales. These sites now provide personality disorder treatment services in the high-security prison estate as part of the new national Offender Personality Disorder (OPD) Pathway Strategy. The OPD Pathway intends to take responsibility for the assessment, treatment, and management of offenders who are likely to have a personality disorder and who present a high risk of re-offending (men and women) and serious harm to others (men). Further PD treatment and progression services are being commissioned in lower security prisons and in the community as part of the new PD Strategy. While the suitability criteria for the two male high-security PD treatment sites are the same, the individual units have their own assessment and treatment methods. This article aims to communicate the referral, assessment, and treatment methods employed within the prison-based Westgate Personality Disorder Treatment Service, HMP Frankland. © The Author(s) 2014.
Cvetkovic, Dean
2013-01-01
The Cooperative Learning in Engineering Design curriculum can be enhanced with structured and timely self and peer assessment teaching methodologies which can easily be applied to any Biomedical Engineering curriculum. A study was designed and implemented to evaluate the effectiveness of this structured and timely self and peer assessment on student team-based projects. In comparing the 'peer-blind' and 'face-to-face' Fair Contribution Scoring (FCS) methods, both had advantages and disadvantages. The 'peer-blind' self and peer assessment method would cause high discrepancy between self and team ratings. But the 'face-to-face' method on the other hand did not have the discrepancy issue and had actually proved to be a more accurate and effective, indicating team cohesiveness and good cooperative learning.
Bible, J; Emery, R J; Williams, T; Wang, S
2006-11-01
Limited permanent low-level radioactive waste (LLRW) disposal capacity and correspondingly high disposal costs have resulted in the creation of numerous interim storage facilities for either decay-in-storage operations or longer term accumulation efforts. These facilities, which may be near the site of waste generation or in distal locations, often were not originally designed for the purpose of LLRW storage, particularly with regard to security. Facility security has become particularly important in light of the domestic terrorist acts of 2001, wherein LLRW, along with many other sources of radioactivity, became recognized commodities to those wishing to create disruption through the purposeful dissemination of radioactive materials. Since some LLRW materials may be in facilities that may exhibit varying degrees of security control sophistication, a security vulnerabilities assessment tool grounded in accepted criminal justice theory and security practice has been developed. The tool, which includes dedicated sections on general security, target hardening, criminalization benefits, and the presence of guardians, can be used by those not formally schooled in the security profession to assess the level of protection afforded to their respective facilities. The tool equips radiation safety practitioners with the ability to methodically and systematically assess the presence or relative status of various facility security aspects, many of which may not be considered by individuals from outside the security profession. For example, radiation safety professionals might not ordinarily consider facility lighting aspects, which is a staple for the security profession since it is widely known that crime disproportionately occurs more frequently at night or in poorly lit circumstances. Likewise, the means and associated time dimensions for detecting inventory discrepancies may not be commonly considered. The tool provides a simple means for radiation safety professionals to assess, and perhaps enhance in a reasonable fashion, the security of their interim storage operations. Aspects of the assessment tool can also be applied to other activities involving the protection of sources of radiation as well.
Wood, Megan A; Bukowski, William M; Santo, Jonathan B
2017-01-01
A two-wave longitudinal study of 380 preadolescents (M age = 10.87) from largely middle-class schools in Montréal, Québec, Canada, assessed the hypothesis that friendship security, but not friendship intimacy, moderates the stability of anxiety during adolescence. This central but largely overlooked question about peer relations concerns which aspects of friendship account for the effects of friendship on emotional adjustment. Anxiety and friendship quality were measured via self-report questionnaires, employing the Network of Relationships Inventory for security and intimacy items. An index of friendship durability, which combined reciprocity and stability within first- and second-best friendship choices, was derived from sociometric measures. A latent variable path analysis examined with structural equation modeling showed that anxiety was less stable for children who perceived their friendships as secure. The moderating effect of intimacy was statistically nonsignificant. A follow-up analysis showed that the effects of security did not result from friendship durability. These findings provide support for the long-standing but previously unaddressed hypothesis that security, rather than intimacy, accounts for friendship's effect on anxiety reduction during early adolescence.
Agent of opportunity risk mitigation: people, engineering, and security efficacy.
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
2010-12-01
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63531; File No. SR-ISE-2010-109] Self... change, as described in Items I and II below, which items have been prepared by the self-regulatory... change from interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-14
... without having to retain legal counsel to assist them in the preparation of such disclosure. B. Self... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65292; File No. SR-MSRB-2011-15] Self... interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-24
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66827; File No. SR-ISE-2012-26] Self-Regulatory... Items I and II below, which Items have been prepared by the self- regulatory organization. The.... \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of the...
Measuring Global Water Security Towards Sustainable Development Goals
NASA Technical Reports Server (NTRS)
Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide
2016-01-01
Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience 'low water security' over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated-physical and socio-economic-approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term 'security' is conceptualized as a function of 'availability', 'accessibility to services', 'safety and quality', and 'management'. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.
Langford, Peter; Wolfe, Rory; Danks, R Andrew
2009-12-01
In this prospective randomized clinical trial, investigators looked at wound healing after craniotomy. The hypothesis was that the self-closing plastic scalp clips used for hemostasis on the skin edge might lead to localized microscopic tissue damage and subsequent delayed wound healing. The trial consisted of 2 arms in which different methods were used to secure scalp hemostasis: 1) the routinely used plastic clips (Scalpfix, Aesculap); and 2) the older method of artery forceps placed on the galea. Participants were restricted to those > 16 years of age undergoing craniotomies expected to last > 2 hours. Repeat operations were not included. One hundred fifty patients were enrolled. They were visited at 3 and 6 weeks postoperatively by an observer blinded to the method used, and the wounds were assessed for macroscopic epithelial closure, signs of infection, and hair regrowth by using a predefined assessment scale. The results showed no significant difference in wound healing between the 2 groups at either 3 weeks (OR 0.55, 95% CI 0.27-1.11; p = 0.09) or 6 weeks (OR 0.79, 95% CI 0.39-1.58; p = 0.50). The length of operation was found to be a significant factor affecting wound healing at 6 weeks (OR/hour 0.68, 95% CI 0.51-0.92; p = 0.01). The use of Aesculap Scalpfix self-retaining plastic scalp clips on the skin edge during craniotomy surgery does not appear to affect wound healing significantly to the postoperative 6-week mark.
MAC layer security issues in wireless mesh networks
NASA Astrophysics Data System (ADS)
Reddy, K. Ganesh; Thilagam, P. Santhi
2016-03-01
Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.
ERIC Educational Resources Information Center
Berry, Hugh G.; Ward, Michael; Caplan, Leslie
2012-01-01
Using data from the National Longitudinal Transition Study-2, this article examines the relationships among three of Wehmeyer's components of self-determination (autonomy, empowerment, and self-realization) and subsequent reported access to postsecondary education in transitioning youths receiving Supplemental Security Income benefits. Results of…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62175; File No. SR-MSRB-2010-03] Self... Relating to Amendments to the Continuing Disclosure Service of the MSRB's Electronic Municipal Market.... Self-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule Change The MSRB...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-10
...-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing and Immediate... CFR 240.19b-4(f)(2). I. Self-Regulatory Organization's Statement of the Terms of Substance of the...'s fee schedule. II. Self-Regulatory Organization's Statement of the Purpose of, and Statutory Basis...
Cantón-Cortés, David; Cantón, José; Cortés, María Rosario
2016-01-01
The Emotional Security Theory (EST) was originally developed to investigate the association between high levels of interparental conflict and child maladaptative outcome. The objective of the present study was to analyze the effects of emotional security in the family system on psychological distress among a sample of young female adult survivors of child sexual abuse (CSA). The role of emotional security was investigated through the interactive effects of a number of factors including the type of abuse, the continuity of abuse, the relationship with the perpetrator and the existence of disclosure for the abuse. Participants were 167 female survivors of CSA. Information about the abuse was obtained from a self-reported questionnaire. Emotional security was assessed with the Security in the Family System (SIFS) Scale, and the Symptom Checklist-90-Revised (SCL-90-R) was used to assess psychological distress. In the total sample, insecurity (preoccupation and disengagement) was correlated with high psychological distress scores, whereas no relationship was found between security and psychological distress. The relationship between emotional insecurity and psychological distress was stronger in cases of continued abuse and non-disclosure, while the relationship between emotional security and distress was stronger in cases of extrafamilial abuse and especially isolated or several incidents and when a disclosure had been made. No interactive effect was found between any of the three emotional variables and the type of abuse committed. The results of the current study suggest that characteristics of CSA such as relationship with the perpetrator and, especially, continuity of abuse and whether or not disclosure had been made, can affect the impact of emotional security on psychological distress of CSA survivors. Copyright © 2015 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Permadi, Ginanjar Setyo; Adi, Kusworo; Gernowo, Rahmad
2018-02-01
RSA algorithm give security in the process of the sending of messages or data by using 2 key, namely private key and public key .In this research to ensure and assess directly systems are made have meet goals or desire using a comprehensive evaluation methods HOT-Fit system .The purpose of this research is to build a information system sending mail by applying methods of security RSA algorithm and to evaluate in uses the method HOT-Fit to produce a system corresponding in the faculty physics. Security RSA algorithm located at the difficulty of factoring number of large coiled factors prima, the results of the prime factors has to be done to obtain private key. HOT-Fit has three aspects assessment, in the aspect of technology judging from the system status, the quality of system and quality of service. In the aspect of human judging from the use of systems and satisfaction users while in the aspect of organization judging from the structure and environment. The results of give a tracking system sending message based on the evaluation acquired.
Evaluation on Electronic Securities Settlements Systems by AHP Methods
NASA Astrophysics Data System (ADS)
Fukaya, Kiyoyuki; Komoda, Norihisa
Accompanying the spread of Internet and the change of business models, electronic commerce expands buisness areas. Electronic finance commerce becomes popular and especially online security tradings becoome very popular in this area. This online securitiy tradings have some good points such as less mistakes than telephone calls. In order to expand this online security tradings, the transfer of the security paper is one the largest problems to be solved. Because it takes a few days to transfer the security paper from a seller to a buyer. So the dematerialization of security papers is one of the solutions. The demterilization needs the information systems for setteling security. Some countries such as France, German, United Kingdom and U.S.A. have been strating the dematerialization projects. The legacy assesments on these projects focus from the viewpoint of the legal schemes only and there is no assessment from system architectures. This paper focuses on the information system scheme and valuates these dematerlization projects by AHP methods from the viewpoints of “dematerializaion of security papers", “speed of transfer", “usefulness on the system" and “accumulation of risks". This is the first case of valuations on security settlements systems by AHP methods, especially four counties’ systems.
Code of Federal Regulations, 2010 CFR
2010-04-01
... WORKERS' COMPENSATION ACT AND RELATED STATUTES INSURANCE REGULATIONS Authorization of Self-Insurers § 703...; interest thereon. Deposits of negotiable securities provided for by the regulations in this part shall be... will authorize the self-insurer to collect interest on the securities deposited by it unless any of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-24
...' Compensation Act requires a covered employer to secure the payment of compensation under the Act and its... insurance, or by becoming an authorized self-insured employer. See 33 U.S.C. 932. Each authorized insurance.... Similarly, each authorized self-insurer or employer seeking authorization is required fully to secure its...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-07
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62416; File No. SR-FINRA-2010-033] Self.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder.... (``FINRA'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67533; File No. SR-CME-2012-31] Self-Regulatory.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder...'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change described in...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68267; File No. SR-Phlx-2012-133] Self...) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby... Securities and Exchange Commission (``Commission'') the proposed rule change as described in Items I and II...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-24
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62125; File No. SR-ISE-2010-48] Self-Regulatory Organizations; Notice of Filing of Proposed Rule Change by International Securities Exchange LLC To Amend ISE Rule 2102 To Provide for a Trading Pause for Individual Securities When the Price Moves Ten Percent or...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Reports to Social Security Administration of earnings; wages; net earnings from self-employment. 404.452 Section 404.452 Employees' Benefits SOCIAL...; and Nonpayments of Benefits § 404.452 Reports to Social Security Administration of earnings; wages...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65054; File No. SR-ISE-2011-36] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Adopt the Content Outline for the Proprietary Traders Examination (Series 56) August 8, 2011. Pursuant to Section 19(b)(1...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-27
... Act because it helps to assure the safeguarding of securities and funds which are in its custody or... designated clearing organization; and (iii) the activity relating to the non-security clearing operations of... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67232; File No. SR-CME-2012-24] Self-Regulatory...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 20 Employees' Benefits 2 2011-04-01 2011-04-01 false Reports to Social Security Administration of earnings; wages; net earnings from self-employment. 404.452 Section 404.452 Employees' Benefits SOCIAL...; and Nonpayments of Benefits § 404.452 Reports to Social Security Administration of earnings; wages...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-01
... over the Internet); Securities Exchange Act Release No. 63197 (October 27, 2010), 75 FR 67791 (November... $200 to $600 per Internet port that is used to deliver market data); Securities Exchange Act Release No... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64964; File No. SR-EDGA-2011-22] Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69114; File No. SR-ISE-2013-18] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing of Proposed Rule Change To Address Order Handling Under the Options Order Protection and Locked/Crossed Market Plan, the Authority of the Exchange To Cancel Orders When a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70909; File No. SR-NYSE-2013-72] Self... 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3...'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70946; File No. SR-NSCC-2013-12] Self... Activity and Receive Notifications When Pre-Set Trading Limits are Reached November 26, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70358; File No. SR-FINRA-2013-031] Self...'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a proposed rule change to amend...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-23
... securities frauds that resulted in harm to investors, FINRA has reviewed its rule on arbitrator referrals and... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62930; File No. SR-FINRA-2010-036] Self... September 17, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-31
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71182; File No. SR-ISE-2013-71] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To More Specifically Address the Number and Size of Contra- Parties to a Qualified Contingent Cross Order December 24, 2013....
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-14
... occurred or is ongoing that has had a material effect on the market for the OTC Equity Security or has... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68874; File No. SR-FINRA-2012-010] Self... Change To Amend FINRA Rule 6440 (Trading and Quotation Halt in OTC Equity Securities) February 8, 2013. I...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69232; File No. SR-BX-2013-013] Self-Regulatory.... Introduction On February 6, 2013, NASDAQ OMX BX, Inc. (``Exchange'' or ``BX'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67956; File No. SR-Phlx-2013-42] Self... PHLX LLC (``Exchange'' or ``PHLX'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69755; File No. SR-NASDAQ-2013-070] Self... (``Exchange'' or ``NASDAQ'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61426; File No. SR-Phlx-2010-05] Self... Professional Orders January 26, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934... PHLX, Inc. (``Phlx'' or ``Exchange'') filed with the Securities and Exchange Commission (``SEC'' or...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69613; File No. SR-EDGA-2013-13] Self... 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3... with the Securities and Exchange Commission (the ``Commission'') the proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69233; File No. SR-NASDAQ-2013-028] Self... NASDAQ Stock Market LLC (``Exchange'' or ``NASDAQ'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-28
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69614; File No. SR-EDGX-2013-17] Self... 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3... with the Securities and Exchange Commission (the ``Commission'') the proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67294; File No. SR-PHLX-2012-68] Self.... Introduction On May 15, 2012, NASDAQ OMX PHLX LLC (``Exchange'' or ``PHLX'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65457; File No. SR-NYSEAmex-2011-63] Self... Routed by Archipelago Securities LLC in Its Capacity as a Facility of Affiliated Exchanges and To Clarify.... Introduction On August 18, 2011, NYSE Amex LLC (``NYSE Amex'' or ``Exchange'') filed with the Securities and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69229; File No. SR-Phlx-2013-15] Self... (``Exchange'' or ``PHLX'') filed with the Securities and Exchange Commission (``Commission''), pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ a...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-08
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69499; File No. SR-NASDAQ-2013-070] Self.... May 2, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2... LLC (the ``Exchange'' or ``Nasdaq'') filed with the Securities and Exchange Commission (the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68010; File No. SR-CBOE-2012-096] Self...(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice...'' or ``CBOE'') filed with the Securities and Exchange Commission (the ``Commission'') the proposed rule...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65806; File No. SR-NYSEArca-2011-88] Self.... Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder... Arca'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... organization, is engaged in a securities or kindred business that is controlled by a member or member... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70652; File No. SR-NYSE-2013-66] Self... The Exchange October 10, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-09
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61831; File No. SR-NYSEArca-2010-20] Self... Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2... with the Securities and Exchange Commission (the ``Commission'') the proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65805; File No. SR-NYSEAmex-2011-89] Self... to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2...'') filed with the Securities and Exchange Commission (``Commission'') the proposed rule change as described...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... member organization, who controls a member organization, is engaged in a securities or kindred business... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70653; File No. SR-NYSEMKT-2013-79] Self... the Exchange October 10, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70207; File No. SR-OCC-2013-12] Self-Regulatory...(b)(1) of the Securities Exchange Act of 1934 (``Act ''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on August 2, 2013, The Options Clearing Corporation (``OCC'') filed with the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-21
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69774; File No. SR-FICC-2013-06] Self... Program for Certain Government Securities Division Rules Relating to the GCF Repo[supreg] Service June 17, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act''),\\1\\ notice is...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-70831; File No. SR-FICC-2013-09] Self...[supreg] at FICC's Government Securities Division November 7, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that, on...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-26
... securities substitutions begin to be permitted, FICC will announce this to members by important notice. Other... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67227; File No. SR-FICC-2012-05] Self... Infrastructure Reform Task Force June 20, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-10
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69521; File No. SR-NASDAQ-2013-071] Self... Proposed Rule Change To Amend NASDAQ Rule 4763 May 6, 2013. Pursuant to Section 19(b)(1) of the Securities..., 2013, The NASDAQ Stock Market LLC (``NASDAQ'' or ``Exchange'') filed with the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-04
... Operations regarding a TRACE-Eligible Security when such security is not in the TRACE system, and to... using any facility or system that FINRA operates or controls.\\8\\ The fee is similar to the Computer-to... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64364; File No. SR-FINRA-2011-012] Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-11
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68829; File No. SR-NSCC-2012-10] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Designation of a Longer Period for Commission Action on Proposed Rule Change To Eliminate the Offset of Its Obligations With Institutional Delivery Transactions That Settle at The...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-14
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65917; File No. SR-Phlx-2011-143] Self... Commentary .01 to Rule 1009 Regarding Criteria for Listing an Option on an Underlying Covered Security December 8, 2011. On October 24, 2011, NASDAQ OMX PHLX LLC (``Phlx'') filed with the Securities and...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64424; File No. SR-FINRA-2011-023] Self... the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given... Securities and Exchange Commission (``SEC'' or ``Commission'') the proposed rule change as described in Items...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-02
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62787; File No. SR-FINRA-2010-045] Self... Effectiveness of Proposed Rule Change To Amend the Security Futures Risk Disclosure Statement August 27, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-03
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63960; File No. SR-FINRA-2011-008] Self... Public Quotation in an OTC Equity Security February 24, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Exchange Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-31
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67497; File No. SR-NYSEMKT-2012-25] Self... Market Securities To Be Traded on the Exchange Pursuant to a Grant of Unlisted Trading Privileges Until the Earlier of Securities and Exchange Commission Approval To Make Such Pilot Permanent or January 31...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66134; File No. SR-NYSE-2011-68] Self... Proposed Rule Change Amending NYSE Rule 80C, Which Provides for Trading Pauses in Individual Securities Due... January 11, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act''),\\1...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-08
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68561; File No. SR-NYSEMKT-2012-86] Self... Market (``Nasdaq'') Securities To Be Traded on the Exchange Pursuant to a Grant of Unlisted Trading Privileges January 2, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69262; File No. SR-FINRA-2013-019] Self... Effectiveness of a Proposed Rule Change Relating to FINRA Rule 0180 (Application of Rules to Security-Based Swaps) April 1, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68468; File No. SR-FINRA-2012-055] Self...-Element Continuing Education Program To Qualify To Engage in a Security Futures Business December 19, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'')\\1\\ and Rule 19b-4 thereunder...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-30
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66040; File No. SR-NYSEAmex-2011-104] Self... Nasdaq Stock Market Securities To Be Traded on the Exchange Pursuant to a Grant of Unlisted Trading Privileges Until the Earlier of Securities and Exchange Commission Approval To Make Such Pilot Permanent or...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69814; File No. SR-NYSEMKT-2013-53] Self... Market Securities To Be Traded on the Exchange Pursuant to a Grant of Unlisted Trading Privileges Until the Earlier of Securities and Exchange Commission Approval To Make Such Pilot Permanent or January 31...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-05
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69890; File No. SR-NSCC-2013-05] Self-Regulatory Organizations; National Securities Clearing Corporation; Order Approving Proposed Rule Change To Require That All Locked-In Trade Data Submitted to It for Trade Recording Be Submitted in Real-time June 28, 2013. I. Introduction On April 30, 2013,...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66880; File No. SR-ISE-2012-16] Self-Regulatory Organizations; International Securities Exchange, LLC; Order Approving a Proposed Rule Change Relating to Procedures for Executing the Stock Leg(s) of Stock-Option Orders April 30, 2012. I. Introduction On February 29, 2012, the International...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 20 Employees' Benefits 2 2012-04-01 2012-04-01 false Reports to Social Security Administration of earnings; wages; net earnings from self-employment. 404.452 Section 404.452 Employees' Benefits SOCIAL...; and Nonpayments of Benefits § 404.452 Reports to Social Security Administration of earnings; wages...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 20 Employees' Benefits 2 2014-04-01 2014-04-01 false Reports to Social Security Administration of earnings; wages; net earnings from self-employment. 404.452 Section 404.452 Employees' Benefits SOCIAL...; and Nonpayments of Benefits § 404.452 Reports to Social Security Administration of earnings; wages...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... disseminated as required (Rule 4120(a)(9)); a halt in a Derivative Securities Product (as defined in Rule 4120... trading halt in a Derivative Security Product traded pursuant to unlisted trading privileges for which a... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69563; File No. SR-NASDAQ-2013-073] Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-15
....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular....0022/share in all Derivative Securities Products priced $1.00/share or more executed in the Regular... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68894; File No. SR-CHX-2013-06] Self-Regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-09
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66084; File No. SR-ISE-2011-84] Self-Regulatory Organizations; International Securities Exchange, LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Relating to Fees for Certain Complex Orders Executed on the Exchange January 3, 2012. Pursuant to Section 19(b)(1) of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-02
... without harming investors or the public interest. \\6\\ 15 U.S.C. 78f(b)(5). B. Self-Regulatory Organization... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64343; File No. SR-ISE-2011-26] Self-Regulatory.... \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization's Statement of the...
Marfeo, Elizabeth E; Ni, Pengsheng; McDonough, Christine; Peterik, Kara; Marino, Molly; Meterko, Mark; Rasch, Elizabeth K; Chan, Leighton; Brandt, Diane; Jette, Alan M
2018-03-01
Purpose To improve the mental health component of the Work Disability Functional Assessment Battery (WD-FAB), developed for the US Social Security Administration's (SSA) disability determination process. Specifically our goal was to expand the WD-FAB scales of mood & emotions, resilience, social interactions, and behavioral control to improve the depth and breadth of the current scales and expand the content coverage to include aspects of cognition & communication function. Methods Data were collected from a random, stratified sample of 1695 claimants applying for the SSA work disability benefits, and a general population sample of 2025 working age adults. 169 new items were developed to replenish the WD-FAB scales and analyzed using factor analysis and item response theory (IRT) analysis to construct unidimensional scales. We conducted computer adaptive test (CAT) simulations to examine the psychometric properties of the WD-FAB. Results Analyses supported the inclusion of four mental health subdomains: Cognition & Communication (68 items), Self-Regulation (34 items), Resilience & Sociability (29 items) and Mood & Emotions (34 items). All scales yielded acceptable psychometric properties. Conclusions IRT methods were effective in expanding the WD-FAB to assess mental health function. The WD-FAB has the potential to enhance work disability assessment both within the context of the SSA disability programs as well as other clinical and vocational rehabilitation settings.
Jones, Jason D; Cassidy, Jude
2014-01-01
The secure base construct represents one of attachment theory's most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents' self-reported attachment styles relate to parental secure base provision and adolescent (mean age = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers', as well as mothers', attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers' self-reported hostile behavior toward their adolescents and through adolescents' less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers' self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research.
Guetterman, Timothy C; Creswell, John W; Wittink, Marsha; Barg, Fran K; Castro, Felipe G; Dahlberg, Britt; Watkins, Daphne C; Deutsch, Charles; Gallo, Joseph J
2017-01-01
Demand for training in mixed methods is high, with little research on faculty development or assessment in mixed methods. We describe the development of a self-rated mixed methods skills assessment and provide validity evidence. The instrument taps six research domains: "Research question," "Design/approach," "Sampling," "Data collection," "Analysis," and "Dissemination." Respondents are asked to rate their ability to define or explain concepts of mixed methods under each domain, their ability to apply the concepts to problems, and the extent to which they need to improve. We administered the questionnaire to 145 faculty and students using an internet survey. We analyzed descriptive statistics and performance characteristics of the questionnaire using the Cronbach alpha to assess reliability and an analysis of variance that compared a mixed methods experience index with assessment scores to assess criterion relatedness. Internal consistency reliability was high for the total set of items (0.95) and adequate (≥0.71) for all but one subscale. Consistent with establishing criterion validity, respondents who had more professional experiences with mixed methods (eg, published a mixed methods article) rated themselves as more skilled, which was statistically significant across the research domains. This self-rated mixed methods assessment instrument may be a useful tool to assess skills in mixed methods for training programs. It can be applied widely at the graduate and faculty level. For the learner, assessment may lead to enhanced motivation to learn and training focused on self-identified needs. For faculty, the assessment may improve curriculum and course content planning.
Davoren, Mary; O'Dwyer, Sarah; Abidin, Zareena; Naughton, Leena; Gibbons, Olivia; Doyle, Elaine; McDonnell, Kim; Monks, Stephen; Kennedy, Harry G
2012-07-13
We examined whether new structured professional judgment instruments for assessing need for therapeutic security, treatment completion and recovery in forensic settings were related to moves from higher to lower levels of therapeutic security and added anything to assessment of risk. This was a prospective naturalistic twelve month observational study of a cohort of patients in a forensic hospital placed according to their need for therapeutic security along a pathway of moves from high to progressively less secure units in preparation for discharge. Patients were assessed using the DUNDRUM-1 triage security scale, the DUNDRUM-3 programme completion scale and the DUNDRUM-4 recovery scale and assessments of risk of violence, self harm and suicide, symptom severity and global function. Patients were subsequently observed for positive moves to less secure units and negative moves to more secure units. There were 86 male patients at baseline with mean follow-up 0.9 years, 11 positive and 9 negative moves. For positive moves, logistic regression indicated that along with location at baseline, the DUNDRUM-1, HCR-20 dynamic and PANSS general symptom scores were associated with subsequent positive moves. The receiver operating characteristic was significant for the DUNDRUM-1 while ANOVA co-varying for both location at baseline and HCR-20 dynamic score was significant for DUNDRUM-1. For negative moves, logistic regression showed DUNDRUM-1 and HCR-20 dynamic scores were associated with subsequent negative moves, along with DUNDRUM-3 and PANSS negative symptoms in some models. The receiver operating characteristic was significant for the DUNDRUM-4 recovery and HCR-20 dynamic scores with DUNDRUM-1, DUNDRUM-3, PANSS general and GAF marginal. ANOVA co-varying for both location at baseline and HCR-20 dynamic scores showed only DUNDRUM-1 and PANSS negative symptoms associated with subsequent negative moves. Clinicians appear to decide moves based on combinations of current and imminent (dynamic) risk measured by HCR-20 dynamic score and historical seriousness of risk as measured by need for therapeutic security (DUNDRUM-1) in keeping with Scott's formulation of risk and seriousness. The DUNDRUM-3 programme completion and DUNDRUM-4 recovery scales have utility as dynamic measures that can off-set perceived 'dangerousness'.
Exploring Robust and Resilient Pathways to Water Security (Invited)
NASA Astrophysics Data System (ADS)
Brown, C. M.
2013-12-01
Lack of water security and the resultant cumulative effects of water-related hazards are understood to hinder economic growth throughout the world. Traditional methods for achieving water security as exemplified in the industrialized world have exerted negative externalities such as degradation of aquatic ecosystems. There is also growing concern that such methods may not be robust to climate variability change. It has been proposed that alternative pathways to water security must be followed in the developing world. However, it is not clear such pathways currently exist and there is an inherent moral hazard in such recommendations. This presentation will present a multidimensional definition of water security, explore the conflict in norms between engineering and ecologically oriented communities, and present a framework synthesizing those norms for assessing and innovating robust and resilient pathways to water security.
What do prisoners eat? Nutrient intakes and food practices in a high-secure prison.
Hannan-Jones, Mary; Capra, Sandra
2016-04-01
There are limited studies on the adequacy of prisoner diet and food practices, yet understanding these are important to inform food provision and assure duty of care for this group. The aim of this study was to assess the dietary intakes of prisoners to inform food and nutrition policy in this setting. This research used a cross-sectional design with convenience sampling in a 945-bed male high-secure prison. Multiple methods were used to assess food available at the group level, including verification of food portion, quality and practices. A pictorial tool supported the diet history method. Of 276 eligible prisoners, 120 dietary interviews were conducted and verified against prison records, with 106 deemed plausible. The results showed the planned food to be nutritionally adequate, with the exception of vitamin D for older males and long-chain fatty acids, with Na above upper limits. The Australian dietary targets for chronic disease risk were not achieved. High energy intakes were reported with median 13·8 (se 0·3) MJ. Probability estimates of inadequate intake varied with age groups: Mg 8 % (>30 years), 2·9 % (70 years), 1·5 % (<70 years); folate 3·5 %; Zn and I 2·7 %; and vitamin A 2·3 %. Nutrient intakes were greatly impacted by self-funded snacks. Results suggest the intakes to be nutritionally favourable when compared with males in the community. This study highlights the complexity of food provision in the prison environment and also poses questions for population-level dietary guidance in delivering appropriate nutrients within energy limits.
ERIC Educational Resources Information Center
McLear, Caitlin; Trentacosta, Christopher J.; Smith-Darden, Joanne
2016-01-01
Research Findings: Early reading and mathematics skills predict later academic success, and child self-regulation and secure parent-child relationships are both predictors of early academic skills. Self-regulatory and family relationship factors have rarely been studied together as predictors of early academic success in populations of young…
Code of Federal Regulations, 2010 CFR
2010-04-01
... RELATED STATUTES INSURANCE REGULATIONS Authorization of Self-Insurers § 703.308 Substitution and withdrawal of indemnity bond, letters of credit or negotiable securities. (a) A self-insurer may not... regulations in this part. The self-insurer must file with its application a sworn statement setting forth— (1...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-08
... waive FICC's rules, procedures, and regulations of the Mortgage-Backed Securities Division. II. Self... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62796; File No. SR-FICC-2010-06] Self... Proposed Rule Change To Amend Rules Relating to Authority To Waive Rules, Procedures, and Regulations of...
NASA Astrophysics Data System (ADS)
Abdenov, A. Zh; Trushin, V. A.; Abdenova, G. A.
2018-01-01
The paper considers the questions of filling the relevant SIEM nodes based on calculations of objective assessments in order to improve the reliability of subjective expert assessments. The proposed methodology is necessary for the most accurate security risk assessment of information systems. This technique is also intended for the purpose of establishing real-time operational information protection in the enterprise information systems. Risk calculations are based on objective estimates of the adverse events implementation probabilities, predictions of the damage magnitude from information security violations. Calculations of objective assessments are necessary to increase the reliability of the proposed expert assessments.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-17
... greater than $100) in premium in each of the front two expiration months and 80% of the time for series... previous trading day's last sale price was greater than $100) in premium across all expiration months in... allocated because the fee is within the range of fees assessed by other exchanges employing similar pricing...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-31
... Floor broker that executes against the Book is not charged (i.e., it is free),\\10\\ both for a security... being assessed for the following intraday transactions: For a Floor broker discretionary e-Quote (``d...'') trading on the Exchange pursuant to a grant of unlisted trading privileges (``UTP''); \\3\\ \\3\\ See, e.g...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-05
... organizations that are not transacting business on the Exchange a Permit Fee of $7,500 per month. A member or member organization is assessed the $7,500 Permit Fee for not transacting business on the Exchange if... Fee, or Account Fee. See Securities Exchange Act Release No. 61863 (April 7, 2010), 75 FR 20021 (April...
Peine, Arne; Kabino, Klaus; Spreckelsen, Cord
2016-06-03
Modernised medical curricula in Germany (so called "reformed study programs") rely increasingly on alternative self-instructed learning forms such as e-learning and curriculum-guided self-study. However, there is a lack of evidence that these methods can outperform conventional teaching methods such as lectures and seminars. This study was conducted in order to compare extant traditional teaching methods with new instruction forms in terms of learning effect and student satisfaction. In a randomised trial, 244 students of medicine in their third academic year were assigned to one of four study branches representing self-instructed learning forms (e-learning and curriculum-based self-study) and instructed learning forms (lectures and seminars). All groups participated in their respective learning module with standardised materials and instructions. Learning effect was measured with pre-test and post-test multiple-choice questionnaires. Student satisfaction and learning style were examined via self-assessment. Of 244 initial participants, 223 completed the respective module and were included in the study. In the pre-test, the groups showed relatively homogenous scores. All students showed notable improvements compared with the pre-test results. Participants in the non-self-instructed learning groups reached scores of 14.71 (seminar) and 14.37 (lecture), while the groups of self-instructed learners reached higher scores with 17.23 (e-learning) and 15.81 (self-study). All groups improved significantly (p < .001) in the post-test regarding their self-assessment, led by the e-learning group, whose self-assessment improved by 2.36. The study shows that students in modern study curricula learn better through modern self-instructed methods than through conventional methods. These methods should be used more, as they also show good levels of student acceptance and higher scores in personal self-assessment of knowledge.
Long, Clive G; Banyard, Ellen; Fulton, Barbara; Hollin, Clive R
2014-09-01
Arson and fire-setting are highly prevalent among patients in secure psychiatric settings but there is an absence of valid and reliable assessment instruments and no evidence of a significant approach to intervention. To develop a semi-structured interview assessment specifically for fire-setting to augment structured assessments of risk and need. The extant literature was used to frame interview questions relating to the antecedents, behaviour and consequences necessary to formulate a functional analysis. Questions also covered readiness to change, fire-setting self-efficacy, the probability of future fire-setting, barriers to change, and understanding of fire-setting behaviour. The assessment concludes with indications for assessment and a treatment action plan. The inventory was piloted with a sample of women in secure care and was assessed for comprehensibility, reliability and validity. Staff rated the St Andrews Fire and Risk Instrument (SAFARI) as acceptable to patients and easy to administer. SAFARI was found to be comprehensible by over 95% of the general population, to have good acceptance, high internal reliability, substantial test-retest reliability and validity. SAFARI helps to provide a clear explanation of fire-setting in terms of the complex interplay of antecedents and consequences and facilitates the design of an individually tailored treatment programme in sympathy with a cognitive-behavioural approach. Further studies are needed to verify the reliability and validity of SAFARI with male populations and across settings.
Increasing security through public health: a practical model.
Parker, R David
2011-01-01
As political and social changes sweep the globe, there are opportunities to increase national security through innovative approaches. While traditional security methods such as defense forces and homeland security provide both pre-emptive and defensive protection, new methods could meet emerging challenges by responding to the political, financial, and social trends. One method is the integration of defense, medicine and public health. By assisting a nation by providing basic services, such as healthcare, collaborative efforts can increase stabilization in areas of unrest. Improved health outcomes leads to increased domestic security, which can create a ripple effect across a region. Assessment, uptake and sustainability by the host nation are critical for program success. The proposed methodology focuses on the use of primarily extant resources, such as programs used by Special Operations Forces and other health and defense programs. Additional components include evaluation, set objectives and mission collaborations. As the nexus between foreign affairs, security, and public health is increasingly validated through research and practice, standardized interventions should be developed to minimize overlapping expenditures, promote security and strengthen international relations. 2011.
NASA Astrophysics Data System (ADS)
Festiyed; Djamas, D.; Pilendia, D.
2018-04-01
The purpose of this study is to enhance the problem solving and self-management abilities of student teachers through individual and group authentic task. Preliminary results showed that the learning outcomes in high category, nevertheless problem solving and self-management abilities are still low and average categories (scattered at interval 40 ≤ N ≤ 65). Initiative to improve this condition is needed. Action research is the alternative solution for that condition through planning, acting, evaluating, and reflecting. This study is allowed in 4 cycles. The acting step result with integrated discuss method, case study, and presentation including self-assessment for individual and group. This method was effective to enhance problem solving and self-management abilities. The final learning outcomes seen from the correlation between student self-assessment and lecture-assessment (r=0.19). Its means there are unidirectional relationship between the result of self-assessment and lecture-assessment. The Conclusion of the research was effective to enhance problem solving and self-management ability.
Usefulness of Self-Report Instruments in Assessing Men Accused of Domestic Violence
ERIC Educational Resources Information Center
Helfritz, Laura E.; Stanford, Matthew S.; Conklin, Sarah M.; Greve, Kevin W.; Villemarette-Pittman, Nicole R.; Houston, Rebecca J.
2006-01-01
Clinical assessment of domestic violence has traditionally relied on self-report methods of data collection, using structured interviews and lengthy questionnaires such as the MMPI-2. However, in certain situations such as court-ordered domestic violence evaluations, information obtained through self-report methods may be tainted because of…
Barrero, Lope H; Katz, Jeffrey N; Dennerlein, Jack T
2012-01-01
Objectives To describe the relation of the measured validity of self-reported mechanical demands (self-reports) with the quality of validity assessments and the variability of the assessed exposure in the study population. Methods We searched for original articles, published between 1990 and 2008, reporting the validity of self-reports in three major databases: EBSCOhost, Web of Science, and PubMed. Identified assessments were classified by methodological characteristics (eg, type of self-report and reference method) and exposure dimension was measured. We also classified assessments by the degree of comparability between the self-report and the employed reference method, and the variability of the assessed exposure in the study population. Finally, we examined the association of the published validity (r) with this degree of comparability, as well as with the variability of the exposure variable in the study population. Results Of the 490 assessments identified, 75% used observation-based reference measures and 55% tested self-reports of posture duration and movement frequency. Frequently, validity studies did not report demographic information (eg, education, age, and gender distribution). Among assessments reporting correlations as a measure of validity, studies with a better match between the self-report and the reference method, and studies conducted in more heterogeneous populations tended to report higher correlations [odds ratio (OR) 2.03, 95% confidence interval (95% CI) 0.89–4.65 and OR 1.60, 95% CI 0.96–2.61, respectively]. Conclusions The reported data support the hypothesis that validity depends on study-specific factors often not examined. Experimentally manipulating the testing setting could lead to a better understanding of the capabilities and limitations of self-reported information. PMID:19562235
Salloch, Sabine
2018-06-05
Dual Use Research of Concern (DURC) constitutes a major challenge for research practice and oversight on the local, national and international level. The situation in Germany is shaped by two partly competing suggestions of how to regulate security-related research: The German Ethics Council, as an independent political advisory body, recommended a series of measures, including national legislation on DURC. Competing with that, the German National Academy of Sciences and the German Research Foundation, as two major professional bodies, presented a strategy which draws on the self-control of science and, inter alia, suggests expanding the scope of research ethics committees (RECs) to an evaluation of DURC. This situation is taken as an occasion to further discuss the scope and limits of professional self-control with respect to security-related research. The role of RECs as professional bodies of science is particularly analyzed, referring to the theoretical backgrounds of professionalism. Two key sociological features of professionalism - ethical orientation and professional self-control - are discussed with respect to the practice of biomedical science. Both attributes are then analyzed with respect to the assessment of DURC by RECs. In conclusion, it is stated that issues of biosecurity transcend the boundaries of the scientific community and that a more comprehensive strategy should be implemented encompassing both professional self-control and legal oversight.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64906; File No. SR-NYSEArca-2011-49] Self... Operate Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64905; File No. SR-NYSEArca-2011-50] Self... Operate Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68268; File No. SR-BX-2012-072] Self-Regulatory... Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on November 15, 2012, NASDAQ OMX BX, Inc. (``BX'' or the ``Exchange'') filed with the Securities and Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-03
... securities and funds which are in the custody or control of such clearing agency or for which it is... assure the safeguarding of securities and funds which are in its custody or control or for which it is... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-65655; File No. SR-CME-2011-07] Self-Regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-18
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67838; File No. SR-NYSEMKT-2012-46] Self-Regulatory Organizations; NYSE MKT LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change Amending Rule 993NY by Adding a New Paragraph (c) That Addresses the Authority of the Exchange or Archipelago Securities LLC (``Arca Securities'')...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-08
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69498; File No. SR-Phlx-2013-42] Self... Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4 thereunder,\\3\\ notice is hereby given that, on April 23, 2013, NASDAQ OMX PHLX LLC (the ``Exchange'' or ``Phlx'') filed with the Securities and...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69952; File No. SR-NYSEMKT-2013-61] Self... Stock Market Securities Traded on the Exchange Pursuant to A Grant of Unlisted Trading Privileges July 9, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'') \\1\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68009; File No. SR-C2-2012-035] Self-Regulatory... Securities Exchange Act of 1934 (the ``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that... Securities and Exchange Commission (the ``Commission'') the proposed rule change as described in Items I, II...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68020; File No. SR-CBOE-2012-094] Self... Change To Update Its Rule 31.10--Corporate Governance--in Order To Comply With New Rule 10C- 1 Under the Securities Exchange Act of 1934 October 9, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... securities. The marketplaces operated by OTC Markets Group Inc. include OTCQX, OTCQB and OTC Pink. II. Self... Premises in Certain OTC Bulletin Board and OTC Markets Securities May 19, 2011. Pursuant to Section 19(b)(1... approved booth premises in certain OTC Bulletin Board (``OTCBB'') and OTC Markets \\4\\ securities. The text...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-14
... other things, the issuer of the debt security must have at least one class of common or preferred equity... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64287; File No. SR-NYSE-2011-15] Self... 1401 To Modify the Initial Trading Market Value for Debt Securities April 8, 2011. Pursuant to Section...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-20
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69571; File No. SR-NSCC-2013-05] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Proposed Rule Change, as Modified by Amendment No. 1, To Require that All Locked-in Trade Data Submitted to It for Trade Recording be Submitted in Real-Time May 14, 2013....
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-11
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69699; File No. SR-NSCC-2013-805] Self-Regulatory Organizations; National Securities Clearing Corporation; Notice of Filing of Advance Notice, as Modified by Amendment No. 1, To Require That All Locked-in Trade Data Submitted to It for Trade Recording Be Submitted in Real-time June 5, 2013....
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-04
... Derivative Security products under NSX Rule 15.9. Proposed Rule 11.1(c) provides for the benefit of ETP... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62601; File No. SR-NSX-2010-09] Self-Regulatory... Hours July 29, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (the ``Act...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-14
... organization could not trade in an index-based or derivative security (e.g., a right or warrant) that is quoted... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64844; File No. SR-NYSEAmex-2011-34] Self... Premises in Certain OTC Bulletin Board and OTC Markets Securities July 8, 2011. I. Introduction On May 11...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-14
... an index-based or derivative security (e.g., a right or warrant) that is quoted on the OTCBB or OTC... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64843; File No. SR-NYSE-2011-22] Self... Premises in Certain OTC Bulletin Board and OTC Markets Securities July 8, 2011. I. Introduction On May 11...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-27
... market and to protect investors (Rule 3100(a)(2)); a halt in a Derivative Securities Product (as defined... Release No. 67091 (May 31, 2012), 77 FR 33498 (June 6, 2012). a trading halt in a Derivative Security... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69817; File No. SR-Phlx-2013-66] Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71169; File No. SR-PHLX-2013-127] Self-Regulatory Organizations; NASDAQ OMX PHLX LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Modify the Definition of ``System Securities'' in PSX Rule 3301(b) December 20, 2013. Pursuant to Section 19(b)(1) of the Securities...
A slippery molecular assembly allows water as a self-erasable security marker
Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K.; Ajayaghosh, Ayyappanpillai
2015-01-01
Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication. PMID:25940779
A slippery molecular assembly allows water as a self-erasable security marker.
Thirumalai, Rajasekaran; Mukhopadhyay, Rahul Dev; Praveen, Vakayil K; Ajayaghosh, Ayyappanpillai
2015-05-05
Protection of currency and valuable documents from counterfeit continues to be a challenge. While there are many embedded security features available for document safety, they are not immune to forgery. Fluorescence is a sensitive property, which responds to external stimuli such as solvent polarity, temperature or mechanical stress, however practical use in security applications is hampered due to several reasons. Therefore, a simple and specific stimuli responsive security feature that is difficult to duplicate is of great demand. Herein we report the design of a fluorescent molecular assembly on which water behaves as a self-erasable security marker for checking the authenticity of documents at point of care. The underlying principle involves the disciplined self-assembly of a tailor-made fluorescent molecule, which initially form a weak blue fluorescence (λem = 425 nm, Φf = 0.13) and changes to cyan emission (λem = 488 nm,Φf = 0.18) in contact with water due to a reversible molecular slipping motion. This simple chemical tool, based on the principles of molecular self-assembly and fluorescence modulation, allows creation of security labels and optically masked barcodes for multiple documents authentication.
NASA Astrophysics Data System (ADS)
Akerson, Valarie L.; Buzzelli, Cary A.; Eastwood, Jennifer
2010-03-01
This paper describes research that compares preservice early childhood teachers’ cultural values and the values they believe are held by scientists. Using the Schwartz Values Inventory (SVI) (Schwartz (1992) Adv Exp Soc Psychol 25:331-351) preservice early childhood teachers cultural values were assessed, followed by an assessment of the values they believed were held by scientists. Schwartz postulated that cultural values could be aggregated into 11 domains (universalism, benevolence, tradition, self-direction, stimulation, hedonism, achievement, power, conformity, spirituality, and security). Paired T-tests indicated significant differences between preservice early childhood teachers’ cultural values from those they believed scientists held on the domains of power, achievement, stimulation, benevolence, conformity, and security. The discussion explores the meaning of these results and provides implications for early childhood science teacher education.
Couch, Kenneth A; Tamborini, Christopher R; Reznik, Gayle L
2015-10-01
We provide new evidence on the long-term impact of divorce on work disability among U.S. men. Using data from the 2004 Survey of Income and Program Participation linked to U.S. Social Security Administration records, we assess the relationship between divorce and subsequent self-reports of work limitations and the receipt of federal disability benefits. The examination of self-reports and administrative records of medically qualified benefits provides dual confirmation of key relationships. We compare men who experienced a marital dissolution between 1975 and 1984 with continuously married men for 20 years following divorce using fixed-effects and propensity score matching models, and choose a sample to help control for selection into divorce. On average, we find that divorce is not associated with an increased probability of self-reported work limitations or receipt of disability benefits over the long run. However, among those who do not remarry, we do find that divorce increases men's long-term probability of both self-reported work limitations and federal disability benefit receipt. Lack of marital resources may drive this relationship. Alternative estimates that do not control for selection into divorce demonstrate that selection bias can substantially alter findings regarding the relationship between marital status changes and subsequent health.
Homeland Security Research Improves the Nation's Ability to ...
Technical Brief Homeland Security (HS) Research develops data, tools, and technologies to minimize the impact of accidents, natural disasters, terrorist attacks, and other incidents that can result in toxic chemical, biological or radiological (CBR) contamination. HS Research develops ways to detect contamination, sampling strategies, sampling and analytical methods, cleanup methods, waste management approaches, exposure assessment methods, and decision support tools (including water system models). These contributions improve EPA’s response to a broad range of environmental disasters.
Guetterman, Timothy C.; Creswell, John W.; Wittink, Marsha; Barg, Fran K.; Castro, Felipe G.; Dahlberg, Britt; Watkins, Daphne C.; Deutsch, Charles; Gallo, Joseph J.
2017-01-01
Introduction Demand for training in mixed methods is high, with little research on faculty development or assessment in mixed methods. We describe the development of a Self-Rated Mixed Methods Skills Assessment and provide validity evidence. The instrument taps six research domains: “Research question,” “Design/approach,” “Sampling,” “Data collection,” “Analysis,” and “Dissemination.” Respondents are asked to rate their ability to define or explain concepts of mixed methods under each domain, their ability to apply the concepts to problems, and the extent to which they need to improve. Methods We administered the questionnaire to 145 faculty and students using an internet survey. We analyzed descriptive statistics and performance characteristics of the questionnaire using Cronbach’s alpha to assess reliability and an ANOVA that compared a mixed methods experience index with assessment scores to assess criterion-relatedness. Results Internal consistency reliability was high for the total set of items (.95) and adequate (>=.71) for all but one subscale. Consistent with establishing criterion validity, respondents who had more professional experiences with mixed methods (e.g., published a mixed methods paper) rated themselves as more skilled, which was statistically significant across the research domains. Discussion This Self-Rated Mixed Methods Assessment instrument may be a useful tool to assess skills in mixed methods for training programs. It can be applied widely at the graduate and faculty level. For the learner, assessment may lead to enhanced motivation to learn and training focused on self-identified needs. For faculty, the assessment may improve curriculum and course content planning. PMID:28562495
Code of Federal Regulations, 2011 CFR
2011-01-01
... child is eligible for continued annuity because the child is incapable of self-support if the Social Security Administration finds that the child is eligible for continued social security child's benefits because the child is incapable of self-support. ...
Code of Federal Regulations, 2010 CFR
2010-01-01
... child is eligible for continued annuity because the child is incapable of self-support if the Social Security Administration finds that the child is eligible for continued social security child's benefits because the child is incapable of self-support. ...
Indicators of economic security of the region: a risk-based approach to assessing and rating
NASA Astrophysics Data System (ADS)
Karanina, Elena; Loginov, Dmitri
2017-10-01
The article presents the results of research of theoretical and methodical problems of strategy development for economic security of a particular region, justified by the composition of risk factors. The analysis of those risk factors is performed. The threshold values of indicators of economic security of regions were determined using the methods of socioeconomic statistics. The authors concluded that in modern Russian conditions it is necessary to pay great attention to the analysis of the composition and level of indicators of economic security of the region and, based on the materials of this analysis, to formulate more accurate decisions concerning the strategy of socio-economic development.
Team-based assessment of professional behavior in medical students
RAEE, HOJAT; AMINI, MITRA; MOMEN NASAB, AMENEH; MALEK POUR, ABDOLRASOUL; JAFARI, MOHAMMAD MORAD
2014-01-01
Introduction: Self and peer assessment provides important information about the individual’s performance and behavior in all aspects of their professional environment work. The aim of this study is to evaluate the professional behavior and performance in medical students in the form of team based assessment. Methods: In a cross-sectional study, 100 medical students in the 7th year of education were randomly selected and enrolled; for each student five questionnaires were filled out, including one self-assessment, two peer assessments and two residents assessment. The scoring system of the questionnaires was based on seven point Likert scale. After filling out the questions in the questionnaire, numerical data and written comments provided to the students were collected, analyzed and discussed. Internal consistency (Cronbach’s alpha) of the questionnaires was assessed. A p<0.05 was considered as significant level. Results: Internal consistency was acceptable (Cronbach’s alpha 0.83). Interviews revealed that the majority of students and assessors interviewed found the method acceptable. The range of scores was 1-6 (Mean±SD=4.39±0.57) for the residents' assessment, 2-6 (Mean±SD= 4.49±0.53) for peer assessment, and 3-7 (Mean±SD=5.04±0.32) for self-assessment. There was a significant difference between self assessment and other methods of assessment. Conclusions: This study demonstrates that a team-based assessment is an acceptable and feasible method for peer and self-assessment of medical students’ learning in a clinical clerkship, and has some advantages over traditional assessment methods. Further studies are needed to focus on the strengths and weaknesses. PMID:25512933
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63971; File No. SR-NYSEARCA-2011-05] Self... 201 of Regulation SHO Under the Securities Exchange Act of 1934 February 25, 2011. Pursuant to Section... described in Items I and II below, which Items have been substantially prepared by the self- regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63977; File No. SR-NYSE-2011-05] Self... of Regulation SHO Under the Securities Exchange Act of 1934 February 25, 2011. Pursuant to Section 19... change as described in Items I and II below, which Items have been substantially prepared by the self...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63974; File No. SR-NYSEAMEX-2011-08] Self... Regulation SHO Under the Securities Exchange Act of 1934 February 25, 2011. Pursuant to Section 19(b)(1) \\1... II below, which Items have been substantially prepared by the self- regulatory organization. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68801; File No. SR-NYSEMKT-2013-11] Self... of Regulation NMS Under the Act February 1, 2013. Pursuant to Section 19(b)(1) \\1\\ of the Securities... have been prepared by the self-regulatory organization. The Commission is publishing this notice to...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-15
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63499; File No. SR-BX-2010-087] Self-Regulatory... Quote Management Procedures December 9, 2010. Pursuant to Section 19(b)(1) of the Securities Exchange...-4(f)(6). I. Self-Regulatory Organization's Statement of the Terms of Substance of the Proposed Rule...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64931; File No. SR-ISE-2011-41] Self-Regulatory... Rule Change Relating to the Extension of the Price Improvement Mechanism Pilot Program July 20, 2011...). \\4\\ 17 CFR 240.19b-4(f)(6). I. Self-Regulatory Organization's Statement of the Terms of Substance of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-17
... opportunities for price improvement. B. Self-Regulatory Organization's Statement on Burden on Competition C2... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66384; File No. SR-C2-2012-006] Self-Regulatory... Automated Improvement Mechanism February 13, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-07-23
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62513; File No. SR-ISE-2010-75] Self-Regulatory... Rule Change Relating to the Extension of the Price Improvement Mechanism Pilot Program July 16, 2010...)(3)(A). \\4\\ 17 CFR 240.19b-4(f)(6). I. Self-Regulatory Organization's Statement of the Terms of...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-19
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-67202; File No. SR-ISE-2012-54] Self-Regulatory... Rule Change Relating to the Extension of the Price Improvement Mechanism Pilot Program June 14, 2012... described in Items I and II below, which items have been prepared by the self-regulatory organization. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-01
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69853; File No. SR-ISE-2013-41] Self-Regulatory... Rule Change To Extend the Price Improvement Mechanism Pilot Program June 25, 2013. Pursuant to Section... described in Items I and II below, which items have been prepared by the self-regulatory organization. The...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-25
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62316; File No. SR-ISE-2010-15] Self-Regulatory... Rule Change, as Modified by Amendment Nos. 1 and 2, Related to the Price Improvement Mechanism June 17.... 2 replaces and supersedes the original filing and Amendment No. 1 thereto in their entirety. I. Self...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-29
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-68709; File No. SR-NYSE-2013-04] Self... Improvement Orders in a Non-RLP Capacity for Securities to Which the RLP Is Not Assigned January 23, 2013... in Items I and II below, which Items have been prepared by the self-regulatory organization. The...
Electronic Engineering Technology Program Exit Examination as an ABET and Self-Assessment Tool
ERIC Educational Resources Information Center
Thomas, Gary; Darayan, Shahryar
2018-01-01
Every engineering, computing, and engineering technology program accredited by the Accreditation Board for Engineering and Technology (ABET) has formulated many and varied self-assessment methods. Methods used to assess a program for ABET accreditation and continuous improvement are for keeping programs current with academic and industrial…
Methodological considerations and future insights for 24-hour dietary recall assessment in children.
Foster, Emma; Bradley, Jennifer
2018-03-01
Dietary assessment has come under much criticism of late to the extent that it has been questioned whether self-reported methods of dietary assessment are worth doing at all. Widespread under-reporting of energy intake, limitations due to memory, changes to intake due to the burden of recording and social desirability bias all impact significantly on the accuracy of the dietary information collected. Under-reporting of energy intakes has long been recognized as a problem in dietary research with doubly labeled water measures of energy expenditure uncovering significant under-reporting of energy intakes across different populations and different dietary assessment methods. In this review we focus on dietary assessment with children with particular attention on the 24-hour dietary recall method. We look at the level of under-reporting of energy intakes and how this tends to change with age, gender and body mass index. We discuss potential alternatives to self-reported (or proxy-reported) dietary assessment methods with children, such as biomarkers, and how these do not enable the collection of information important to public health nutrition such as the cooking method, the mixture of foods eaten together or the context in which the food is consumed. We conclude that despite all of the challenges and flaws, the data collected using self-reported dietary assessment methods are extremely valuable. Research into dietary assessment methodology has resulted in significant increases in our understanding of the limitations of self-reported methods and progressive improvements in the accuracy of the data collected. Hence, future investment in dietary surveillance and in improving self-reported methods of intake can make vital contributions to our understanding of dietary intakes and are thus warranted. Copyright © 2017 Elsevier Inc. All rights reserved.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64907; File No. SR-NYSEAmex-2011-53] Self... Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64908; File No. SR-NYSEAmex-2011-52] Self... Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-22
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64904; File No. SR-NYSE-2011-34] Self... Consistent With the Requirements of Rule 15c3-5 Under the Securities Exchange Act of 1934 July 18, 2011. Pursuant to Section 19(b)(1) \\1\\ of the Securities Exchange Act of 1934 (the ``Act'') \\2\\ and Rule 19b-4...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-16
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-62685; File No. SR-OCC-2010-12] Self-Regulatory... Interest and Principal Securities on Treasury Inflation Protected Securities, Commonly Known as TIP-STRIPS... change from interested parties. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 15 U.S.C. 78s(b)(3)(A)(i). \\3\\ 17 CFR 240...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-27
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-71168; File No. SR-BX-2013-064] Self-Regulatory Organizations; NASDAQ OMX BX, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change to Modify the Definition of ``System Securities'' in BX Rule 4751(b) December 20, 2013. Pursuant to Section 19(b)(1) of the Securities Exchange...
Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks
Pinto, Mónica; Gámez, Nadia; Fuentes, Lidia; Amor, Mercedes; Horcas, José Miguel; Ayala, Inmaculada
2015-01-01
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applications for WSNs need mechanisms for self-adaptation and for self-protection based on the dynamic adaptation of the algorithms used to provide security. Dynamic software product lines (DSPLs) allow managing both variability and dynamic software adaptation, so they can be considered a key technology in successfully developing self-protected WSN applications. In this paper, we propose a self-protection solution for WSNs based on the combination of the INTER-TRUST security framework (a solution for the dynamic negotiation and deployment of security policies) and the FamiWare middleware (a DSPL approach to automatically configure and reconfigure instances of a middleware for WSNs). We evaluate our approach using a case study from the intelligent transportation system domain. PMID:25746093
Joo, Young Min; Choe, Jin Ho
2010-01-01
Purpose We compared the efficacy and safety of two minimally invasive sling procedures used to treat female stress urinary incontinence (SUI), tension-free vaginal tape (TVT) SECUR® and CureMesh®, and assessed the 1-year surgical outcomes. Materials and Methods Sixty women with SUI were assigned to undergo either the TVT SECUR (n=38) or CureMesh (n=22) procedures between April 2007 and June 2008. Patients were monitored via outpatient visits at 1 month, 3 months, and 1 year after surgery. The efficacy of these procedures was evaluated by the cough test or by a urodynamic study. At these postoperative visits, the patients also completed several questionnaires, including incontinence quality of life, patient's perception of urgency severity, the scored form of the Bristol Female Lower Urinary Tract Symptoms, visual analog scale, and questions about perceived benefit, satisfaction, and willingness to undergo the same operation again. The objective cure rate was defined as no leakage during the cough test with a full bladder. The subjective cure rate was evaluated by self-assessment of goal achievement performed 1 year postoperatively. Results The two groups were similar in preoperative characteristics and urodynamic parameters. The objective cure rates were similar between TVT SECUR and CureMesh (68.4% vs. 77.3%). All respondents reported improvement after surgery. There were no intra-operative complications. Conclusions Our results showed that the TVT SECUR and CureMesh procedures are both safe and simple to perform and have no significant differences in efficacy. Comparative studies with long-term follow-up are warranted to determine the true efficacy of these procedures. PMID:20495697
NASA Astrophysics Data System (ADS)
Skapare, I.; Kreslins, A.; Cers, A.
2016-09-01
Latvia currently is self-sufficient in energy resources up to approximately 35 %. Annual fossil energy prices rise and risks of security of energy supply promote the development legislation in the matter of renewable resources. One of the Latvian Ministry of Economics' recent products is a new draft law called the "Renewable Energy Law", which has been created due to one of the European Union and Latvian national energy policy objectives: to increase the share of renewable energy up to 40 % by 2020 (Moore and Vanags, 2012). Currently, geothermal energy potential is assessed at 1 × 1013 kWh; nevertheless, it is difficult for geothermal energy to compete with other renewable energy resources in the Latvian energy market. A great job has been done in recent years at the legislative branch to choose the right methods for supporting the use of renewable energy resources. This paper aims is analysis of current situation and assessment of Latvian legislation possibilities to promote the use of geothermal energy.
Measuring the emotional climate of an organization.
Yurtsever, Gülçimen; De Rivera, Joseph
2010-04-01
The importance of emotional climate in the organizational climate literature has gained interest. However, few studies have concentrated on adequately measuring the emotional climate of organizations. In this study, a reliable and valid scale was developed to measure the most important aspects of emotional climate in different organizations. This study presents evidence of reliability and validity for 28 items constructed to measure emotional climate in an organization in four separate studies. The data were obtained from working people from four different organizations by self-administered questionnaires. The findings indicate that three factors--Trust, Hope, and Security--were factors of the 28-item scale. Validation data also included correlations with duration of employment. The other method of assessing criterion validity was by comparing mean scores in organizations with differing productivity; results indicated that the organization with more productive members had a significantly higher mean score on emotional climate and its subscales. The generalizability of the results to private businesses also was assessed.
del Prado, Alicia M.; Church, A. Timothy; Katigbak, Marcia S.; Miramontes, Lilia G.; Whitty, Monica; Curtis, Guy J.; de Jesús Vargas-Flores, José; Ibáñez-Reyes, Joselina; Ortiz, Fernando A.; Reyes, Jose Alberto S.
2007-01-01
Three theoretical perspectives on cultural universals and differences in the content of self-concepts were tested in individualistic (United States, n = 178; Australia, n = 112) and collectivistic (Mexico, n = 157; Philippines, n = 138) cultures, using three methods of self-concept assessment. Support was found for both trait perspectives and the individual-self-primacy hypothesis. In contrast, support for cultural psychology hypotheses was limited because traits and other personal attributes were not more salient, or social attributes less salient, in individualistic cultures than collectivistic cultures. The salience of some aspects of self-concept depended on the method of assessment, calling into question conclusions based on monomethod studies. PMID:19050737
Del Prado, Alicia M; Church, A Timothy; Katigbak, Marcia S; Miramontes, Lilia G; Whitty, Monica; Curtis, Guy J; de Jesús Vargas-Flores, José; Ibáñez-Reyes, Joselina; Ortiz, Fernando A; Reyes, Jose Alberto S
2007-12-01
Three theoretical perspectives on cultural universals and differences in the content of self-concepts were tested in individualistic (United States, n = 178; Australia, n = 112) and collectivistic (Mexico, n = 157; Philippines, n = 138) cultures, using three methods of self-concept assessment. Support was found for both trait perspectives and the individual-self-primacy hypothesis. In contrast, support for cultural psychology hypotheses was limited because traits and other personal attributes were not more salient, or social attributes less salient, in individualistic cultures than collectivistic cultures. The salience of some aspects of self-concept depended on the method of assessment, calling into question conclusions based on monomethod studies.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-27
.... NSCC believes it can offer a number of control improvements to the current manual, decentralized, and...: Electronic Comments Use the Commission's Internet comment form ( http://www.sec.gov/rules/sro.shtml ); or... one method. The Commission will post all comments on the Commission's Internet Web site ( http://www...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-10
... rule change to provide a new method of calculating the Trading Activity Fee (``TAF'') for transactions... calculating the TAF \\4\\ for transactions in Asset-Backed Securities.\\5\\ The TAF is one of the member... monitoring; and FINRA's policymaking, rulemaking, and enforcement activities.\\6\\ Generally, the TAF is...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... securities. \\5\\ The exemption in FINRA Rule 6730(e)(4) is conditioned, among other things, upon a data... the Act,\\6\\ which requires, among other things, that FINRA rules must be designed to prevent... following methods: Electronic Comments Use the Commission's Internet comment form ( http://www.sec.gov/rules...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-11-23
... the Exchange's Web site http://www.ise.com , at the principal office of the Exchange, and at the...'') and various forms of alternative trading systems (``ATSs''), including dark pools and electronic..., please use only one method. The Commission will post all comments on the Commissions Internet Web site...
Galbally, Javier; Marcel, Sébastien; Fierrez, Julian
2014-02-01
To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
NASA Astrophysics Data System (ADS)
Santos, Abel; Law, Cheryl Suwen; Pereira, Taj; Losic, Dusan
2016-04-01
Herein, we present a method for storing binary data within the spectral signature of nanoporous anodic alumina photonic crystals. A rationally designed multi-sinusoidal anodisation approach makes it possible to engineer the photonic stop band of nanoporous anodic alumina with precision. As a result, the transmission spectrum of these photonic nanostructures can be engineered to feature well-resolved and selectively positioned characteristic peaks across the UV-visible spectrum. Using this property, we implement an 8-bit binary code and assess the versatility and capability of this system by a series of experiments aiming to encode different information within the nanoporous anodic alumina photonic crystals. The obtained results reveal that the proposed nanosized platform is robust, chemically stable, versatile and has a set of unique properties for data storage, opening new opportunities for developing advanced nanophotonic tools for a wide range of applications, including sensing, photonic tagging, self-reporting drug releasing systems and secure encoding of information.Herein, we present a method for storing binary data within the spectral signature of nanoporous anodic alumina photonic crystals. A rationally designed multi-sinusoidal anodisation approach makes it possible to engineer the photonic stop band of nanoporous anodic alumina with precision. As a result, the transmission spectrum of these photonic nanostructures can be engineered to feature well-resolved and selectively positioned characteristic peaks across the UV-visible spectrum. Using this property, we implement an 8-bit binary code and assess the versatility and capability of this system by a series of experiments aiming to encode different information within the nanoporous anodic alumina photonic crystals. The obtained results reveal that the proposed nanosized platform is robust, chemically stable, versatile and has a set of unique properties for data storage, opening new opportunities for developing advanced nanophotonic tools for a wide range of applications, including sensing, photonic tagging, self-reporting drug releasing systems and secure encoding of information. Electronic supplementary information (ESI) available: Further details about anodisation profiles, SEM cross-section images, digital pictures, transmission spectra, photonic barcodes and ASCII codes of the different NAA photonic crystals fabricated and analysed in our study. See DOI: 10.1039/c6nr01068g
Evaluation of Course-Specific Self-Efficacy Assessment Methods.
ERIC Educational Resources Information Center
Bong, Mimi
A study was conducted to compare three methods of assessing course-level self-efficacy beliefs within a multitrait multimethod (MTMM) framework. The methods involved: (1) successfully performing a number of domain-related tasks; (2) obtaining specific letter grades in the course; and (3) successfully performing generic academic tasks in the…
Team-based assessment of professional behavior in medical students.
Raee, Hojat; Amini, Mitra; Momen Nasab, Ameneh; Malek Pour, Abdolrasoul; Jafari, Mohammad Morad
2014-07-01
Self and peer assessment provides important information about the individual's performance and behavior in all aspects of their professional environment work. The aim of this study is to evaluate the professional behavior and performance in medical students in the form of team based assessment. In a cross-sectional study, 100 medical students in the 7(th) year of education were randomly selected and enrolled; for each student five questionnaires were filled out, including one self-assessment, two peer assessments and two residents assessment. The scoring system of the questionnaires was based on seven point Likert scale. After filling out the questions in the questionnaire, numerical data and written comments provided to the students were collected, analyzed and discussed. Internal consistency (Cronbach's alpha) of the questionnaires was assessed. A p<0.05 was considered as significant level. Internal consistency was acceptable (Cronbach's alpha 0.83). Interviews revealed that the majority of students and assessors interviewed found the method acceptable. The range of scores was 1-6 (Mean±SD=4.39±0.57) for the residents' assessment, 2-6 (Mean±SD= 4.49±0.53) for peer assessment, and 3-7 (Mean±SD=5.04±0.32) for self-assessment. There was a significant difference between self assessment and other methods of assessment. This study demonstrates that a team-based assessment is an acceptable and feasible method for peer and self-assessment of medical students' learning in a clinical clerkship, and has some advantages over traditional assessment methods. Further studies are needed to focus on the strengths and weaknesses.
Jones, Jason D.; Cassidy, Jude
2014-01-01
The secure base construct is a core aspect of attachment theory and, according to Bowlby (1988), represents one of attachment theory’s most important contributions to our understanding of parent-child relationships and child development. The present study represents the first examination of how parents’ self-reported attachment styles relate to parental secure base provision and adolescent (Mage = 16.6 years, SE = .59) secure base use during an observed parent-adolescent interaction. Further, the present study is the first to examine how fathers’, as well as mothers’, attachment styles relate to observed behavior in a parent-child interaction. At the bivariate level, maternal avoidance, but not anxiety, was negatively associated with observed adolescent secure base use. In addition, path analysis revealed that maternal avoidance was indirectly related to less adolescent secure base use through mothers’ self-reported hostile behavior toward their adolescents and through adolescents’ less positive perceptions of their mothers. Further, paternal anxiety, but not avoidance, was indirectly related to less adolescent secure base use through fathers’ self-reported hostile behavior toward their adolescents. No significant findings emerged in relation to parental secure base provision. We discuss these results in the context of attachment theory and suggest directions for future research. PMID:24897927
Young, Maria-Elena De Trinidad; Madrigal, Daniel S
2017-01-01
Undocumented status is rarely measured in health research, yet it influences the lives and well-being of immigrants. The growing body of research on undocumented status and health shows the need to assess the measurement of this legal status. We discuss the definition of undocumented status, conduct a systematic review of the methodological approaches currently taken to measure undocumented status of immigrants in the USA, and discuss recommendations for advancement of measurement methods. We conducted a systematic review of 61 studies indexed in PubMed, conducted in the USA, and published from 2004 to 2014. We categorized each of the studies' data source and type, measurement type, and information for classifying undocumented participants. Studies used self-reported or proxy measures of legal status. Information to classify undocumented participants included self-reported status, possession of a Social Security number, possession of health insurance or institutional resources, concern about deportation, and participant characteristics. Findings show it is feasible to collect self-reported measures of undocumented status. We recommend that researchers collect self-reported measures of undocumented status whenever possible and limit the use of proxy measures. Validated and standardized measures are needed for within and across country measurement. Authors should provide methodological information about measurement in publications. Finally, individuals who are undocumented should be included in the development of these methodologies. This systematic review is not registered.
77 FR 16846 - Published Privacy Impact Assessments on the Web
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-22
... Security Advanced Research Projects Agency (HSARPA), S&T Directorate seeks to develop physiological and behavioral screening technologies that will enable security officials to test the effectiveness of current... FAST research is adding a new type of research, the Passive Methods for Precision Behavioral Screening...
Chemaitelly, Hiam; Kanaan, Caroline; Beydoun, Hind; Chaaya, Monique; Kanaan, Mona; Sibai, Abla M
2013-08-01
To examine gender variations in the association of self-rated health (SRH) with social capital, social support, and economic security among older adults from three deprived communities in the suburbs of metropolitan Beirut. A population-based cross-sectional study using the Older Adult Component of the Urban Health Survey. Face-to-face interviews were conducted with 328 older men and 412 older women aged 60 years and above. SRH was assessed by a single question and treated as a dichotomous outcome, and several indicators of social capital, social support, and economic security were examined as independent variables. Women were significantly more likely to report poor SRH compared to men (37.2 vs. 25.9 %, respectively). Better social capital indicators decreased significantly the odds of poor SRH among both men (OR = 0.76, 95 % CI: 0.65-0.89) and women (OR = 0.71, 95 % CI: 0.62-0.82). Social support was strongly associated with SRH among women (OR = 0.56), but not among men (OR = 0.94). The reverse situation was observed for economic security (OR = 0.57 among men, OR = 0.80 among women). In these deprived neighborhoods, social and economic factors may have gender-specific effects on the promotion of well-being among older adults, with social support being more salient to women's SRH and economic security being more salient to men's SRH. In health studies among older people, SRH captures not only social and physical health but also broader economic well-being.
Starr, Lisa R.; Hammen, Constance; Brennan, Patricia A.; Najman, Jake
2012-01-01
Previous research demonstrates that carriers of the short allele of the serotonin transporter gene (5-HTTLPR) show both greater susceptibility to depression in response to stressful life events and higher rates of generation of stressful events in response to depression. The current study examines relational security (i.e., self-reported beliefs about attachment security) as a moderator of these effects, building on emerging research suggesting that the short allele acts as a marker of sensitivity to the social environment. Participants were 354 Caucasian adolescents oversampled for maternal depression (137 male, 217 female), assessed at ages 15 and 20. Results indicated that the short allele predicted increased stress generation at age 20 among those with low age 15 security but decreased stress generation among those with high security, and revealed a three-way interaction between age 15 depression, age 15 security, and genotype, where depression predicted stress generation only among short allele carriers with low security. Further, among boys only, security interacted with genotype to predict longitudinal changes in depression diagnosis, with the s-allele predicting relative increases in probability of depression among boys with low security but decreases among boys with high security. Results support the notion of the short allele as a marker of social reactivity, and suggest that attachment security may buffer against the genetic vulnerability introduced by the short allele, in line with predictions of the differential susceptibility theory. PMID:23080078
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-10
... rate of $0.10 per contract in SPY options and $0.00 per contract in IWM options. CBOE proposes to assess the marketing fee at the rate of $0.25 per contract in SPY options and IWM options, which is... Securities Exchange Act of 1934 (``Act''),\\1\\ and Rule 19b-4 thereunder,\\2\\ notice is hereby given that on...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66385; File No. SR-NYSEAmex-2012-03] Self-Regulatory Organizations; NYSE Amex LLC; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Provide for ``Self-Trade Prevention'' on the Exchange February 13, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 ...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-17
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-66386; File No. SR-NYSEArca-2012-08] Self-Regulatory Organizations; NYSE Arca, Inc.; Notice of Filing and Immediate Effectiveness of Proposed Rule Change To Provide for ``Self-Trade Prevention'' on the Exchange February 13, 2012. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 193...
Ormerod, Thomas C; Dando, Coral J
2015-02-01
Current aviation security systems identify behavioral indicators of deception to assess risks to flights, but they lack a strong psychological basis or empirical validation. We present a new method that tests the veracity of passenger accounts. In an in vivo double-blind randomized-control trial conducted in international airports, security agents detected 66% of deceptive passengers using the veracity test method compared with less than 5% using behavioral indicator recognition. As well as revealing advantages of veracity testing over behavioral indicator identification, the study provides the highest levels to date of deception detection in a realistic setting where the known base rate of deceptive individuals is low.
NASA Astrophysics Data System (ADS)
Li, Wei; Liu, Yan-Ju; Yang, Zhifeng
2012-02-01
The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.
Li, Wei; Liu, Yan-ju; Yang, Zhifeng
2012-02-01
The Great Western Development Strategy (GWDS) is a long term national campaign aimed at boosting development of the western area of China and narrowing the economic gap between the western and the eastern parts of China. The Strategic Environmental Assessment (SEA) procedure was employed to assess the environmental challenges brought about by the western development plans. These plans include five key developmental domains (KDDs): water resource exploitation and use, land utilization, energy generation, tourism development, and ecological restoration and conservation. A combination of methods involving matrix assessment, incorporation of expert judgment and trend analysis was employed to analyze and predict the environmental impacts upon eight selected environmental indicators: water resource availability, soil erosion, soil salinization, forest destruction, land desertification, biological diversity, water quality and air quality. Based on the overall results of the assessment, countermeasures for environmental challenges that emerged were raised as key recommendations to ensure ecological security during the implementation of the GWDS. This paper is intended to introduce a consensus-based process for evaluating the complex, long term pressures on the ecological security of large areas, such as western China, that focuses on the use of combined methods applied at the strategic level.
20 CFR 703.310 - Authority to seize security deposit; use and/or return of proceeds.
Code of Federal Regulations, 2010 CFR
2010-04-01
... INSURANCE REGULATIONS Authorization of Self-Insurers § 703.310 Authority to seize security deposit; use and... section when a self-insurer— (1) Defaults on any of its LHWCA obligations; (2) Fails to renew any...
Chen, Cory K; Waters, Harriet Salatas; Hartman, Marilyn; Zimmerman, Sheryl; Miklowitz, David J; Waters, Everett
2013-01-01
This study explores links between adults' attachment representations and the task of caring for elderly parents with dementia. Participants were 87 adults serving as primary caregivers of a parent or parent-in-law with dementia. Waters and Waters' ( 2006 ) Attachment Script Assessment was adapted to assess script-like attachment representation in the context of caring for their elderly parent. The quality of adult-elderly parent interactions was assessed using the Level of Expressed Emotions Scale (Cole & Kazarian, 1988 ) and self-report measures of caregivers' perception of caregiving as difficult. Caregivers' secure base script knowledge predicted lower levels of negative expressed emotion. This effect was moderated by the extent to which participants experienced caring for elderly parents as difficult. Attachment representations played a greater role in caregiving when caregiving tasks were perceived as more difficult. These results support the hypothesis that attachment representations influence the quality of care that adults provide their elderly parents. Clinical implications are discussed.
USDA-ARS?s Scientific Manuscript database
Current methods for assessing children's dietary intake, such as interviewer-administered 24-h dietary recall (24-h DR), are time consuming and resource intensive. Self-administered instruments offer a low-cost diet assessment method for use with children. The present study assessed the validity of ...
Self-referenced continuous-variable measurement-device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Wang, Yijun; Wang, Xudong; Li, Jiawei; Huang, Duan; Zhang, Ling; Guo, Ying
2018-05-01
We propose a scheme to remove the demand of transmitting a high-brightness local oscillator (LO) in continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, which we call as the self-referenced (SR) CV-MDI QKD. We show that our scheme is immune to the side-channel attacks, such as the calibration attacks, the wavelength attacks and the LO fluctuation attacks, which are all exploiting the security loopholes introduced by transmitting the LO. Besides, the proposed scheme waives the necessity of complex multiplexer and demultiplexer, which can greatly simplify the QKD processes and improve the transmission efficiency. The numerical simulations under collective attacks show that all the improvements brought about by our scheme are only at the expense of slight transmission distance shortening. This scheme shows an available method to mend the security loopholes incurred by transmitting LO in CV-MDI QKD.
Self-assessed performance improves statistical fusion of image labels
Bryan, Frederick W.; Xu, Zhoubing; Asman, Andrew J.; Allen, Wade M.; Reich, Daniel S.; Landman, Bennett A.
2014-01-01
Purpose: Expert manual labeling is the gold standard for image segmentation, but this process is difficult, time-consuming, and prone to inter-individual differences. While fully automated methods have successfully targeted many anatomies, automated methods have not yet been developed for numerous essential structures (e.g., the internal structure of the spinal cord as seen on magnetic resonance imaging). Collaborative labeling is a new paradigm that offers a robust alternative that may realize both the throughput of automation and the guidance of experts. Yet, distributing manual labeling expertise across individuals and sites introduces potential human factors concerns (e.g., training, software usability) and statistical considerations (e.g., fusion of information, assessment of confidence, bias) that must be further explored. During the labeling process, it is simple to ask raters to self-assess the confidence of their labels, but this is rarely done and has not been previously quantitatively studied. Herein, the authors explore the utility of self-assessment in relation to automated assessment of rater performance in the context of statistical fusion. Methods: The authors conducted a study of 66 volumes manually labeled by 75 minimally trained human raters recruited from the university undergraduate population. Raters were given 15 min of training during which they were shown examples of correct segmentation, and the online segmentation tool was demonstrated. The volumes were labeled 2D slice-wise, and the slices were unordered. A self-assessed quality metric was produced by raters for each slice by marking a confidence bar superimposed on the slice. Volumes produced by both voting and statistical fusion algorithms were compared against a set of expert segmentations of the same volumes. Results: Labels for 8825 distinct slices were obtained. Simple majority voting resulted in statistically poorer performance than voting weighted by self-assessed performance. Statistical fusion resulted in statistically indistinguishable performance from self-assessed weighted voting. The authors developed a new theoretical basis for using self-assessed performance in the framework of statistical fusion and demonstrated that the combined sources of information (both statistical assessment and self-assessment) yielded statistically significant improvement over the methods considered separately. Conclusions: The authors present the first systematic characterization of self-assessed performance in manual labeling. The authors demonstrate that self-assessment and statistical fusion yield similar, but complementary, benefits for label fusion. Finally, the authors present a new theoretical basis for combining self-assessments with statistical label fusion. PMID:24593721
Rauer, Amy J; Volling, Brenda L
2007-01-01
Data from a survey of 200 young adults assessed whether the early nonshared environment, specifically parental differential treatment, was associated with romantic relationship distress through its effects on sibling jealousy, attachment styles, and self-esteem. Individuals who received equal affection from their parents in comparison to their sibling reported equal jealousy between themselves and their sibling, had higher self-esteem, more secure attachment styles, and less romantic relationship distress. Receiving differential parental affection, regardless of whether the participant or their sibling was favored, was associated with more negative models of self and others, which in turn were associated with greater romantic relationship distress. Results indicate that early within-family experiences may be particularly relevant for later healthy romantic relationship functioning.
Rauer, Amy J.; Volling, Brenda L.
2009-01-01
Data from a survey of 200 young adults assessed whether the early nonshared environment, specifically parental differential treatment, was associated with romantic relationship distress through its effects on sibling jealousy, attachment styles, and self-esteem. Individuals who received equal affection from their parents in comparison to their sibling reported equal jealousy between themselves and their sibling, had higher self-esteem, more secure attachment styles, and less romantic relationship distress. Receiving differential parental affection, regardless of whether the participant or their sibling was favored, was associated with more negative models of self and others, which in turn were associated with greater romantic relationship distress. Results indicate that early within-family experiences may be particularly relevant for later healthy romantic relationship functioning. PMID:19050748
NASA Astrophysics Data System (ADS)
Humber, M. L.; Becker-Reshef, I.; Nordling, J.; Barker, B.; McGaughey, K.
2014-12-01
The GEOGLAM Crop Monitor's Crop Assessment Tool was released in August 2013 in support of the GEOGLAM Crop Monitor's objective to develop transparent, timely crop condition assessments in primary agricultural production areas, highlighting potential hotspots of stress/bumper crops. The Crop Assessment Tool allows users to view satellite derived products, best available crop masks, and crop calendars (created in collaboration with GEOGLAM Crop Monitor partners), then in turn submit crop assessment entries detailing the crop's condition, drivers, impacts, trends, and other information. Although the Crop Assessment Tool was originally intended to collect data on major crop production at the global scale, the types of data collected are also relevant to the food security and rangelands monitoring communities. In line with the GEOGLAM Countries at Risk philosophy of "foster[ing] the coordination of product delivery and capacity building efforts for national and regional organizations, and the development of harmonized methods and tools", a modified version of the Crop Assessment Tool is being developed for the USAID Famine Early Warning Systems Network (FEWS NET). As a member of the Countries at Risk component of GEOGLAM, FEWS NET provides agricultural monitoring, timely food security assessments, and early warnings of potential significant food shortages focusing specifically on countries at risk of food security emergencies. While the FEWS NET adaptation of the Crop Assessment Tool focuses on crop production in the context of food security rather than large scale production, the data collected is nearly identical to the data collected by the Crop Monitor. If combined, the countries monitored by FEWS NET and GEOGLAM Crop Monitor would encompass over 90 countries representing the most important regions for crop production and food security.
Mothers’ Emotional Reactions to Crying Pose Risk for Subsequent Attachment Insecurity
Leerkes, Esther M.; Parade, Stephanie H.; Gudmundson, Jessica A.
2011-01-01
Links between maternal emotional reactions to crying (anger and anxiety) and infant attachment security were examined in 119 mother-infant dyads. Mothers rated the intensity of their emotional responses to videotapes of crying infants prenatally. Maternal sensitivity was observed during infant exposure to emotion eliciting tasks at six and 16 months postpartum and mothers’ self-reported on their responses to their infant’s negative emotions at 16 months. Infant attachment security was assessed using the Strange Situation at 16 months postpartum. Results indicated that observed sensitivity was associated with fewer avoidant and resistant behaviors and prenatal maternal anger and anxiety in response to infant crying predicted the developing attachment system independent of observed sensitivity, but in different ways. Maternal anxiety in response to crying was positively associated with resistant behaviors as a direct effect. Maternal anger in response to crying was associated with avoidant behaviors indirectly through mothers’ self-reported punitive and minimizing responses to infant distress at sixteen months. Theoretical, applied and methodological implications are discussed. PMID:21517171
The Security Scale as a measure of attachment: meta-analytic evidence of validity.
Brumariu, Laura E; Madigan, Sheri; Giuseppone, Kathryn R; Movahed Abtahi, Mahsa; Kerns, Kathryn A
2018-02-05
This meta-analysis evaluated the psychometric properties of the Security Scale (SS; k = 57 studies), a measure specifically designed to assess attachment in middle childhood, using several criteria: stability over time, associations with other attachment measures, relations with caregiver sensitivity, and associations with theoretically driven outcomes. The SS demonstrated moderate stability and meaningful associations with other attachment measures and caregiver sensitivity. Furthermore, the SS showed significant associations with developmental correlates of attachment: school adaptation, emotional and peer social competence, self-esteem, and behavioral problem. Some effect sizes varied as a function of socioeconomic status (SES; peer social competence and maladjustment) and publication status (emotional competence, peer social competence, and self-esteem). The association between the SS and our constructs of interest were, for the most part, independent of geographical location and child gender or age. Overall, findings suggest that the SS is a robust measure of attachment in middle childhood and early adolescence.
Candelaria, Margo; Teti, Douglas M; Black, Maureen M
2011-08-01
Ecological and transactional theories link child outcomes to accumulated risk. This study hypothesized that cumulative risk was negatively related to attachment, and that maternal sensitivity mediated linkages between risk and attachment. One hundred and twelve high-risk African-American premature infant-mother dyads participated. Psychosocial (maternal depression, stress and self-efficacy) and sociodemographic risk (poverty, maternal education, marital status) were maternal self-report (0-4 months). Infant health risk was obtained from hospital charts. Infant-mother attachment (12 months) and maternal sensitivity (4 months) were assessed with Q-sort measures. Psychosocial and sociodemographic risk, but not infant health risk, negatively related to attachment. Both were mediated by maternal sensitivity. The impact of risk domains on attachment security was mediated by maternal sensitivity. Results emphasize the need for early intervention programs targeting premature infants to identify and address environmental and personal factors that place parenting at risk. © 2011 The Authors. Journal of Child Psychology and Psychiatry © 2011 Association for Child and Adolescent Mental Health.
NASA Technical Reports Server (NTRS)
1985-01-01
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
Measuring global water security towards sustainable development goals
NASA Astrophysics Data System (ADS)
Gain, Animesh K.; Giupponi, Carlo; Wada, Yoshihide
2016-12-01
Water plays an important role in underpinning equitable, stable and productive societies and ecosystems. Hence, United Nations recognized ensuring water security as one (Goal 6) of the seventeen sustainable development goals (SDGs). Many international river basins are likely to experience ‘low water security’ over the coming decades. Water security is rooted not only in the physical availability of freshwater resources relative to water demand, but also on social and economic factors (e.g. sound water planning and management approaches, institutional capacity to provide water services, sustainable economic policies). Until recently, advanced tools and methods are available for the assessment of water scarcity. However, quantitative and integrated—physical and socio-economic—approaches for spatial analysis of water security at global level are not available yet. In this study, we present a spatial multi-criteria analysis framework to provide a global assessment of water security. The selected indicators are based on Goal 6 of SDGs. The term ‘security’ is conceptualized as a function of ‘availability’, ‘accessibility to services’, ‘safety and quality’, and ‘management’. The proposed global water security index (GWSI) is calculated by aggregating indicator values on a pixel-by-pixel basis, using the ordered weighted average method, which allows for the exploration of the sensitivity of final maps to different attitudes of hypothetical policy makers. Our assessment suggests that countries of Africa, South Asia and Middle East experience very low water security. Other areas of high water scarcity, such as some parts of United States, Australia and Southern Europe, show better GWSI values, due to good performance of management, safety and quality, and accessibility. The GWSI maps show the areas of the world in which integrated strategies are needed to achieve water related targets of the SDGs particularly in the African and Asian continents.
Audiometric and subjective assessment of hearing handicap.
Matthews, L J; Lee, F S; Mills, J H; Schum, D J
1990-11-01
This study compares self-perceived assessment of hearing handicap with audiometrically derived measures of hearing handicap in a sample of elderly persons. Subjects were evaluated by traditional audiometric tests, the Speech Perception in Noise test, and the Hearing Handicap Inventory for the Elderly, a self-assessment questionnaire. Hearing handicap was also calculated by the audiometrically derived American Academy of Otolaryngology (1979) method. Our results are consistent with other studies that indicate a low correspondence between audiometric measures of hearing handicap and self-assessment of hearing handicap. Furthermore, if the Hearing Handicap Inventory for the Elderly is considered the true measure of hearing handicap, our data indicate that the American Academy of Otolaryngology method tends to overestimate handicap among persons with no self-perceived hearing handicap and underestimates handicap among persons with significant self-perceived hearing handicap.
Summative Self-Assessment in Higher Education: Implications of Its Counting towards the Final Mark
ERIC Educational Resources Information Center
Tejeiro, Ricardo A.; Gomez-Vallecillo, Jorge L.; Romero, Antonio F.; Pelegrina, Manuel; Wallace, Agustin; Emberley, Enrique
2012-01-01
Introduction: Our study aims at assessing the validity of summative criteria-referenced self-assessment in higher education, and in particular, if that validity varies when the professor counts self-assessment toward the final mark. Method: One hundred and twenty-two first year students from two groups in Teacher Education at the Universidad de…
ERIC Educational Resources Information Center
Poon, Wai-Yin; McNaught, Carmel; Lam, Paul; Kwan, H. S.
2009-01-01
The aim of this study was to investigate whether, in the Hong Kong context, self- and peer-assessment promote students' self-reflection and enable students to understand their own strengths and weaknesses better. A three-stage assessment strategy was employed in three Science courses at The Chinese University of Hong Kong: (1) students developing…
Formats for Assessing Students' Self-Assessment Abilities.
ERIC Educational Resources Information Center
Miller, Maurice; Turner, Tamrah
The paper examines some self-assessment techniques used with handicapped students and discusses the advantages and disadvantages of these techniques. The use of self-rating scales is reviewed, and questionable results are cited. Another method, in which students view an item and estimate whether they can perform it before attempting it…
An evaluation index system of water security in China based on macroeconomic data from 2000 to 2012
NASA Astrophysics Data System (ADS)
Li, X. S.; Peng, Z. Y.; Li, T. T.
2016-08-01
This paper establishes an evaluation index system of water security. The index system employs 5 subsystems (water circulation security, water environment security, water ecology security, water society security and water economy security) and has 39 indicators. Using the AHP method, each indicator is given a relative weight to integrate within the whole system. With macroeconomic data from 2000 to 2012, a model of water security evaluation is applied to assess the state of water security in China. The results show an improving trend in the overall state of China's water security. In particular, the cycle of water security is at a high and low fluctuation. Water environment security presents an upward trend on the whole; however, this trend is unsteady and has shown a descending tendency in some years. Yet, water ecology security, water society security, and water economy security are basically on the rise. However, the degree of coordination of China's water security system remains in need of consolidation.
Haun, Jolie N; Patel, Nitin R; Lind, Jason D; Antinori, Nicole
2015-12-21
Secure email messaging is part of a national transformation initiative in the United States to promote new models of care that support enhanced patient-provider communication. To date, only a limited number of large-scale studies have evaluated users' experiences in using secure email messaging. To quantitatively assess veteran patients' experiences in using secure email messaging in a large patient sample. A cross-sectional mail-delivered paper-and-pencil survey study was conducted with a sample of respondents identified as registered for the Veteran Health Administrations' Web-based patient portal (My HealtheVet) and opted to use secure messaging. The survey collected demographic data, assessed computer and health literacy, and secure messaging use. Analyses conducted on survey data include frequencies and proportions, chi-square tests, and one-way analysis of variance. The majority of respondents (N=819) reported using secure messaging 6 months or longer (n=499, 60.9%). They reported secure messaging to be helpful for completing medication refills (n=546, 66.7%), managing appointments (n=343, 41.9%), looking up test results (n=350, 42.7%), and asking health-related questions (n=340, 41.5%). Notably, some respondents reported using secure messaging to address sensitive health topics (n=67, 8.2%). Survey responses indicated that younger age (P=.039) and higher levels of education (P=.025) and income (P=.003) were associated with more frequent use of secure messaging. Females were more likely to report using secure messaging more often, compared with their male counterparts (P=.098). Minorities were more likely to report using secure messaging more often, at least once a month, compared with nonminorities (P=.086). Individuals with higher levels of health literacy reported more frequent use of secure messaging (P=.007), greater satisfaction (P=.002), and indicated that secure messaging is a useful (P=.002) and easy-to-use (P≤.001) communication tool, compared with individuals with lower reported health literacy. Many respondents (n=328, 40.0%) reported that they would like to receive education and/or felt other veterans would benefit from education on how to access and use the electronic patient portal and secure messaging (n=652, 79.6%). Survey findings validated qualitative findings found in previous research, such that veterans perceive secure email messaging as a useful tool for communicating with health care teams. To maximize sustained utilization of secure email messaging, marketing, education, skill building, and system modifications are needed. These findings can inform ongoing efforts to promote the sustained use of this electronic tool to support for patient-provider communication.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-63981; File No. SR-Phlx-2011-13] Self... Regulations February 25, 2011. Pursuant to Section 19(b)(1) of the Securities Exchange Act of 1934 (``Act'')\\1... from interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory Organization...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-06
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-61805; File No. SR-BX-2010-022] Self-Regulatory... Relating to the Price Improvement Period March 31, 2010. Pursuant to Section 19(b)(1) of the Securities... change from interested persons. \\1\\ 15 U.S.C. 78s(b)(1). \\2\\ 17 CFR 240.19b-4. I. Self-Regulatory...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-04
... To Adopt FINRA Rules 4314 (Securities Loans and Borrowings), 4330 (Customer Protection--Permissible Use of Customers' Securities) and 4340 (Callable Securities) in the Consolidated FINRA Rulebook, as... loans and borrowings, permissible use of customers' securities, and callable securities as FINRA Rules...
ERIC Educational Resources Information Center
Howard, Steven J.; Melhuish, Edward
2017-01-01
Several methods of assessing executive function (EF), self-regulation, language development, and social development in young children have been developed over previous decades. Yet new technologies make available methods of assessment not previously considered. In resolving conceptual and pragmatic limitations of existing tools, the Early Years…
Validation of the self-assessment teamwork tool (SATT) in a cohort of nursing and medical students.
Roper, Lucinda; Shulruf, Boaz; Jorm, Christine; Currie, Jane; Gordon, Christopher J
2018-02-09
Poor teamwork has been implicated in medical error and teamwork training has been shown to improve patient care. Simulation is an effective educational method for teamwork training. Post-simulation reflection aims to promote learning and we have previously developed a self-assessment teamwork tool (SATT) for health students to measure teamwork performance. This study aimed to evaluate the psychometric properties of a revised self-assessment teamwork tool. The tool was tested in 257 medical and nursing students after their participation in one of several mass casualty simulations. Using exploratory and confirmatory factor analysis, the revised self-assessment teamwork tool was shown to have strong construct validity, high reliability, and the construct demonstrated invariance across groups (Medicine & Nursing). The modified SATT was shown to be a reliable and valid student self-assessment tool. The SATT is a quick and practical method of guiding students' reflection on important teamwork skills.
Code of Federal Regulations, 2012 CFR
2012-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled Individuals Achieve Self-Support § 416.1180 General. One of the objectives of the SSI program is to help blind or disabled persons become self-supporting. If you...
Code of Federal Regulations, 2013 CFR
2013-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled Individuals Achieve Self-Support § 416.1180 General. One of the objectives of the SSI program is to help blind or disabled persons become self-supporting. If you...
Code of Federal Regulations, 2014 CFR
2014-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled Individuals Achieve Self-Support § 416.1180 General. One of the objectives of the SSI program is to help blind or disabled persons become self-supporting. If you...
Code of Federal Regulations, 2011 CFR
2011-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled Individuals Achieve Self-Support § 416.1180 General. One of the objectives of the SSI program is to help blind or disabled persons become self-supporting. If you...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-11
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-64189; File No. SR-CBOE-2011-008] Self-Regulatory Organizations; Chicago Board Options Exchange, Incorporated; Order Granting Approval of Proposed... Chicago Board Options Exchange, Incorporated (``CBOE'' or ``Exchange'') filed with the Securities and...
75 FR 35853 - Privacy Act of 1974: Systems of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-23
..., investment advisers, investment companies, self-regulatory organizations, clearing agencies, nationally... securities laws and with rules of self-regulatory organizations and clearing agencies. Records may also... risk of harm to economic or property interests, identity theft or fraud, or harm to the security or...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Income Rules for Helping Blind and Disabled Individuals Achieve Self-Support § 416.1180 General. One of the objectives of the SSI program is to help blind or disabled persons become self-supporting. If you...
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Introduction § 411... Security Act which establishes the Ticket to Work and Self-Sufficiency Program (hereafter referred to as... provisions relating to employment networks in the Ticket to Work program. (f) Subpart F contains provisions...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-15
... to certain issues of securities in DTC's Fast Automated Securities Transfer program (``FAST''). For securities that are part of the FAST program, the transfer agents hold the securities registered in the name...
Respiratory therapists and critical-thinking behaviors: a self-assessment.
Goodfellow, L T
2001-01-01
The purpose of this study was to assess critical-thinking behaviors of respiratory therapists through self-report. Using a quantitative survey research method, respiratory therapists rated themselves on seven critical thinking skills. The effects of personal variables on the self-assessments were also investigated. The respiratory therapists self-assessed their critical-thinking behaviors highest in the categories of prioritizing, troubleshooting, and communicating. Anticipating was self-assessed as the lowest-ranked critical-thinking behavior. Age and educational level were found to have no effect on the self-assessed behaviors, while years of experience in respiratory care and gender were found to affect self-assessed troubleshooting, decision making, and anticipating. The results of this study suggest that educators and clinicians should consider learning strategies that incorporate the use of experience when targeting novice practitioners.
ERIC Educational Resources Information Center
Levendosky, Alytia A.; Buttenheim, Margaret
2002-01-01
Presents a case study of the treatment of a pre-adolescent female survivor of incest. The treatment integrated relational and trauma theory perspectives in focusing on reducing self-blame, preventing further isolation, creating a safe, secure environment, and helping the patient develop positive connections with others and feelings of…
Development and Application of a Soil Moisture Downscaling Method for Mobility Assessment
2011-05-01
instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send...REPORT Development and Application of a Soil Moisture Downscaling Method for Mobility Assessment 14. ABSTRACT 16. SECURITY CLASSIFICATION OF: Soil...cells). Thus, a method is required to downscale intermediate-resolution patterns to finer resolutions. Fortunately, fine-resolution variations in
Pérez-Escamilla, Rafael; Villalpando, Salvador; Shamah-Levy, Teresa; Méndez-Gómez Humarán, Ignacio
2014-01-01
To examine the independent association of household food insecurity (HFI) with diabetes and hypertension in a nationally representative cross-sectional sample from Mexico. We assessed the association between HFI and self-reported doctor diagnosed diabetes and hypertension among 32 320 adult individuals using multiple logistic regression. HFI was measured using an adapted version for Mexico of the Latin American and Caribbean Food Security Scale (ELCSA). HFI was a risk factor for diabetes among women but not men and for hypertension among both genders. Diabetes odds were higher by 31, 67 and 48%, among women living in mild, moderate, and severe food-insecure (vs. food-secure) households, respectively. Living in moderate to severe food-insecure (vs. food-secure) households was associated with hypertension odds that were 28 and 32% higher, respectively. Decreasing HFI may help improve public health and national development in Mexico.
Pârvan, Alexandra
2016-01-01
Attachment research shows that the formation of unconscious, insecure representations of the self, the other, and the self-other relations is linked to perpetration and receipt of violence. Attachment-focused therapy aims to change these internal schemata to more secure, adaptive representations by therapeutic work addressed to senses, emotions, and behavior. The paper proposes a new approach to altering the self and other representations in offenders and victims: it involves intellectual reflection on self, will, action and responsibility informed by Augustine’s views, facilitated by actual relational experience, and translated into a distinct self-soothing strategy. The reflective-experiential approach can complement existing methods of working with violent or traumatized individuals both within and outside an attachment theory framework. It consists in: identifying that a non-reflective nondistinction between self and behavior supports damaging self- and other- representations and interactions; proposing ways for clients to comprehend and consciously operate with the distinction between self and action. PMID:28936108
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-13
... Change Relating to Post-Trade Transparency for Agency Pass-Through Mortgage-Backed Securities Traded in... and dissemination of transactions in TRACE- Eligible Securities that are: (1) Agency Pass-Through... Security, Agency Pass-Through Mortgage-Backed Security, Specified Pool Transaction, Asset-Backed Security...