Code of Federal Regulations, 2014 CFR
2014-01-01
... Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary of Homeland Security, the Administrator of the Environmental... Secretary level or higher. In addition, the Working Group shall consist of the head of each of the following...
78 FR 48029 - Improving Chemical Facility Safety and Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-07
... responding to risks in chemical facilities (including during pre-inspection, inspection execution, post.... Sec. 2. Establishment of the Chemical Facility Safety and Security Working Group. (a) There is established a Chemical Facility Safety and Security Working Group (Working Group) co-chaired by the Secretary...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to ensure that...
78 FR 24161 - Bureau of Industry and Security
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-24
... of Industry and Security senior management. 4. Discussion on General Technology Note as it applies to.... Report of Composite Working Group and other working groups. 7. Report on regime-based activities. 8...
NASA Astrophysics Data System (ADS)
Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.
2017-10-01
IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.
78 FR 27966 - Joint Working Group on Improving Cybersecurity and Resilience Through Acquisition
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-13
... Working Group on Improving Cybersecurity and Resilience Through Acquisition AGENCY: Office of Emergency... the Department of Homeland Security and the Federal Acquisition Regulation Council, are required to... security standards into acquisition planning and contract administration and address what steps [[Page...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Shull, Doug
The purpose of the consultancy assignment was to (i) apply the NUSAM assessment methods to hypothetical transport security table top exercise (TTX) analyses and (ii) document its results to working materials of NUSAM case study on transport. A number of working group observations, using the results of TTX methodologies, are noted in the report.
Work-related violence against security guards--who is most at risk?
Leino, Tuula; Selin, Risto; Summala, Heikki; Virtanen, Marianna
2011-01-01
Studies on violence in the work of security guards are largely lacking. This study is unique in that it focuses on security guards (n=1,010) in Finland, and assesses the different forms, prevalence, and risk factors of the work-related violence they often face. Information to a survey instrument was obtained by first interviewing 30 volunteers. Then we made a cross-sectional mailed survey that was sent to a randomized group of 2,000 security guards. The response rate was 52. We found the prevalence of verbal aggression, threats of assault, and physical acts against security guards at least once a month to be 39%, 19%, and 15% respectively. As regards risk factors and who is most at risk, our results show that male gender, young age, low work experience, late working hours, and time pressure were associated with all three forms of work-related violence. Unlike other forms of violence, verbal aggression was highly prevalent outside the metropolitan area and directed towards both more and less experienced security guards. In prevention policies for violence, it is important to identify high-risk groups such as those who have less work experience.
2009-04-01
terrorist social networks are quite vulnerable to penetration and exploitation by indigenous personnel working in the communities where the groups operate...LEVERAGING INDIGENOUS SECURITY FORCES by Mack-Jan H. Spencer, Maj, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the...4. TITLE AND SUBTITLE Connecting the Spots: Combating Transnational Terrorist Groups Through Leveraging Indigenous Security Forces 5a. CONTRACT
Safety and Security Interface Technology Initiative
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie
Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme)more » includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.« less
76 FR 25702 - National Maritime Security Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-05
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2011-0310] National Maritime Security Advisory... Maritime Security Advisory Committee (NMSAC) will meet by teleconference to discuss the results of the... Maritime Organization (IMO). Agenda (1) Results of Seafarer Access Working Group's review and...
NASA Technical Reports Server (NTRS)
Tencati, Ron
1991-01-01
An overview is presented of the NASA Science Internet (NSI) security task. The task includes the following: policies and security documentation; risk analysis and management; computer emergency response team; incident handling; toolkit development; user consulting; and working groups, conferences, and committees.
Energy technology evaluation report: Energy security
NASA Astrophysics Data System (ADS)
Koopman, R.; Lamont, A.; Schock, R.
1992-09-01
Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.
78 FR 54634 - National Security Education Board; Notice of Federal Advisory Committee Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-05
... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board; Notice of Federal... and National Security Education Office (DLNSEO), Office of the Secretary, DoD. ACTION: Meeting notice... committee working group meeting of the National Security Education Board will take place. DATES: Monday...
ERIC Educational Resources Information Center
Social and Labour Bulletin, 1983
1983-01-01
This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)
77 FR 19300 - National Infrastructure Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-30
... Homeland Security with advice on the security of the critical infrastructure sectors and their information systems. The NIAC will meet to address issues relevant to the protection of critical infrastructure as... Group regarding the scope of the next phase of the Working Group's critical infrastructure resilience...
The Influence of Secure Emotional Expression on Team Effectiveness
ERIC Educational Resources Information Center
Bailey, Emily; Dewitt, Matt
2014-01-01
The present study examined the relationship between group effectiveness and secure emotional expression over the course of a 10 week period. The participants consisted of 12 college students who were enrolled in a senior seminar on teamwork. Participants worked in two groups of six and participated in a group meeting each week that consisted of a…
2009-03-03
ajor vulnerabilities still exist in ... general aviation security ,”3 the commission did not further elaborate on the nature of those vulnerabilities...commercial operations may make them an attractive alternative to terrorists seeking to identify and exploit vulnerabilities in aviation security . In this...3, 2003, p. A7. 2 See Report of the Aviation Security Advisory Committee Working Group on General Aviation Airport Security (October 1, 2003); and
76 FR 72967 - Aviation Security Advisory Committee (ASAC) Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-28
...The Transportation Security Administration (TSA) will hold a meeting of the Aviation Security Advisory Committee (ASAC) via telephone conference on December 15, 2011, to establish working groups and set the agenda for future activity. This meeting will be open to the public.
2011-05-01
Homeland Security (DHS) and the Department of State (DOS), and by changing the IC’s CPRC representative from the Director of Central Intelli- gence to the...Security Strategy of the United States of America (May 2010), p. 4. 2 Nuclear Posture Review Report (April 6, 2010), p. i 3 National Strategy for...ongoing efforts with GICNT, the Nuclear Forensics International Technical Working Group (ITWG), Forensics En - gagement Working Group (FEWG), NATO
76 FR 68128 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-03
... Bureau of Industry and Security senior management. 3. Presentation from DuPont on impact of export controls. 4. Report on Composite Working Group and other working groups. 5. Discussion of proposed changes...
Composing Alternatives to a National Security Language Policy
ERIC Educational Resources Information Center
Wible, Scott
2009-01-01
President Bush's National Security Language Initiative focuses narrowly on gearing language education to security and military needs. English educators should work with their counterparts in foreign language departments to promote a broader view, one that encourages study of the multiple language groups that currently exist within the United…
Smart Grid Communications Security Project, U.S. Department of Energy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnes, Frank
There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) Thismore » report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.« less
LaMontagne, A D; Krnjacki, L; Kavanagh, A M; Bentley, R
2013-09-01
A number of widely prevalent job stressors have been identified as modifiable risk factors for common mental and physical illnesses such as depression and cardiovascular disease, yet there has been relatively little study of population trends in exposure to job stressors over time. The aims of this paper were to assess: (1) overall time trends in job control and security and (2) whether disparities by sex, age, skill level and employment arrangement were changing over time in the Australian working population. Job control and security were measured in eight annual waves (2000-2008) from the Australian nationally-representative Household Income and Labour Dynamics of Australia panel survey (n=13 188 unique individuals for control and n=13 182 for security). Observed and model-predicted time trends were generated. Models were generated using population-averaged longitudinal linear regression, with year fitted categorically. Changes in disparities over time by sex, age group, skill level and employment arrangement were tested as interactions between each of these stratifying variables and time. While significant disparities persisted for disadvantaged compared with advantaged groups, results suggested that inequalities in job control narrowed among young workers compared with older groups and for casual, fixed-term and self-employed compared with permanent workers. A slight narrowing of disparities over time in job security was noted for gender, age, employment arrangement and occupational skill level. Despite the favourable findings of small reductions in disparities in job control and security, significant cross-sectional disparities persist. Policy and practice intervention to improve psychosocial working conditions for disadvantaged groups could reduce these persisting disparities and associated illness burdens.
NASA Astrophysics Data System (ADS)
Hoeft, B.; Epting, U.; Koenig, T.
2008-07-01
While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls.
Manning-Orenstein, G
1998-07-01
A working model of caregiving has been defined as an internalized schema of caregiving that guides a mother's behavior with her infant. This schema is strongly influenced by the mother's first attachment relationship with her own mother, which frequently operates outside her conscious awareness. To examine doula support at birth as an intervention that might correct distortions of a mother's unconscious schema of caregiving, promoting more secure caregiving following childbirth. The effects of doula support versus Lamaze birth preparation on the working models of caregiving of 35 first-time pregnant mothers were compared. An interview was used to assess the mothers' working models in the third trimester of pregnancy and again 4 months after the mothers gave birth. Mood state and self-esteem were measured at these times. A post hoc analysis was performed on the mothers' birth experiences, the quality of their postpartum support, and their evaluations of their infants' temperaments. The prebirth to postbirth rating analysis of the interviews revealed that the mothers in the doula group were significantly less rejecting and helpless in their working models of caregiving than were the mothers in the Lamaze group. The mothers in the doula group also showed greater security than did mothers in the Lamaze group, a difference that approached but did not reach significance. In addition, the women in the doula group were less emotionally distressed and had higher self-esteem than did the women in the Lamaze group, and the women in the doula group rated their infants as significantly less fussy than the mothers in the Lamaze group rated their infants. When viewed in the context of working models of caregiving, mothers who used a doula were significantly less rejecting and helpless, and approached significantly higher scores on the secure scale, than did mothers who used Lamaze birth preparation. Mothers rated as secure showed significantly less mood disturbance and higher prebirth and postbirth self-esteem than did mothers rated as insecure, providing construct validity for the caregiving interviews.
Developing measures of food and nutrition security within an Australian context.
Archer, Claire; Gallegos, Danielle; McKechnie, Rebecca
2017-10-01
To develop a measure of food and nutrition security for use among an Australian population that measures all pillars of food security and to establish its content validity. The study consisted of two phases. Phase 1 involved focus groups with experts working in the area of food security. Data were assessed using content analysis and results informed the development of a draft tool. Phase 2 consisted of a series of three online surveys using the Delphi technique. Findings from each survey were used to establish content validity and progressively modify the tool until consensus was reached for all items. Australia. Phase 1 focus groups involved twenty-five experts working in the field of food security, who were attending the Dietitians Association of Australia National Conference, 2013. Phase 2 included twenty-five experts working in food security, who were recruited via email. Findings from Phase 1 supported the need for an Australian-specific tool and highlighted the failure of current tools to measure across all pillars of food security. Participants encouraged the inclusion of items to measure barriers to food acquisition and the previous single item to enable comparisons with previous data. Phase 2 findings informed the selection and modification of items for inclusion in the final tool. The results led to the development of a draft tool to measure food and nutrition security, and supported its content validity. Further research is needed to validate the tool among the Australian population and to establish inter- and intra-rater reliability.
Tartakovsky, Eugene; Abu Kheit, Ayat
2017-01-01
The present study investigates the connection between personal value preferences, group identifications, and cultural practices among Palestinian Israelis working in close contact with the Jewish population in Israel. One hundred twenty-two Palestinian Israelis participated in the study. The participants were employed in different professional positions in the Tel Aviv Metropolitan area and were recruited to the study using the snowball technique. A stronger national identification was associated with a higher preference for the security and conformity values, and a lower preference for the humility values. A stronger ethnic identification was associated with a lower preference for the security, power, and stimulation values. Group identifications mediated the connection between personal value preferences and cultural practices. A longer time working in close contact with the majority group and less frequent visits home were associated with a greater adherence to the majority group's cultural practices but not with adherence to the ethnic group's practices and not with the group identifications.
2011-01-01
Background The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. PMID:22070906
van Dongen, Diana; Smid, Tjabe; Timmermans, Daniëlle R M
2011-11-09
The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. © 2011 van Dongen et al; licensee BioMed Central Ltd.
Flattening the organization: implementing self-directed work groups.
Brandon, G M
1996-01-01
In response to tremendous growth of managed care and threats to financial stability and job security, the Greater Baltimore Medical Center (GBMC) restructured itself into independent business units. The radiology department at GBMC resolved to reduce cost per unit-of-service, improve service, determine optimal staffing levels and reduce the number of layers of organization. It was decided to achieve those goals by implementing self-directed work groups. Staff buy-in was critical to success of the project. To begin, the staff was educated intensively about current trends in healthcare, managed care and potential changes in the job market. The radiology department was allowed to reduce the size of its staff through attrition and worked hard to focus staff concern on the impact each individual could have on the bottom line and the resultant effect on job security. Self-directed work groups were designed on a matrix that used small "service teams" in combinations to form larger "work groups." Actual work and daily activities occur at the service team level; information exchange and major decisions occue at the work group level. Seventeen months after beginning the project and 10 months after implementation, the organization has flattened, staff members have adjusted well to new roles, there have been no lay-offs, and the matrix system of small and large groups have proved particularly valuable.
Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks
NASA Technical Reports Server (NTRS)
Ivancic, William D.
2009-01-01
A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.
Contains basic information on the role and origins of the Selected Analytical Methods including the formation of the Homeland Security Laboratory Capacity Work Group and the Environmental Evaluation Analytical Process Roadmap for Homeland Security Events
Marketing Strategy and Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None, None
This report documents the preparation of materials for the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. The materials and the marketing campaign build on the research that was previously completed, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP). Previous research included outcome analysis to determine appropriate marketing strategies. The analysis was based upon focus groups with middle school and high school students, studentmore » interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of a marketing campaign divided into DISCO (Discovering Intelligence and Security Career Opportunities) for the middle school age group and DISCO…..Your Way! for high school age groups. Both campaigns have an intertwined message that focuses on the education of students in the various national security career opportunities at NNSA using the STEM concepts and the notion that almost any career they can think of has a fit within NNSA. Further, a special emphasis has been placed on the importance of obtaining a national security clearance when working at NNSA and the steps that will need to be taken during middle school, high school, and college to be allowed this opportunity.« less
Sumer, H C; Knight, P A
2001-08-01
This study explored whether different models of work-family relationship were possible for individuals with different attachment styles. A mail survey was conducted using employees (N = 481) at a midwestern university in the United States. Results suggested that (a) individuals with a preoccupied attachment pattern were more likely to experience negative spillover from the family/home to the work domain than those with a secure or dismissing style, (b) securely attached individuals experienced positive spillover in both work and family domains more than those in the other groups, and (c) preoccupied individuals were much less likely to use a segmentation strategy than the other 3 attachment groups. However, when the conventional job satisfaction life satisfaction relationship was examined, the data provided unique support for the spillover model. Implications of the findings for both attachment and work family relationship literatures are discussed.
The Privacy and Security Implications of Open Data in Healthcare.
Kobayashi, Shinji; Kane, Thomas B; Paton, Chris
2018-04-22
The International Medical Informatics Association (IMIA) Open Source Working Group (OSWG) initiated a group discussion to discuss current privacy and security issues in the open data movement in the healthcare domain from the perspective of the OSWG membership. Working group members independently reviewed the recent academic and grey literature and sampled a number of current large-scale open data projects to inform the working group discussion. This paper presents an overview of open data repositories and a series of short case reports to highlight relevant issues present in the recent literature concerning the adoption of open approaches to sharing healthcare datasets. Important themes that emerged included data standardisation, the inter-connected nature of the open source and open data movements, and how publishing open data can impact on the ethics, security, and privacy of informatics projects. The open data and open source movements in healthcare share many common philosophies and approaches including developing international collaborations across multiple organisations and domains of expertise. Both movements aim to reduce the costs of advancing scientific research and improving healthcare provision for people around the world by adopting open intellectual property licence agreements and codes of practice. Implications of the increased adoption of open data in healthcare include the need to balance the security and privacy challenges of opening data sources with the potential benefits of open data for improving research and healthcare delivery. Georg Thieme Verlag KG Stuttgart.
77 FR 23668 - GPS Satellite Simulator Working Group Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-20
... DEPARTMENT OF DEFENSE Department of the Air Force GPS Satellite Simulator Working Group Notice of Meeting AGENCY: The United States Air Force. ACTION: Meeting Notice. SUMMARY: This meeting notice is to..., telephone number, address and security clearance information. Wayne T. Urubio, 2nd Lieutenant, USAF, SMC/GPE...
[Inability to work: analysis of sickness benefits granted in the State of Rondônia].
Jakobi, Heinz Roland; Barbosa-Branco, Anadergh; Bueno, Luis Fernando; Ferreira, Ricardo de Godoi Mattos; Camargo, Luís Marcelo Aranha
2013-11-01
This is a descriptive epidemiological study aiming to o estimate the prevalence and duration of sickness benefits granted by the Brazilian Social Security Institute, as well as the clinical causes of inability to work among employees in Rondonia in 2008. The prevalence was submitted by 10,000 workers and stratified by sex, age, diagnosis, economic activity, and type and duration of benefits. Men had a higher prevalence and duration of benefits. Social security benefits were found to be 2,5 times more prevalent than accident benefits and both increased with age. Labor accidents were more prevalent in the age group ranging between 50-59 years, and Forestry, construction and manpower leasing: had the highest prevalence. The main diagnostic groups were injuries, musculoskeletal system disorders and digestive diseases. The duration of the sickness benefits was higher among men, =40 years and in the social security category. The economic activity is an important risk factor for Inability to work, and it needs to be further explored in order to improve sickness prevention and reduce the impact on workers' health arising from environmental conditions and working processes.
32 CFR 152.4 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-07-01
... Department of Defense, as appropriate. (3) Invite the Secretary of Homeland Security to appoint... Department of Homeland Security, the Chief Counsel, United States Coast Guard. (d) The JSC Working Group (WG... 32 National Defense 1 2012-07-01 2012-07-01 false Responsibilities. 152.4 Section 152.4 National...
77 FR 65857 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-31
.... Remarks from Bureau of Industry and Security senior management. 3. Presentation on single use technology for bioreactors and the type of applications they are being used for. 4. Report on Composite Working Group and other working groups. 5. Report on regime-based activities. 6. Public comments and new...
Security Personnel Practices and Policies in U.S. Hospitals: Findings From a National Survey.
Schoenfisch, Ashley L; Pompeii, Lisa A
2016-06-27
Concerns of violence in hospitals warrant examination of current hospital security practices. Cross-sectional survey data were collected from members of a health care security and safety association to examine the type of personnel serving as security in hospitals, their policies and practices related to training and weapon/restraint tool carrying/use, and the broader context in which security personnel work to maintain staff and patient safety, with an emphasis on workplace violence prevention and mitigation. Data pertaining to 340 hospitals suggest security personnel were typically non-sworn officers directly employed (72%) by hospitals. Available tools included handcuffs (96%), batons (56%), oleoresin capsicum products (e.g., pepper spray; 52%), hand guns (52%), conducted electrical weapons (e.g., TASERs®; 47%), and K9 units (12%). Current workplace violence prevention policy components, as well as recommendations to improve hospital security practices, aligned with Occupational Safety and Health Administration guidelines. Comprehensive efforts to address the safety and effectiveness of hospital security personnel should consider security personnel's relationships with other hospital work groups and hospitals' focus on patients' safety and satisfaction. © 2016 The Author(s).
76 FR 6637 - Assumption Buster Workshop: Defense-in-Depth Is a Smart Investment for Cyber Security
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
... Technology Research and Development (NITRD) Program. ACTION: Call for participation. FOR FURTHER INFORMATION... regulations and restrictions. SUMMARY: The NCO, on behalf of the Special Cyber Operations Research and Engineering (SCORE) Committee, an interagency working group that coordinates cyber security research...
Ma, Bing; Liu, Shanshi; Liu, Donglai; Wang, Hongchun
2016-04-01
This research focuses on investigating whether organisational identification mediates the effects of job security on in-role behaviour and extra-role behaviour and how these mediation mechanisms differ according to gender. Through analysing 212 supervisor-subordinate dyads from a Chinese air transportation group, the research indicated that organisational identification partially mediated the effect of job security on in-role behaviour and fully mediated the effect of job security on extra-role behaviour. A multi-group analysis also showed that there were significant differences between male and female employees in these relationships. In addition, moderated mediation analyses showed that gender moderated the indirect effects of job security on in-role behaviour and extra-role behaviour through organisational identification. Limitations and implications of these findings are discussed. © 2015 International Union of Psychological Science.
76 FR 47648 - Proposed Collection; Comment Request for Form 8850
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-05
... 8850, Pre-Screening Notice and Certification Request for the Work Opportunity and Welfare-to-Work...: Pre-Screening Notice and Certification Request for the Work Opportunity and Welfare-to-Work Credits... request to a state employment security agency to certify an employee as a member of a targeted group for...
77 FR 42482 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-19
... Bureau of Industry and Security senior management. 3. Discussion on the role of the Implementation Support Unit of the Biological Weapons Convention. 4. Report on Composite Working Group and other working...
The HEPiX Virtualisation Working Group: Towards a Grid of Clouds
NASA Astrophysics Data System (ADS)
Cass, Tony
2012-12-01
The use of virtual machine images, as for example with Cloud services such as Amazon's Elastic Compute Cloud, is attractive for users as they have a guaranteed execution environment, something that cannot today be provided across sites participating in computing grids such as the Worldwide LHC Computing Grid. However, Grid sites often operate within computer security frameworks which preclude the use of remotely generated images. The HEPiX Virtualisation Working Group was setup with the objective to enable use of remotely generated virtual machine images at Grid sites and, to this end, has introduced the idea of trusted virtual machine images which are guaranteed to be secure and configurable by sites such that security policy commitments can be met. This paper describes the requirements and details of these trusted virtual machine images and presents a model for their use to facilitate the integration of Grid- and Cloud-based computing environments for High Energy Physics.
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; Ishac, Joseph A.; Shalkhauser, Kurt A.
2015-01-01
NASA Glenn Research Center (GRC), in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the Federal Aviation Administration (FAA) and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the GRC prototype CNPC architecture as a demonstration platform. The proposed security controls were integrated into the GRC flight test system aboard our S-3B Viking surrogate aircraft and several network tests were conducted during a flight on November 15th, 2014 to determine whether the controls were working properly within the flight environment. The flight test was also the first to integrate Robust Header Compression (ROHC) as a means of reducing the additional overhead introduced by the security controls and Mobile IPv6. The effort demonstrated the complete end-to-end secure CNPC link in a relevant flight environment.
Structural Causes and Cyber Effects: A Response to Our Critics
2015-01-01
the incident, saying “North Korea’s attack on [Sony] reaf- firms that cyber threats pose one of the gravest national security dangers to the United...around the world to strengthen cyber - security , promote norms of acceptable state behavior, uphold freedom of expression, and ensure that the Internet... cyber working group that made progress toward “interna- tional cyberspace rules, and measures to boost dialogue and cooperation on cyber security .”15
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-25
... Grid Cyber Security AGENCY: National Institute of Standards and Technology (NIST), Department of... and Technology (NIST) seeks comments on draft NISTIR 7628 Rev. 1, Guidelines for Smart Grid Cyber... (formerly the Cyber Security Working Group) of the Smart Grid Interoperability Panel. The document has been...
Nüchtern, E; Bahemann, A; Egdmann, W; van Essen, J; Gostomzyk, J; Hemmrich, K; Manegold, B; Müller, B; Robra, B P; Röder, M; Schmidt, L; Zobel, A; von Mittelstaedt, G
2015-09-01
In January, 2014, the division "Social Medicine in Practice and Rehabilitation" of the German Society for Social Medicine and Prevention established a working group on the self-image of the physicians active in the field of social medicine (medical expertise and counseling). The result of this work is the contribution presented here after consensus was achieved by specialists of social medicine from different fields and institutions (social security etc.) and in good cooperation with Prof. Dr. Gostomzyk and Prof. Dr. Robra. Based on the importance of an up to date social medicine for claimants and recipients of benefits on the one hand and the social security system on the other, and also on a description of the subjects, objectives and methods the following aspects are presented: · The perspective of social medicine. · Qualification in social medicine, concerning specialist training and continuing medical education. · The fields of duty of experts in social medicine. · The proceedings in social medicine. The working group identified challenges for the specialists in social medicine by a narrowed perception of social medicine by physicians in hospitals and practice, accompanied by an enlarged importance of expertise in social medicine, by the demand for more "patient orientation" and gain of transparency, and concerning the scientific foundation of social medicine. The working group postulates: · The perspective of social medicine should be spread more widely.. · Confidence in experts of social medicine and their independency should be strengthened.. · The not case-related consulting of the staff and executives should be expanded.. · Social medicine in practice needs support by politics and society, and especially by research and teaching.. · Good cooperation and transfer of experiences of the different branches of social security are essential for the impact of social medicine.. © Georg Thieme Verlag KG Stuttgart · New York.
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Transportation users' views of quality
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Big Data in the Campus Landscape: Security and Privacy. ECAR Working Group Paper
ERIC Educational Resources Information Center
Barnett, William; Corn, Mike; Hillegas, Curt; Wada, Kent
2015-01-01
This paper is part of series of the EDUCAUSE Center for Analysis and Research Campus Cyberinfrastructure (ECAR-CCI) Working Group. The topic of big data continues to receive a great deal of publicity because of its promise for opening new avenues of scholarly discovery and commercial opportunity. The ability to sift rapidly through massive amounts…
The Security of the South Atlantic: Is It a Case for ’SATO’--South Atlantic Treaty Organization
1982-05-10
Studies , Georgetown University, 1976. Nitze, Paul H., and Leonard Sullivan Jr., and the Atlantic Council Working Group on Securing the Seas. Securing...to this study should include the foregoing statement.) Accession For FTIS( GRA&I DTIC TAR Uuannwouncd e "• Jus;tification. 00 Distribution...Center for Strategic and International Studies , Georgetown University, 1976), p. 1. 2. Paul H. Nitze, Leonard Sullivan Jr and the Atlantic Council
NASA Technical Reports Server (NTRS)
Skeberdis, Daniel
2016-01-01
This is a presentation at the MOWG fall meeting that will discuss CCS purpose, future status, security enhancements, arbitrary ephemeris mission features, overview of CCS 7.3, approach for the use of NORAD TLEs, account and data security, CCS System virtualization, control box visualization modification and other enhancements.
Effective Group Work for Elementary School-Age Children Whose Parents Are Divorcing.
ERIC Educational Resources Information Center
DeLucia-Waack, Janice; Gerrity, Deborah
2001-01-01
Parental divorce is the issue of most concern for elementary school children. This article describes interventions for children-of-divorce groups for elementary school children. Suggests guidelines related to goal setting; securing agency and parental consent; leadership planning; recruitment, screening, and selection of members; group member…
Petersson, Pia; Blomqvist, Kerstin
2011-03-01
The aim of this study was to make sense of the Swedish concept 'trygghet' by using stories from daily life in a Participatory Action Research project. In Sweden, attempts to implement core values to ensure high quality health and social care for older people are given high priority and concepts such as security and dignity are often used. As concepts are abstract they are difficult to transform into practical work. One group of six assistant nurses and one group of five Registered Nurses working in a municipality participated in Story Dialogue Method and four older women were interviewed. 'Trygghet' was found to be an internal sense - an intrinsic state based on faith and trust in oneself and others called Sense of security. External factors that strengthened Sense of security were to be part of a community, to recognize and be familiar with things and situations and to use various kinds of aids. A prerequisite for the professionals being able to support the care receivers adequately is that they have a sense of security themselves, and that they are allowed to operate in a system that facilitates for the care receivers to maintain trustworthy and reliable relations over time. © 2010 Blackwell Publishing Ltd.
Use of focus groups to study absenteeism due to illness.
Høverstad, T; Kjølstad, S
1991-10-01
Reasons for sick leaves are often complex and influenced by nonmedical factors. We have used focus groups, a qualitative research method, to study the relationship between working conditions and absenteeism due to illness in both an industrial company and an insurance company. We organized 10 focus groups within each company, with participants randomly selected from departments having similar work tasks within each company. According to the groups, the most important working conditions that influenced absenteeism were (a) feeling of well-being at work (mainly defined as security in social relations), (b) the organization of the work, and (c) the department leader. Factors considered to be less important included: number of employees, male/female ratios, group norms for absenteeism, age distribution, work-related illness, substance abuse, and work loads. There was substantial agreement between the groups, indicating that our findings may be relevant to other companies.
Our Nation's Travel: 1995 NPTS Early Results Report
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Review of the transportation planning process in the Denver metropolitan area
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Review of the transportation planning process in the Pittsburgh metropolitan area
DOT National Transportation Integrated Search
2012-11-12
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Brown, Paul; Brown, Marta
2015-03-01
This is a report of a short-term, pastoral counselling group conducted with Jewish internees in a high security prison in Israel. It was held as an adjunct to daily secular individual and group counselling and rehabilitation run by the Department of Social Work. Pastoral counselling employed spiritual and psychosocial methodologies to reduce anger, improve prisoner frustration tolerance, and develop a sense of self-efficacy and communal identity. It combined semi-didactic scriptural input with Pierre Janet's personality model, Fritz Perls' gestalt therapy, and analysis of the group process. © The Author(s) 2015 Reprints and permissions:sagepub.co.uk/journalsPermissions.nav.
SIGAR Special Inspector General for Afghanistan Reconstruction
2017-10-30
Daniel Fisher, Economic and Social Development Subject Matter Expert Emmett Schneider, Funding Subject Matter Expert Clark Irwin, Lead Writer/Editor...governance, economic development, peace and reconciliation, and security issues. Each working group has a matrix of benchmarks—subject to change—to chart...the U.S. efforts to build the Afghan security forces, improve governance, facilitate economic and social development, and combat the sale and
ERIC Educational Resources Information Center
Peker, Adem
2015-01-01
The purpose of this study is to analyze the perceptions of the psychological counselors about their roles and responsibilities related to school security. The study group of the study is formed of 12 psychological counselors working in different school grades in Erzurum city center. The study is formed in qualitative design. Three themes as…
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Health consequences of shift-work: the case of iranian hospital security personnel.
Abedini, Roghayeh; Soltanzadeh, Ahmad; Faghih, Mohammad Amin; Mohammadi, Heidar; Kamalinia, Mojtaba; Mohraz, Majid Habibi; Arassi, Maziyar; Veyseh, Peyman Piran; Aghaei, Hamed; Hosseini, Seyed Younes
2015-01-01
Shift-work, which is an ergonomics issue in workplaces, can negatively affect workers. The security personnel of medical centers in Iran have multiple responsibilities and consequently are exposed to such unwanted situations as observing patients, disputing with patient's attendants, unwanted shift schedules, and being away from family for long periods. This study assessed health problems of Iranian hospital security personnel (shift-worker personnel) using the Survey of Shift-workers (SOS) questionnaire (Persian version). This cross-sectional study was conducted in seven medical centers (4 hospitals and 3 clinics). A total of 416 workers were surveyed: shift-workers (exposed group) (n=209) and non-shift-workers (unexposed group) (n=207). The prevalence of adverse health effects was higher in shift-workers than day-workers. The level of education and mean Body Mass Index (BMI) in shift-workers were significantly higher compared with day-workers. The prevalence of gastrointestinal disorders, cardiovascular and psychological problems were also significantly higher in shift-workers compared with day-workers. Overall, the prevalence of health problems among the security personnel of medical centers was high. Hence, it is recommended that personnel be put under periodic monitoring and receive medical counseling and treatment if there is any disorder.
Review of the transportation planning process in the Portland, Orgeon, metropolitan area
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Review of the transportation planning process in the southern California metropolitan area
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
Review of the transportation planning process in the Minneapolis-St. Paul metropolitan area
DOT National Transportation Integrated Search
2012-11-01
Harmonization Task Groups 1 and 3 (HTG1 and 3) were established by the EU-US International Standards Harmonization Working Group to attempt to harmonize standards (including ISO, CEN, ETSI, IEEE) on security (HTG1) and communications protocols (HTG3)...
[Street child work in Latin American capitals].
Pinzón-Rondón, Angela Maria; Briceño-Ayala, Leonardo; Botero, Juan Carlos; Cabrera, Patricia; Rodríguez, María Nelcy
2006-01-01
To identify the age, sex, mobility, education, work activity, working hours, street dwelling, and social security coverage in a group of children working in the streets in capital cities in Latin America. Cross sectional study. A questionnaire was applied to 972 children working in the streets of Bogotá, Guatemala City, Mexico City, Quito and San Salvador. A total of 63.3% subjects were boys; 39% were children from displaced families; 18% lived in the streets; 62% worked more than 40 hours per week; 19% were covered by the social security system, and 32% were street vendors. The behavior of variables differed significantly by city. Child labor in the streets is a dangerous activity characterized by long working hours and exposure to risk factors. Child work has different characteristics in each of the cities studied, which suggests that the solution to the problem must be designed on a case by case basis.
Successful practices in the use of secure e-mail.
Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt
2014-01-01
Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 "super user" physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients.
The changing face of Hanford security 1990--1994
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thielman, J.
The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almostmore » literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.« less
Nuclear Forensics: Report of the AAAS/APS Working Group
NASA Astrophysics Data System (ADS)
Tannenbaum, Benn
2008-04-01
This report was produced by a Working Group of the American Physical Society's Program on Public Affairs in conjunction with the American Association for the Advancement of Science Center for Science, Technology and Security Policy. The primary purpose of this report is to provide the Congress, U.S. government agencies and other institutions involved in nuclear forensics with a clear unclassified statement of the state of the art of nuclear forensics; an assessment of its potential for preventing and identifying unattributed nuclear attacks; and identification of the policies, resources and human talent to fulfill that potential. In the course of its work, the Working Group observed that nuclear forensics was an essential part of the overall nuclear attribution process, which aims at identifying the origin of unidentified nuclear weapon material and, in the event, an unidentified nuclear explosion. A credible nuclear attribution capability and in particular nuclear forensics capability could deter essential participants in the chain of actors needed to smuggle nuclear weapon material or carry out a nuclear terrorist act and could also encourage states to better secure such materials and weapons. The Working Group also noted that nuclear forensics result would take some time to obtain and that neither internal coordination, nor international arrangements, nor the state of qualified personnel and needed equipment were currently enough to minimize the time needed to reach reliable results in an emergency such as would be caused by a nuclear detonation or the intercept of a weapon-size quantity of material. The Working Group assesses international cooperation to be crucial for forensics to work, since the material would likely come from inadequately documented foreign sources. In addition, international participation, if properly managed, could enhance the credibility of the deterrent effect of attribution. Finally the Working Group notes that the U.S. forensics capability involved a number of agencies and other groups that would have to cooperate rapidly in an emergency and that suitable exercises to ensure such cooperation were needed.
Hybrid methods for cybersecurity analysis :
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davis, Warren Leon,; Dunlavy, Daniel M.
2014-01-01
Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling andmore » analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.« less
Marketing Strategy and Implementation
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
This report documents the marketing campaign that has been designed for middle and high school students in New Mexico to increase interest in participation in national security careers at the National Nuclear Security Administration. This marketing campaign builds on the research that was previously conducted, as well as the focus groups that were conducted. This work is a part of the National Nuclear Security Preparedness Project (NSPP) being performed under a Department of Energy (DOE) / National Nuclear Security Administration (NNSA) grant. Outcome analysis was performed to determine appropriate marketing strategies. The analysis was based upon focus groups with middlemore » school and high school students, student interactions, and surveys completed by students to understand and gauge student interest in Science, Technology, Engineering, and Math (STEM) subjects, interest in careers at NNSA, future job considerations, and student desire to pursue post-secondary education. Further, through the focus groups, students were asked to attend a presentation on NNSA job opportunities and employee requirements. The feedback received from the students was utilized to develop the focus and components of the marketing campaign.« less
76 FR 64895 - Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-10-19
... Session 1. Welcome and Introductions. 2. Working Group Reports. 3. Industry Presentation: Autonomous Vehicle. 4. Industry Presentation: Technology Export Controls. 5. Industry Presentation: Security as a...
NASA Technical Reports Server (NTRS)
Iannicca, Dennis C.; McKim, James H.; Stewart, David H.; Thadhani, Suresh K.; Young, Daniel P.
2015-01-01
NASA Glenn Research Center, in cooperation with Rockwell Collins, is working to develop a prototype Control and Non-Payload Communications (CNPC) radio platform as part of NASA Integrated Systems Research Program's (ISRP) Unmanned Aircraft Systems (UAS) Integration in the National Airspace System (NAS) project. A primary focus of the project is to work with the FAA and industry standards bodies to build and demonstrate a safe, secure, and efficient CNPC architecture that can be used by industry to evaluate the feasibility of deploying a system using these technologies in an operational capacity. GRC has been working in conjunction with these groups to assess threats, identify security requirements, and to develop a system of standards-based security controls that can be applied to the current GRC prototype CNPC architecture as a demonstration platform. The security controls were integrated into a lab test bed mock-up of the Mobile IPv6 architecture currently being used for NASA flight testing, and a series of network tests were conducted to evaluate the security overhead of the controls compared to the baseline CNPC link without any security. The aim of testing was to evaluate the performance impact of the additional security control overhead when added to the Mobile IPv6 architecture in various modes of operation. The statistics collected included packet captures at points along the path to gauge packet size as the sample data traversed the CNPC network, round trip latency, jitter, and throughput. The effort involved a series of tests of the baseline link, a link with Robust Header Compression (ROHC) and without security controls, a link with security controls and without ROHC, and finally a link with both ROHC and security controls enabled. The effort demonstrated that ROHC is both desirable and necessary to offset the additional expected overhead of applying security controls to the CNPC link.
No information flow using statistical fluctuations and quantum cryptography
NASA Astrophysics Data System (ADS)
Larsson, Jan-Åke
2004-04-01
The communication protocol of Home and Whitaker [
A Security Architecture for Grid-enabling OGC Web Services
NASA Astrophysics Data System (ADS)
Angelini, Valerio; Petronzio, Luca
2010-05-01
In the proposed presentation we describe an architectural solution for enabling a secure access to Grids and possibly other large scale on-demand processing infrastructures through OGC (Open Geospatial Consortium) Web Services (OWS). This work has been carried out in the context of the security thread of the G-OWS Working Group. G-OWS (gLite enablement of OGC Web Services) is an international open initiative started in 2008 by the European CYCLOPS , GENESI-DR, and DORII Project Consortia in order to collect/coordinate experiences in the enablement of OWS's on top of the gLite Grid middleware. G-OWS investigates the problem of the development of Spatial Data and Information Infrastructures (SDI and SII) based on the Grid/Cloud capacity in order to enable Earth Science applications and tools. Concerning security issues, the integration of OWS compliant infrastructures and gLite Grids needs to address relevant challenges, due to their respective design principles. In fact OWS's are part of a Web based architecture that demands security aspects to other specifications, whereas the gLite middleware implements the Grid paradigm with a strong security model (the gLite Grid Security Infrastructure: GSI). In our work we propose a Security Architectural Framework allowing the seamless use of Grid-enabled OGC Web Services through the federation of existing security systems (mostly web based) with the gLite GSI. This is made possible mediating between different security realms, whose mutual trust is established in advance during the deployment of the system itself. Our architecture is composed of three different security tiers: the user's security system, a specific G-OWS security system, and the gLite Grid Security Infrastructure. Applying the separation-of-concerns principle, each of these tiers is responsible for controlling the access to a well-defined resource set, respectively: the user's organization resources, the geospatial resources and services, and the Grid resources. While the gLite middleware is tied to a consolidated security approach based on X.509 certificates, our system is able to support different kinds of user's security infrastructures. Our central component, the G-OWS Security Framework, is based on the OASIS WS-Trust specifications and on the OGC GeoRM architectural framework. This allows to satisfy advanced requirements such as the enforcement of specific geospatial policies and complex secure web service chained requests. The typical use case is represented by a scientist belonging to a given organization who issues a request to a G-OWS Grid-enabled Web Service. The system initially asks the user to authenticate to his/her organization's security system and, after verification of the user's security credentials, it translates the user's digital identity into a G-OWS identity. This identity is linked to a set of attributes describing the user's access rights to the G-OWS services and resources. Inside the G-OWS Security system, access restrictions are applied making use of the enhanced Geospatial capabilities specified by the OGC GeoXACML. If the required action needs to make use of the Grid environment the system checks if the user is entitled to access a Grid infrastructure. In that case his/her identity is translated to a temporary Grid security token using the Short Lived Credential Services (IGTF Standard). In our case, for the specific gLite Grid infrastructure, some information (VOMS Attributes) is plugged into the Grid Security Token to grant the access to the user's Virtual Organization Grid resources. The resulting token is used to submit the request to the Grid and also by the various gLite middleware elements to verify the user's grants. Basing on the presented framework, the G-OWS Security Working Group developed a prototype, enabling the execution of OGC Web Services on the EGEE Production Grid through the federation with a Shibboleth based security infrastructure. Future plans aim to integrate other Web authentication services such as OpenID, Kerberos and WS-Federation.
Successful Practices in the Use of Secure E-mail
Johnson, Laura W; Garrido, Terhilda; Christensen, Kate; Handley, Matt
2014-01-01
Physician use of secure e-mail with patients is anticipated to increase under Stage 2 Meaningful Use requirements, but little is known about how physicians can successfully incorporate it into daily work. We interviewed 27 “super user” physicians at Kaiser Permanente and Group Health who were identified by leaders as being technologically, operationally, and clinically adept and as having high levels of secure e-mail use with patients. They highly valued the use of secure e-mail with patients, despite concerns about a lack of adequate time to respond, and provided tips for using it successfully. They identified benefits that included better care and improved relationships with their patients. PMID:24937149
Weak and Failing States: Evolving Security Threats and U.S. Policy
2007-11-15
operate in both “ caves ” (i.e., failed states, where militant groups can exist CRS-6 11 Rabasa (2007), ibid. 12 U.S. Government Interagency Working Group...Support to Low-Income Countries Under Stress (Washington, DC: The World Bank, 2006); Chauvet and Collier, “Helping Hand? Aid to Failing States...Oxford University Working Paper (2006). 24 See Chauvet and Collier (2004), op. cit.; Francois Bourguignon, “Broadening Progress Toward the MDGs,” Speech
Weak and Failing States: Evolving Security Threats and U.S. Policy
2007-11-15
operate in both “ caves ” (i.e., failed states, where militant groups can exist CRS-6 11 Rabasa (2007), ibid. 12 U.S. Government Interagency Working Group...Support to Low-Income Countries Under Stress (Washington, DC: The World Bank, 2006); Chauvet and Collier, “Helping Hand? Aid to Failing States,” Oxford...University Working Paper (2006). 24 See Chauvet and Collier (2004), op. cit.; Francois Bourguignon, “Broadening Progress Toward the MDGs,” Speech
Krüger, Jenny K; Suchan, Boris
2016-01-01
Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed.
Preschool Teachers' Views on Schools' Indoor and Outdoor Environment Safety
ERIC Educational Resources Information Center
Konakli, Tugba; Ülçetin, Esra
2016-01-01
The aim of this research is to analyze opinions of teachers who work in preschool education institutions concerning precautions that should be taken for indoor and outdoor security. Study group of this research is determined by criterion sampling from purposeful sampling techniques. The study group of this research is consist of eight preschool…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-26
... International Law (ACPIL)--Online Dispute Resolution (ODR) Study Group The Office of the Assistant Legal Adviser... guidelines and minimum requirements for online dispute resolution providers and arbitrators, substantive... that the working group is addressing is the identification of security issues relating to use of the...
Employment Trajectories Beyond Retirement.
Burkert, Carola; Hochfellner, Daniela
2017-01-01
Within the political and academic debate on working longer, post-retirement employment is discussed as an alternative to maintain older workers in the labor market. Our article enhances this discussion by studying determinants of transitions into post-retirement jobs within differing work environments of birth cohorts 1940-1942. We estimate proportional subhazard models accounting for competing risks using unique German social security data linked to pension accounts. Our findings suggest that individuals' preferences to take up post-retirement jobs are not mutually exclusive. Our study provides evidence that taking up post-retirement jobs is related to seeking financial security, continuity, and work ability, suggesting that public policy has to develop target-oriented support through a public policy mix of different measures aligned to the different peer groups in the labor market.
Attachment anxiety benefits from security priming: Evidence from working memory performance
2018-01-01
The present study investigates the relationship between the attachment dimensions (anxious vs. avoidance) and the cognitive performance of individuals, specifically whether the attachment dimensions would predict the working memory (WM) performance. In the n-back task, reflecting the WM capacity, both attachment related and non-attachment related words were used. Participants were randomly assigned into two groups that received either the secure or the neutral subliminal priming. In the secure priming condition, the aim was to induce sense of security by presenting secure attachment words prior to the n-back task performance. In neutral priming condition, neutral words that did not elicit sense of security were presented. Structural equation modeling revealed divergent patterns for attachment anxiety and avoidance dimensions under the different priming conditions. In neutral priming condition, WM performance declined in terms of capacity in the n-back task for individuals who rated higher levels of attachment anxiety. However in the secure priming condition, WM performance was boosted in the n-back task for individuals who rated higher levels of attachment anxiety. In other words, the subliminal priming of the security led to increased WM capacity of individuals who rated higher levels of attachment anxiety. This effect, however, was not observed for higher levels of attachment avoidance. Results are discussed along the lines of hyperactivation and deactivation strategies of the attachment system. PMID:29522549
Case Studies Working Group Report Volume 2
2012-03-01
necessarily reflect the official policy or position of the De- partment of the Army, the Department of Defense, or the U.S. Government . Authors of...able to handle complex 21st century issues by working col- laboratively across government or agency boundaries. In diagnosing key systemic...nonprofit, public interest organiza- tion working to revitalize the American government by transforming the national security system. Since the
75 FR 4047 - Materials Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-26
... the Bureau of Industry and Security Management. 3. Industry Presentation on Composite Technology. 4. Report of Composite Working group and ECCN review subgroup. 5. New business. Closed Session 6. Discussion...
Disability at Work: A Look Back and Forward.
Schur, Lisa; Han, Kyongji; Kim, Andrea; Ameri, Mason; Blanck, Peter; Kruse, Douglas
2017-12-01
Purpose This article presents new evidence on employment barriers and workplace disparities facing employees with disabilities, linking the disparities to employee attitudes. Methods Analyses use the 2006 General Social Survey to connect disability to workplace disparities and attitudes in a structural equation model. Results Compared to employees without disabilities, those with disabilities report: lower pay levels, job security, and flexibility; more negative treatment by management; and, lower job satisfaction but similar organizational commitment and turnover intention. The lower satisfaction is mediated by lower job security, less job flexibility, and more negative views of management and co-worker relations. Conclusion Prior research and the present findings show that people with disabilities experience employment disparities that limit their income, security, and overall quality of work life. Technology plays an increasingly important role in decreasing employment disparities. However, there also should be increased targeted efforts by government, employers, insurers, occupational rehabilitation providers, and disability groups to address workplace barriers faced by employees with disabilities, and by those with disabilities seeking to return to work.
Care control and collaborative working in a prison hospital.
Foster, John; Bell, Linda; Jayasinghe, Neil
2013-03-01
This paper reports findings from a qualitative research project, using interviews, focus groups and participant observations, which sought to investigate "good practice" in a nurse-led prison hospital wing for male prisoners. The study raised issues about tensions between "caring" and "control" of prisoners from the perspectives of professionals working or visiting the wing. This paper discusses collaborative working between professionals from different backgrounds, including nurses and healthcare (prison) officers who were based on the wing and others who visited such as probation, medical, Inreach team or Counselling Advice, Referral, Assessment and Through Care team staff (CARAT). The key finding was that there is a balance between therapy and security/risk. In order to maintain this, the two main groups based on the hospital wing--nurses and prison officers--moved between at times cooperating, coordinating and collaborating with each other to maintain this balance. Other themes were care and control, team working, individual and professional responsibilities and communication issues. Enhancing the role of nurses should be encouraged so that therapy remains paramount, and we conclude with some recommendations to encourage collaborative working in prison healthcare settings to ensure that therapy continues to be paramount while security and safety are maintained.
The Impact of Social Security on Return Migration among Latin American Elderly in the U.S.
Vega, Alma
2014-01-01
International migration has long been considered the preserve of working-age adults. However, the rapid diversification of the elderly population calls for increased attention to the migration patterns of this group and its possible motivations. This study examines whether Latin American immigrants who are primary Social Security beneficiaries are more likely to return to their home countries during later life if they receive lower Social Security benefits. Using a regression discontinuity approach on restricted data from the U.S. Social Security Administration (N=1,515), this study presents the results of a natural experiment whereby the Social Security Administration unexpectedly lowered the Social Security benefits of the 1917-1921 birth cohorts due to a miscalculation in the benefit-calculation formula. Results suggest that approximately 10% of primary Social Security beneficiaries from Latin America born close to these dates return migrated, the probability of which was not affected by Social Security benefit levels. PMID:26279596
No information flow using statistical fluctuations and quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Larsson, Jan-Aake
2004-04-01
The communication protocol of Home and Whitaker [Phys. Rev. A 67, 022306 (2003)] is examined in some detail, and found to work equally well using a separable state. The protocol is in fact completely classical, based on postselection of suitable experimental runs. The quantum-cryptography protocol proposed in the same publication is also examined, and this protocol uses entanglement, a strictly quantum property of the system. An individual eavesdropping attack on each qubit pair would be detected by the security test proposed in the mentioned paper. However, the key is provided by groups of qubits, and there exists a coherent attack,more » internal to these groups, that will go unnoticed in that security test. A modified test is proposed here that will ensure security, even against such a coherent attack.« less
Psychosocial predictors of cannabis use in adolescents at risk.
Hüsler, Gebhard; Plancherel, Bernard; Werlen, Egon
2005-09-01
This research has tested a social disintegration model in conjunction with risk and protection factors that have the power to differentiate relative, weighted interactions among variables in different socially disintegrated groups. The model was tested in a cross-sectional sample of 1082 at-risk youth in Switzerland. Structural equation analyses show significant differences between the social disintegration (low, moderate, high) groups and gender, indicating that the model works differently for groups and for gender. For the highly disintegrated adolescents results clearly show that the risk factors (negative mood, peer network, delinquency) are more important than the protective factors (family relations, secure sense of self). Family relations lose all protective value against negative peer influence, but personal variables, such as secure self, gain protective power.
Towards a Scalable Group Vehicle-based Security System
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carter, Jason M
2016-01-01
In August 2014, the National Highway Traffic Safety Administration (NHTSA) proposed new rulemaking to require V2V communication in light vehicles. To establish trust in the basic safety messages (BSMs) that are exchanged by vehicles to improve driver safety, a vehicle public key infrastructure (VPKI) is required. We outline a system where a group or groups of vehicles manage and generate their own BSM signing keys and authenticating certificates -- a Vehicle-Based Security System (VBSS). Based on our preliminary examination, we assert the mechanisms exist to implement a VBSS that supports V2V communications; however, maintaining uniform trust throughout the system whilemore » protecting individual privacy does require reliance on nascent group signature technology which may require a significant amount of communication overhead for trust maintenance. To better evaluate the VBSS approach, we compare it to the proposed Security Credential Management System (SCMS) in four major areas including bootstrapping, pseudonym provisioning, BSM signing and authentication, and revocation. System scale, driver privacy, and the distribution and dynamics of participants make designing an effective VPKI an interesting and challenging problem; no clear-cut strategy exists to satisfy the security and privacy expectations in a highly efficient way. More work is needed in VPKI research, so the life-saving promise of V2V technology can be achieved.« less
Disparities, Decent Work, and Multidisciplinary Research: Expanded Roles for CD and HRD
ERIC Educational Resources Information Center
Hite, Linda M.; McDonald, Kimberly S.
2018-01-01
This article focuses on how HRD research can better address some of the barriers to inclusive career development and secure employment. Beginning with the concept of decent work, we suggest expanding the scope of studies on workplace inequities, encouraging HRD to push further into disparities facing under-represented identity groups and including…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-16
... working groups will be presenting their proposed recommendations on issues such as public safety... regarding the CSRIC can be found at: http://www.fcc.gov/pshs/advisory/csric/ . Federal Communications...
Meyer, Sarah R; Decker, Michele R; Tol, Wietse A; Abshir, Nada; Mar, Aye Aye; Robinson, W Courtland
2016-05-01
Migrant workers in low-resource settings may experience multiple types of workplace and security-related stressors. This study explores the relationship between these stressors and adverse mental health outcomes, through a study of migrant workers from Myanmar, working in agriculture, factory, and sex industries in and around Mae Sot, Thailand. Respondent-driven sampling was used to recruit a total sample of 589 male and female migrants. Trained data collectors administered a survey, which included measures of workplace and security-related stressors, and depression and anxiety symptoms. Multivariate regression models were conducted separately for depression and anxiety symptoms. For male agricultural workers, security stressors (β = 1.9, p = .001) are associated with an increase in depression symptoms and coercive working conditions are associated with an increase in anxiety symptoms (β = .8, p = .000). For female agricultural workers, daily hassles and stressors were associated with both depression (β = 1.5, p = .000) and anxiety (β = .5, p = .027), and barriers to exit (β = 3.0, p = .005) and security stressors (β = .9, p = .010) were significantly associated with increased depression symptoms. In the factory subsample, sexual assault and abuse (depression: β = 2.7, p = .009; anxiety: β = 2.8, p = .002) and daily hassles and stressors (depression: β = .7, p = .007; anxiety: β = .7, p = .001) were both significantly associated with increased depression and anxiety symptoms for males. Other categories of stressors similarly showed different associations with mental health outcomes between occupational groups, and between male and female migrant workers. The differing influences of stressors on mental health between the three occupational groups, and between males and females, indicate the need for targeted and tailored approaches to reduce specific stressors and improve services to address mental health needs. Prevention and response need to recognize the differences in working conditions, vulnerabilities, and needs between occupational groups, and between male and female migrant workers.
The Origin of the United States Security Commitment to the Republic of Korea
1987-06-01
and war and of the effect of these objectives on our strategic plans, in the light of the probable fission bomb capability and possible thermonuclear ... bomb capability of the Soviet Union. 226 A special ad hoc working group was formed under Nitze to conduct this study. This group took advantage of the
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-21
... International Law (ACPIL)--Online Dispute Resolution (ODR) Study Group The Office of the Assistant Legal Adviser... UNCITRAL ODR Working Group, scheduled for November 5-9 in Vienna, and will specifically address security issues relating to the use of the ODR Rules, including measures to address the risk of fraud involving...
2013-09-01
incidents beyond wild land fires.15 This journal article also noted that national IMTs provided command functions at the World Trade Center on September...11, 2001, Hurricane Katrina in 2005 and search and recovery efforts following the Space Shuttle Columbia disaster.16 Because of the utility and...Management Team SWA Southwest Area SWCC Southwest Coordination Center UASI Urban Area Security Initiative UAWG Urban Area Working Group
Shelton, Shoshana R; Connor, Kathryn; Uscher-Pines, Lori; Pillemer, Francesca Matthews; Mullikin, James M; Kellermann, Arthur L
2012-12-01
The federal government plays a critical role in achieving national health security by providing strategic guidance and funding research to help prevent, respond to, mitigate, and recover from disasters, epidemics, and acts of terrorism. In this article we describe the first-ever inventory of nonclassified national health security-related research funded by civilian agencies of the federal government. Our analysis revealed that the US government's portfolio of health security research is currently weighted toward bioterrorism and emerging biological threats, laboratory methods, and development of biological countermeasures. Eight of ten other priorities identified in the Department of Health and Human Services' National Health Security Strategy-such as developing and maintaining a national health security workforce or incorporating recovery into planning and response-receive scant attention. We offer recommendations to better align federal spending with health security research priorities, including the creation of an interagency working group charged with minimizing research redundancy and filling persistent gaps in knowledge.
Security Management and Safeguards Office
NASA Technical Reports Server (NTRS)
Bewley, Nathaniel M.
2004-01-01
The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are in a safe environment.
Assessment of private security guards by Suicide Probability Scale and Brief Symptom Inventory.
Dogan, Bulent; Canturk, Gurol; Canturk, Nergis; Guney, Sevgi; Özcan, Ebru
2016-01-01
The aim of the present study was to investigate the influence of suicide probability and relevant sociodemographic features and to provide information for preventing suicide in private security guards working under the stressful conditions and continuous exposure to the negative and traumatic life events. 200 private security guards and 200 personnels of Ankara University participated in the study. A sociodemographic information questionnaire, the Suicide Probability Scale (SPS) and the Brief Symptom Inventory (BSI) were used to collect the data. Gender, marital status, income, religious beliefs, experiencing a life-threatening situation, history of a suicide attempt, smoking and not having a chronic disease caused statistically significant differences in the scores for SPS between the private security guards group and the controls. Moreover there was a statistically significant positive correlation between the total scores of the subscales of SPS and the total scores of BSI. Like police officers and gendarmes, private security guards are at high risk of committing and attempting suicide because of being at stressful work settings and also suffering from secondary trauma. It is required that they should be aware of their tendency to commit suicide and have regular psychiatric screenings.
Informal work, unemployment and health in Brazilian metropolitan areas, 1998 and 2003.
Giatti, Luana; Barreto, Sandhi Maria; César, Cibele Comini
2008-10-01
This study investigates whether employment with no social security, as well as short and long term unemployment are associated with worse health among Brazilians. The representative study sample was taken from two National Health Surveys and included men aged between 15 and 64 who lived in one of the eight metropolitan regions of Brazil in 1998 (n = 31,870) and 2003 (n = 32,887). Both surveys showed that full and part time workers with no social security, as well as those in short and long term (> 12 months) unemployment had worse health indicators, regardless of age or schooling, when compared with full-time workers (> 40 hours/week) who had some form of social security through their employment. Hepatic cirrhosis was the disease most strongly associated with labor market status. Its prevalence was higher among individuals in long term unemployment and those with no social security. Labor market status was also negatively associated with the use of health care services, especially medical visits. The present study shows that the absence of social security at work, unemployment and length of unemployment, characterize heterogeneous groups of individuals in relation to health. Results reinforce the need to incorporate labor market status in research into health inequalities.
Social Media Working Group Act of 2014
Rep. Brooks, Susan W. [R-IN-5
2014-03-14
Senate - 07/09/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:
Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction
NASA Astrophysics Data System (ADS)
Leverrier, Anthony
2017-05-01
Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U (n ) (instead of the symmetric group Sn as in usual de Finetti theorems), and by introducing generalized S U (2 ,2 ) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.
Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction.
Leverrier, Anthony
2017-05-19
Establishing the security of continuous-variable quantum key distribution against general attacks in a realistic finite-size regime is an outstanding open problem in the field of theoretical quantum cryptography if we restrict our attention to protocols that rely on the exchange of coherent states. Indeed, techniques based on the uncertainty principle are not known to work for such protocols, and the usual tools based on de Finetti reductions only provide security for unrealistically large block lengths. We address this problem here by considering a new type of Gaussian de Finetti reduction, that exploits the invariance of some continuous-variable protocols under the action of the unitary group U(n) (instead of the symmetric group S_{n} as in usual de Finetti theorems), and by introducing generalized SU(2,2) coherent states. Crucially, combined with an energy test, this allows us to truncate the Hilbert space globally instead as at the single-mode level as in previous approaches that failed to provide security in realistic conditions. Our reduction shows that it is sufficient to prove the security of these protocols against Gaussian collective attacks in order to obtain security against general attacks, thereby confirming rigorously the widely held belief that Gaussian attacks are indeed optimal against such protocols.
Krüger, Jenny K.; Suchan, Boris
2016-01-01
Aviation security screeners analyze a large number of X-ray images per day and seem to be experts in mentally rotating diverse kinds of visual objects. A robust gender-effect that men outperform women in the Vandenberg & Kuse mental rotation task has been well documented over the last years. In addition it has been shown that training can positively influence the overall task-performance. Considering this, the aim of the present study was to investigate whether security screeners show better performance in the Mental Rotation Test (MRT) independently of gender. Forty-seven security screeners of both sexes from two German airports were examined with a computer based MRT. Their performance was compared to a large sample of control subjects. The well-known gender-effect favoring men on mental rotation was significant within the control group. However, the security screeners did not show any sex differences suggesting an effect of training and professional performance. Surprisingly this specialized group showed a lower level of overall MRT performance than the control participants. Possible aviation related influences such as secondary effects of work-shift or expertise which can cumulatively cause this result are discussed. PMID:27014142
New Brunswick Laboratory. Progress report, October 1995--September 1996
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
Fiscal year (FY) 1996 was a very good year for New Brunswick Laboratory (NBL), whose major sponsor is the Office of Safeguards and Security (NN-51) in the US Department of Energy (DOE), Office of Nonproliferation and National Security, Office of Security Affairs. Several projects pertinent to the NBL mission were completed, and NBL`s interactions with partners and customers were encouraging. Among the partners with which NBL interacted in this report period were the International Atomic Energy Agency (IAEA), NN-51. Environmental Program Group of the DOE Chicago Operations Office, International Safeguards Project Office, Waste Isolation Pilot Plant (WIPP), Ukraine Working Group,more » Fissile Materials Assurance Working Group, National Institute of Standards and Technology (NIST), Nuclear Regulatory Commission (NRC), Institute for Reference Materials and Measurements (IRMM) in Belgium, Brazilian/Argentine Agency for Accounting and Control of Nuclear Materials (ABACC), Lockheed Idaho Technologies Company, and other DOE facilities and laboratories. NBL staff publications, participation in safeguards assistance and other nuclear programs, development of new reference materials, involvement in the updating and refinement of DOE documents, service in enhancing the science education of others, and other related activities enhanced NBL`s status among DOE laboratories and facilities. Noteworthy are the facts that NBL`s small inventory of nuclear materials is accurately accounted for, and, as in past years, its materials and human resources were used in peaceful nuclear activities worldwide.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-20
... for collaboration or joint work. ED204-SG4: Review the SOW of both groups, determine if full or partly... the expectations of the audience well understood? How will the work progress, fully joint, partly... Publication (separate in ED210 or integrated). 11:00 to 11:15: Break. 11:15 to 11:30: Discuss collaboration...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-02
... basis for collaboration or joint work. ED204-SG4: Review the SOW of both groups, determine if full or... the expectations of the audience well understood? How will the work progress, fully joint, partly... Publication (separate in ED210 or integrated). 11:00 to 11:15: Break. 11:15 to 11:30: Discuss collaboration...
Møller, Karina Lauenborg; Thygesen, Lau Caspar; Schipperijn, Jasper; Loft, Steffen; Bonde, Jens Peter; Mikkelsen, Sigurd; Brauer, Charlotte
2014-01-01
Background Exposure to ultrafine particles (UFP) has been linked to cardiovascular and lung diseases. Combustion of jet fuel and diesel powered handling equipment emit UFP resulting in potentially high exposure levels among employees working at airports. High levels of UFP have been reported at several airports, especially on the apron, but knowledge on individual exposure profiles among different occupational groups working at an airport is lacking. Purpose The aim of this study was to compare personal exposure to UFP among five different occupational groups working at Copenhagen Airport (CPH). Method 30 employees from five different occupational groups (baggage handlers, catering drivers, cleaning staff and airside and landside security) at CPH were instructed to wear a personal monitor of particle number concentration in real time and a GPS device. The measurements were carried out on 8 days distributed over two weeks in October 2012. The overall differences between the groups were assessed using linear mixed model. Results Data showed significant differences in exposure levels among the groups when adjusted for variation within individuals and for effect of time and date (p<0.01). Baggage handlers were exposed to 7 times higher average concentrations (geometric mean, GM: 37×103 UFP/cm3, 95% CI: 25–55×103 UFP/cm3) than employees mainly working indoors (GM: 5×103 UFP/cm3, 95% CI: 2–11×103 UFP/cm3). Furthermore, catering drivers, cleaning staff and airside security were exposed to intermediate concentrations (GM: 12 to 20×103 UFP/cm3). Conclusion The study demonstrates a strong gradient of exposure to UFP in ambient air across occupational groups of airport employees. PMID:25203510
Møller, Karina Lauenborg; Thygesen, Lau Caspar; Schipperijn, Jasper; Loft, Steffen; Bonde, Jens Peter; Mikkelsen, Sigurd; Brauer, Charlotte
2014-01-01
Exposure to ultrafine particles (UFP) has been linked to cardiovascular and lung diseases. Combustion of jet fuel and diesel powered handling equipment emit UFP resulting in potentially high exposure levels among employees working at airports. High levels of UFP have been reported at several airports, especially on the apron, but knowledge on individual exposure profiles among different occupational groups working at an airport is lacking. The aim of this study was to compare personal exposure to UFP among five different occupational groups working at Copenhagen Airport (CPH). 30 employees from five different occupational groups (baggage handlers, catering drivers, cleaning staff and airside and landside security) at CPH were instructed to wear a personal monitor of particle number concentration in real time and a GPS device. The measurements were carried out on 8 days distributed over two weeks in October 2012. The overall differences between the groups were assessed using linear mixed model. Data showed significant differences in exposure levels among the groups when adjusted for variation within individuals and for effect of time and date (p<0.01). Baggage handlers were exposed to 7 times higher average concentrations (geometric mean, GM: 37×103 UFP/cm(3), 95% CI: 25-55 × 10(3) UFP/cm(3)) than employees mainly working indoors (GM: 5 × 10(3) UFP/cm(3), 95% CI: 2-11 × 103 UFP/cm(3)). Furthermore, catering drivers, cleaning staff and airside security were exposed to intermediate concentrations (GM: 12 to 20 × 10(3) UFP/cm(3)). The study demonstrates a strong gradient of exposure to UFP in ambient air across occupational groups of airport employees.
Cohort profile: the Spanish WORKing life Social Security (WORKss) cohort study.
López Gómez, María Andrée; Durán, Xavier; Zaballa, Elena; Sanchez-Niubo, Albert; Delclos, George L; Benavides, Fernando G
2016-03-07
The global economy is changing the labour market and social protection systems in Europe. The effect of both changes on health needs to be monitored in view of an ageing population and the resulting increase in prevalence of chronic health conditions. The Spanish WORKing life Social Security (WORKss) cohort study provides unique longitudinal data to study the impact of labour trajectories and employment conditions on health, in terms of sickness absence, permanent disability and death. The WORKss cohort originated from the Continuous Working Life Sample (CWLS) generated by the General Directorate for the Organization of the Social Security in Spain. The CWLS contains a 4% representative sample of all individuals in contact with the Social Security system. The WORKss cohort exclusively includes individuals with a labour trajectory from 1981 or later. In 2004, the cohort was initiated with 1,022 ,79 Social Security members: 840,770 (82.2%) contributors and 182,009 (17.8%) beneficiaries aged 16 and older. The WORKss cohort includes demographic characteristics, chronological data about employment history, retirement, permanent disability and death. These data make possible the measurement of incidence of permanent disability, the number of potential years of working life lost, and the number of contracts and inactive periods with the Social Security system. The WORKss cohort was linked to temporary sickness absence registries to study medical diagnoses that lead to permanent disability and consequently to an earlier exit from the labour market in unhealthy conditions. Thanks to its administrative source, the WORKss cohort study will continue follow-up in the coming years, keeping the representativeness of the Spanish population affiliated to the Social Security system. The linkage between the WORKss cohort and temporary sickness absence registries is envisioned to continue. Future plans include the linkage of the cohort with mortality registries. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/
2010-01-01
asserted that in Africa, the general form this problem takes today might be different than the form it took in the past. Citing the 1994 Rwanda case as...community in promoting U.S. response to the genocide there. African Security Challenges: Now and Over the Horizon Working Group Discussion Report...nightmare scenario for humanitarian organizations and ultimately led to international war between Rwanda and Zaire. Using Rwanda as a reference
The Landscape of International Biosurveillance
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hartley, David M.; Nelson, Noele P.; Walters, Ronald A.
2010-02-01
Event-based biosurveillance is a scientific discipline in which diverse streams of data, available from the Internet, are characterized prospectively to provide information on infectious disease events. Biosurveillance complements traditional public health surveillance to provide both early warning of infectious disease events as well as situational awareness. The Global Health Security Action Group (GHSAG) of the Global Health Security Initiative is developing a biosurveillance capability that integrates and leverages component systems from member nations. This work discusses these biosurveillance systems and identifies needed future studies.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-23
... security and foreign policy reasons. Agenda 1. Opening remarks by the Chairman and Vice Chairman. 2. Export Control Reform Update. 3. Presentation of Papers or Comments by the Public. 4. Working Group Updates. 5...
FY71 Engineering Report on Surveillance Techniques for Civil Aviation Security
DOT National Transportation Integrated Search
1971-11-01
This document discusses the work performed by the TSC task group on surveillance techniques in FY71. The principal section is devoted to the technical description, classification and evaluation of commercial metal detectors for concealed weapons. It ...
A resolution extending the authority for the Senate National Security Working Group.
Sen. Reid, Harry [D-NV
2010-12-22
Senate - 12/22/2010 Submitted in the Senate, considered, and agreed to without amendment by Unanimous Consent. (All Actions) Tracker: This bill has the status Agreed to in SenateHere are the steps for Status of Legislation:
Secure HL7 transactions using Internet mail (Internet draft).
Schadow, Gunther; Tucker, Mark; Rishel, Wes
2002-01-01
The document describes the applicability of the Internet standardisation efforts on secure electronic data interchange (EDI) transactions for Health Level-7 (HL7), an EDI standard for Healthcare used world-wide. The document heavily relies on the work in progress by the IETF EDIINT working group. It is in most parts a restatement of the EDIINTs requirements document and application statement 1 (AS#1) tailored to the needs of the HL7 audience. The authors tried to make the document as self consistent as possible. The goal is to give to the reader who is not a security or Internet standards expert enough foundational and detail information to enable him to build communication software that complies to the Internet standards. Even though the authors rely on and promote the respective Internet standards and drafts, they did not withstand from commenting on and criticising the work where they see upcoming problems in use with HL7 or other EDI protocols that have not been in the initial focus of the EDIINT working group. The authors make suggestions to add parameters to the specification of the MIME type for EDI messages in RFC 1767 in order to enhance functionality. The authors give use cases for a larger subset of disposition types and modifiers of message disposition notifications. One key issue where the document goes beyond the current EDIINT drafts is the concept of non-repudiation of commitment to an EDI transaction. Secure EDI transactions should be regarded as "distributed contracts," i.e. not only the sending and receiving of single messages should be non-refutable but also the connection between messages interchanges. In anticipation of this requirement HL7 usually requires a response message to be sent to acknowledge every transaction. The authors therefore have the requirement to securely couple an EDI response message to its request message. Given the current shape of RFC 1767 this is generally possible only if a response message is coupled with an MDN receipt and the combination of both signed by the responder. The document describes a protocol to bundle MDN and response that uses the MIME multi-part/related content type in RFC 2112.
Harwood, Irene
2006-01-01
In this paper new knowledge generated from theoretical and empirical work in infant observation studies and attachment, trauma, and neurobiology research is integrated and applied to the development of a group for pregnant and new mothers. The purposes of this group were to (1) promote the establishment of a secure base for each baby through optimum self and dyadic affect regulation, the repair of ruptures, and the emergence of positive heightened affective moments; (2) to facilitate secure attachment between mother and infant by helping mothers mentalize the experiences of their babies; (3) to build affiliative bonds between group members and; at the very least, (4) to prevent insecure disorganized attachments. The group interactions also were thought to prevent new psychopathology from developing, as well as to minimize the intergenerational transmission of trauma. A discussion of how this group came out of gestation and birthed itself in a community setting is included.
A novel examination of atypical major depressive disorder based on attachment theory.
Levitan, Robert D; Atkinson, Leslie; Pedersen, Rebecca; Buis, Tom; Kennedy, Sidney H; Chopra, Kevin; Leung, Eman M; Segal, Zindel V
2009-06-01
While a large body of descriptive work has thoroughly investigated the clinical correlates of atypical depression, little is known about its fundamental origins. This study examined atypical depression from an attachment theory framework. Our hypothesis was that, compared to adults with melancholic depression, those with atypical depression would report more anxious-ambivalent attachment and less secure attachment. As gender has been an important consideration in prior work on atypical depression, this same hypothesis was further tested in female subjects only. One hundred ninety-nine consecutive adults presenting to a tertiary mood disorders clinic with major depressive disorder with either atypical or melancholic features according to the Structured Clinical Interview for DSM-IV Axis-I Disorders were administered a self-report adult attachment questionnaire to assess the core dimensions of secure, anxious-ambivalent, and avoidant attachment. Attachment scores were compared across the 2 depressed groups defined by atypical and melancholic features using multivariate analysis of variance. The study was conducted between 1999 and 2004. When men and women were considered together, the multivariate test comparing attachment scores by depressive group was statistically significant at p < .05. Between-subjects testing indicated that atypical depression was associated with significantly lower secure attachment scores, with a trend toward higher anxious-ambivalent attachment scores, than was melancholia. When women were analyzed separately, the multivariate test was statistically significant at p < .01, with both secure and anxious-ambivalent attachment scores differing significantly across depressive groups. These preliminary findings suggest that attachment theory, and insecure and anxious-ambivalent attachment in particular, may be a useful framework from which to study the origins, clinical correlates, and treatment of atypical depression. Gender may be an important consideration when considering atypical depression from an attachment perspective. Copyright 2009 Physicians Postgraduate Press, Inc.
Torres, Nuno; Maia, Joana; Veríssimo, Manuela; Fernandes, Marilia; Silva, Filipa
2012-01-01
The present work analyses differences in the attachment representations of institutionalized children as compared with children from low and high educational level living with their natural families. Participants were 91 Portuguese children, 52% girls, aged 48-96 months. There were three different groups: 19 institutionalized children, 16 low educational level families' children and 56 from high educational level families'. Attachment representations were assessed for Security of the narratives of the Attachment Story Completion Task (ASCT). Psychopathological symptoms were assessed using the Child Behaviour Checklist for parents and caretakers. Verbal skills were assessed using the Wechsler Preschool and Primary Scale of Intelligence--Revised. Results show that institutionalized children have significantly lower security of attachment representations, less verbal skills and higher aggressive behaviour than the other two groups. Attachment representations were associated with social/withdrawal and aggression, independently of age, verbal skills and parents' education. The main effect of institutionalization on externalizing aggressive behaviour was completely mediated by the security of attachment representations. Copyright © 2010 John Wiley & Sons, Ltd.
Burmester, Mike; Munilla, Jorge; Ortiz, Andrés; Caballero-Gil, Pino
2017-07-04
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of "simulatenous" presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions.
A CLOSED-LOOP BIODIESEL PRODUCTION AND RESEARCH FACILITY IN KEENE, NH
The main objectives during Phase I were to continue a Biodiesel Working Group, formalize the organizational structure of the Monadnock Biodiesel Collaborative, identify a possible facility location, secure funding, provide novel curriculum for Keene State College students, and...
EDITORIAL: LINKAGES AMONG LANDSCAPE ASSESSMENT, QUALITY OF LIFE AND ENVIRONMENTAL SECURITY
The purpose and scope of the landscape sciences pilot study is to establish a working group representative of NATO Member and Partner nations to exchange information about landscape science approaches useful for environmental assessment and to transfer landscape assessment techno...
77 FR 24178 - Information Systems Technical Advisory Committee; Notice of Partially Closed Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-23
... and Introductions 2. Working Group Reports 3. Industry Presentation: E-beam Lithography 4. Industry Presentation: ENC Threshold for Satellite Modem 5. Industry Presentation: Semiconductor Manufacturing Equipment... DEPARTMENT OF COMMERCE Bureau of Industry and Security Information Systems Technical Advisory...
Beam Line and Associated Work: Operational Phase 1985-1987
1988-08-26
WORK UNIT NUMBERS Stanford University Stanford, California 94305 CONTROLLING OFFICE NAME AND ADDRESS 12. REPORT DATE U. S. Army Research Office August... Controlling Office) IS. SECURITY CLASS. (of this report) Office of Naval Research Unclassified 800 N. Quincy Street Arlington, VA 22217-5000 IS... groups actively doing or planning research in connection with Beam Line V: Profs. Lindau/Spicer, Stanford (interfacial chemistry and metallurgy of metal
2016-01-01
activity, completed ana- lytic baselines, current memoranda describing in-progress work , briefings sent to high officials, and published papers by...Is Enough, Santa Monica, Calif.: RAND Corporation , MR-400-RC, 1994. ———, “Report of Working Group: Overall Force Planning Concepts, in Lessons...RAND’s Work on Planning Under Uncertainty for National Security, Santa Monica, Calif.: RAND Corporation , TR-1249-OSD, 2012. As of July 22, 2016: http
76 FR 2916 - Houston/Galveston Navigation Safety Advisory Committee; Meetings
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-18
... DEPARTMENT OF HOMELAND SECURITY Coast Guard [USCG-2010-1116] Houston/Galveston Navigation Safety.../Galveston Navigation Safety Advisory Committee (``HOGANSAC'' or ``the Committee'') and its working groups will meet in Texas City, Texas and Houston, Texas to discuss waterway improvements, aids to navigation...
Papoutsi, Chrysanthi; Reed, Julie E; Marston, Cicely; Lewis, Ruth; Majeed, Azeem; Bell, Derek
2015-10-14
Although policy discourses frame integrated Electronic Health Records (EHRs) as essential for contemporary healthcare systems, increased information sharing often raises concerns among patients and the public. This paper examines patient and public views about the security and privacy of EHRs used for health provision, research and policy in the UK. Sequential mixed methods study with a cross-sectional survey (in 2011) followed by focus group discussions (in 2012-2013). Survey participants (N = 5331) were recruited from primary and secondary care settings in West London (UK). Complete data for 2761 (51.8 %) participants were included in the final analysis for this paper. The survey results were discussed in 13 focus groups with people living with a range of different health conditions, and in 4 mixed focus groups with patients, health professionals and researchers (total N = 120). Qualitative data were analysed thematically. In the survey, 79 % of participants reported that they would worry about the security of their record if this was part of a national EHR system and 71 % thought the National Health Service (NHS) was unable to guarantee EHR safety at the time this work was carried out. Almost half (47 %) responded that EHRs would be less secure compared with the way their health record was held at the time of the survey. Of those who reported being worried about EHR security, many would nevertheless support their development (55 %), while 12 % would not support national EHRs and a sizeable proportion (33 %) were undecided. There were also variations by age, ethnicity and education. In focus group discussions participants weighed up perceived benefits against potential security and privacy threats from wider sharing of information, as well as discussing other perceived risks: commercial exploitation, lack of accountability, data inaccuracies, prejudice and inequalities in health provision. Patient and public worries about the security risks associated with integrated EHRs highlight the need for intensive public awareness and engagement initiatives, together with the establishment of trustworthy security and privacy mechanisms for health information sharing.
Kaiser, Michelle L; Cafer, Anne
2018-01-01
The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.
On the security of consumer wearable devices in the Internet of Things.
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.
On the security of consumer wearable devices in the Internet of Things
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756
System and method for secure group transactions
Goldsmith, Steven Y [Rochester, MN
2006-04-25
A method and a secure system, processing on one or more computers, provides a way to control a group transaction. The invention uses group consensus access control and multiple distributed secure agents in a network environment. Each secure agent can organize with the other secure agents to form a secure distributed agent collective.
2006-10-23
NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER Joint Military...playing a founding role in the European Union (EU) and the North Atlantic Treaty Organization (NATO). The French also hold sway in other influential...intergovernmental organizations (IGO) such as the Group of Eight, the Organization for Security and Cooperation in Europe, and similar organizations
Proceedings of the Second Annual NASA Science Internet User Working Group Conference
NASA Technical Reports Server (NTRS)
Jackson, Lenore A. (Editor); Gary, J. Patrick (Editor)
1991-01-01
Copies of the agenda, list of attendees, meeting summaries, and all presentations and exhibit material are contained. Included are plenary sessions, exhibits of advanced networking applications, and user subgroup meetings on NASA Science Internet policy, networking, security, and user services and applications topics.
75 FR 16157 - Pharmaceutical Supply Chain; Public Workshop
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-31
... supply of high quality, safe, and effective drug products and drug ingredients depends upon a series of... patients. Through a series of plenary sessions and working group breakout sessions, the workshop will... environment. Share improvements in programs and technology. Identify any barriers to securing the entire...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-26
... nuclear energy research and development, the decommissioning of the Fukushima Dai-ichi Nuclear Power Station, environmental management, emergency management, nuclear security, and safety and regulatory issues. The Decommissioning and Environmental Management Working Group (DEMWG) under the Bilateral...
Ortiz, Andrés
2017-01-01
The National Strategy for Global Supply Chain Security published in 2012 by the White House identifies two primary goals for strengthening global supply chains: first, to promote the efficient and secure movement of goods, and second to foster a resilient supply chain. The Internet of Things (IoT), and in particular Radio Frequency Identification (RFID) technology, can be used to realize these goals. For product identification, tracking and real-time awareness, RFID tags are attached to goods. As tagged goods move along the supply chain from the suppliers to the manufacturers, and then on to the retailers until eventually they reach the customers, two major security challenges can be identified: (I) to protect the shipment of goods that are controlled by potentially untrusted carriers; and (II) to secure the transfer of ownership at each stage of the chain. For the former, grouping proofs in which the tags of the scanned goods generate a proof of “simulatenous” presence can be employed, while for the latter, ownership transfer protocols (OTP) are used. This paper describes enhanced security solutions for both challenges. We first extend earlier work on grouping proofs and group codes to capture resilient group scanning with untrusted readers; then, we describe a modified version of a recently published OTP based on channels with positive secrecy capacity adapted to be implemented on common RFID systems in the supply chain. The proposed solutions take into account the limitations of low cost tags employed in the supply chain, which are only required to generate pseudorandom numbers and compute one-way hash functions. PMID:28677637
Drake, Robert E; Frey, William; Bond, Gary R; Goldman, Howard H; Salkever, David; Miller, Alexander; Moore, Troy A; Riley, Jarnee; Karakus, Mustafa; Milfort, Roline
2013-12-01
People with psychiatric impairments (primarily schizophrenia or a mood disorder) are the largest and fastest-growing group of Social Security Disability Insurance (SSDI) beneficiaries. The authors investigated whether evidence-based supported employment and mental health treatments can improve vocational and mental health recovery for this population. Using a randomized controlled trial design, the authors tested a multifaceted intervention: team-based supported employment, systematic medication management, and other behavioral health services, along with elimination of barriers by providing complete health insurance coverage (with no out-of-pocket expenses) and suspending disability reviews. The control group received usual services. Paid employment was the primary outcome measure, and overall mental health and quality of life were secondary outcome measures. Overall, 2,059 SSDI beneficiaries with schizophrenia, bipolar disorder, or depression in 23 cities participated in the 2-year intervention. The teams implemented the intervention package with acceptable fidelity. The intervention group experienced more paid employment (60.3% compared with 40.2%) and reported better mental health and quality of life than the control group. Implementation of the complex intervention in routine mental health treatment settings was feasible, and the intervention was effective in assisting individuals disabled by schizophrenia or depression to return to work and improve their mental health and quality of life.
Alternative caregiving figures and their role on adult attachment representations.
Zaccagnino, Maria; Cussino, Martina; Saunders, Rachel; Jacobvitz, Deborah; Veglia, Fabio
2014-01-01
The present work represents the first Italian study investigating whether and how mothers who describe unloving experiences with both parents during childhood could become more secure as adults (termed earned-secures). The sample consisted of 94 women from northern Italy. All the subjects were administered the Adult Attachment Interview (AAI) and fill in a screening test evaluating depressive symptoms. No significative differences were found regarding depressive symptomatology across the different attachment classifications. The majority of the samples (84%) remember an important alternative support figure during childhood (before 12 years old). Earned-secures significantly differ from continuous-secure and insecure groups (F = 27.202; p ≤ 0.01) on the amount of the emotional support from the main alternative support figure and on the average amount of emotional support across alternative support figures (F = 10.44; p ≤ 0.01). The majority of alternative support figures (80%) were grandparents. A corrective emotional experience allows the subject to work through his negative childhood experiences and acquire modalities of interaction that enable him/her to function more effectively in the world. The clinical implications of this study will be discussed. Attachment theory. Clinical implications of attachment experiences. Corrective emotional experience. Copyright © 2012 John Wiley & Sons, Ltd.
Lived experience of working with female patients in a high-secure mental health setting.
Beryl, Rachel; Davies, Jason; Völlm, Birgit
2018-02-01
Women's secure hospitals are often considered to be stressful and demanding places to work, with these environments characterized as challenging and violent. However, the staff experience of working in this environment is not well represented in the literature. The present study is the first to examine the 'lived experience' of seven nurses working in the National High Secure Healthcare Service for Women. Interview transcripts were analysed with the use of interpretative phenomenological analysis, and the findings presented within four superordinate themes 'horror', 'balancing acts', 'emotional hard labour', and 'the ward as a community'. These themes all depict the challenges that participants experience in their work, the ways in which they cope with these challenges, and how they make sense of these experiences. A meta-theme of 'making sense by understanding why' is also presented, which represents the importance for participants to attempt to make sense of the tensions and challenges by formulating a fuller meaning. The findings suggest the importance of workforce development in terms of allowing sufficient protected time for reflection and formulation (e.g. within the format of group supervision or reflective practice), and for staff-support mechanisms (e.g. clinical supervision, counselling, debriefs) to be inbuilt into the ethos of a service, so as to provide proactive support for staff 'on the frontline'. © 2016 Australian College of Mental Health Nurses Inc.
The Importance of International Technical Nuclear Forensics to Deter Illicit Trafficking
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, D K
2007-01-30
Illicit trafficking of nuclear materials is a transboundary problem that requires a cooperative approach involving international nuclear forensics to ensure all states understand the threat posed by nuclear smuggling as well as a means to best deter the movement of nuclear contraband. To achieve the objectives, all cases involving illicit trafficking of nuclear and radiological materials must be vigorously pursued and prosecuted when appropriate. The importance of outreach and formal government-to-government relationships with partner nations affected by nuclear trafficking cannot be under-estimated. States that are situated on smuggling routes may be well motivated to counter nuclear crimes to bolster theirmore » own border and transportation security as well as strengthen their economic and political viability. National law enforcement and atomic energy agencies in these states are aggressively pursuing a comprehensive strategy to counter nuclear smuggling through increasing reliance on technical nuclear forensics. As part of these activities, it is essential that these organizations be given adequate orientation to the best practices in this emerging discipline including the categorization of interdicted nuclear material, collection of traditional and nuclear forensic evidence, data analysis using optimized analytical protocols, and how to best fuse forensics information with reliable case input to best develop a law enforcement or national security response. The purpose of formalized USG relationship is to establish an institutional framework for collaboration in international forensics, improve standards of forensics practice, conduct joint exercises, and pursue case-work that benefits international security objectives. Just as outreach and formalized relationships are important to cultivate international nuclear forensics, linking nuclear forensics to ongoing national assistance in border and transpiration security, including port of entry of entry monitoring, nuclear safeguards, and emerging civilian nuclear power initiatives including the Global Nuclear Energy Partnership are crucial components of a successful nuclear detection and security architecture. Once illicit shipments of nuclear material are discovered at a border, the immediate next question will be the nature and the source of the material, as well as the identity of the individual(s) involved in the transfer as well as their motivations. The Nuclear Smuggling International Technical Working Group (ITWG) is a forum for the first responder, law enforcement, policy, and diplomatic community to partner with nuclear forensics experts worldwide to identify requirements and develop technical solutions in common. The ITWG was charted in 1996 and since that time approximately 30 member states and organizations have participated in 11 annual international meetings. The ITWG also works closely with the IAEA to provide countries with support for forensic analyses. Priorities include the development of common protocols for the collection of nuclear forensic evidence and laboratory investigations, organization of forensic round-robin analytical exercises and technical forensic assistance to requesting nations. To promote the science of nuclear forensics within the ITWG the Nuclear Forensics Laboratory Group was organized in 2004. A Model Action Plan for nuclear forensics was developed by the ITWG and published as an IAEA Nuclear security Series document to guide member states in their own forensics investigations. Through outreach, formalized partnerships, common approaches and security architectures, and international working groups, nuclear forensics provides an important contribution to promoting nuclear security and accountability.« less
Nazareno Pifano, F
1977-01-01
A comparative evaluation is made of patients with functional digestive diseases in an out-patient clinic of the Social Security of Barquisimeto. In the first group of patients a routine approach was followed while in the second group a brief biographic history is added adapting it to the circumstances of work that exist within this type of clinic. From the information obtained of the destiny of the patients of each group, it is evident that the total approach to the patient is of importance as the only mean possible for an adequate approximation to the patient and the proper management of the case. The problem is presented of the gastroenterologist, overwhelmed by the great technical progress, confronted by the destiny of the functional digestive patient in socialized medicine.
Domestic Disasters and Geospatial Technology for the Defense Logistics Agency
2014-12-01
total distance traveled and satisfy all fuel demands. This report used the Vehicle Routing Problem (VRP) Spreadsheet Solver, developed by Erdogan ...Security Affairs, 2(2), 5–10. Erdogan , G. (2013). VRP spreadsheet solver. Retrieved from VeRoLog: EURO Working Group on Vehicle Routing and Logistics
Project on National Security Reform: Vision Working Group Report and Scenarios
2010-07-01
from radiation produced by harmless, everyday substances such as bananas , cat litter, glass, and concrete.40 The DHS began installing first...solvable. The skills are potentially there, but the incentives and then the funding to make them emerge 234 and flower across the whole of the U.S
2010-01-28
face and on social networking sites . There should be transparency, honesty, and reality. “Tell the whole story”; pros as well as cons Some attrition...potentially impact the manner in which Navy Recruiting interacts with members of these social networking sites . For example, knowing and individuals
Damari, Behzad; Abdollahi, Zahra; Hajifaraji, Majid; Rezazadeh, Arezoo
2018-05-03
All government policies and programmes for food and nutrition security should include providing healthy food, as well as providing economic and social availability for all people. This study aimed to analyse the current situation of Iranian food and nutrition security and establish a road map towards 2021. The applied methods were situation analysis and a mixed qualitative-quantitative method. The conceptual method used for developing this national document encompassed three areas: sustainable food supply, food safety and nutrition. The outcomes of the Iranian food and nutrition security system in the past three decades include development of management infrastructure and improvement in food and nutrition security status. However, analysis of current programmes showed that there were some overlapping, intertwining and parallel works in the responsibilities of related organizations in the field of supervision of food safety (from production to supply). The national document produced as the outcome of this paper was communicated by the Iranian Ministry of Health in 2012 and has been running for 2 years. Selected ministries are responsible for implementation of 20 national programmes by the end of the 5th Economic, Social and Cultural Development Programme (2016-2011). The consensus of stakeholders by the end of the 6th Development Programme (2021) is to put all of the provinces in a safe or very safe situation in terms of food and nutrition security. The most important challenge in establishing national documents is to make them operational. This aim was achieved by an intersectoral nutrition and food security working group, which produced a general memorandum of understanding with the main organizations, the media, universities and private sector. Copyright © World Health Organization (WHO) 2018. Some rights reserved. This work is available under the CC BY-NC-SA 3.0 IGO license (https://creativecommons.org/licenses/by-nc-sa/3.0/igo).
Development of an Internet Security Policy for health care establishments.
Ilioudis, C; Pangalos, G
2000-01-01
The Internet provides unprecedented opportunities for interaction and data sharing among health care providers, patients and researchers. However, the advantages provided by the Internet come with a significantly greater element of risk to the confidentiality and integrity of information. This paper defines the basic security requirements that must be addressed in order to use the Internet to safely transmit patient and/or other sensitive Health Care information. It describes a suitable Internet Security Policy for Health Care Establishments and provides the set of technical measures that are needed for its implementation. The proposed security policy and technical approaches have been based on an extensive study of the related recommendations from the security and standard groups both in EU amid USA and our related work and experience. The results have been utilized in the framework of the Intranet Health Clinic project, where the use of the Internet for the transmission of sensitive Health Care information is of vital importance.
MacKinlay, L; Langdon, P E
2009-09-01
Staff working within secure services for people with intellectual disabilities (ID) are likely to work with sexual offenders, but very little attention has been paid to how they think about this sexual offending behaviour. Forty-eight staff working within secure services for people with ID were recruited and completed the Attribution Style Questionnaire in relation to the sexual offending behaviour and challenging behaviour of men with mild ID. Attributions towards challenging behaviour and sexual offending were compared and relationships between level of ID and seriousness of the sexual offence were explored. The results indicated that staff attributed sexual offending as more external to the staff group than they did for challenging behaviour. Sexual offending behaviour was also seen as more stable, and less controllable by people with ID than was challenging behaviour. Sexual offending was also attributed as more uncontrollable by the staff group than challenging behaviour. There was a significant negative correlation between general intellectual functioning and several attributional dimensions regarding sexual offending, but not challenging behaviour. Sexual offending that was coded as more serious was attributed as universal and uncontrollable by the staff group. The differences between staff attributions regarding challenging behaviour and sexual offending potentially relate to the decision-making processes involved in deciding whether or not to involve criminal justice agencies when someone with ID commits a sexual offence. Further research within this area is warranted.
An evaluation of the construct of earned security in adolescents: evidence from an inpatient sample.
Venta, Amanda; Sharp, Carla; Shmueli-Goetz, Yael; Newlin, Elizabeth
2015-01-01
In adult attachment research, a group of individuals who convey secure attachments despite recalling difficult early caregiver relationships has been identified. The term earned security refers to individuals in this group, whereas continuous security refers to individuals who convey secure attachments and describe caring early relationships. Evidence on the validity of earned security in adults is mixed--with one longitudinal study showing that earned secure adults, despite contrary recollections, are actually more likely to have experienced positive caregiving than continuous secure adults. There is currently no evidence of earned security in adolescence, and exploring it in this age group may help shed light on the overall problem of the validity of this construct. Therefore, the broad aim of this study was to examine the construct of earned security in a group of inpatient adolescents. First, the authors aimed to identify a group of adolescents with secure attachments and memories of difficult caregiver relationships (i.e., proposed earned secure group) in a sample of 240 inpatient adolescents. Next, to explore external validity, the authors examined whether this group differed from others with regard to internalizing distress and emotion regulation. Findings indicated that a subset of secure adolescents recall difficult caregiving, as has been noted in adults, and that they differ from others with regard to emotion regulation. Despite this preliminary evidence that earned security can be identified in adolescents, the authors conclude with a discussion of the caveats of applying this construct in adolescents as well as adults.
Comparing 2 Adhesive Methods on Skin Integrity in the High-Risk Neonate.
Boswell, Nicole; Waker, Cheryl L
2016-12-01
Nurses have a primary role in promoting neonatal skin integrity and skin care management of the critically ill neonate. Adhesive products are essential to secure needed medical devices but can be a significant factor contributing to skin breakdown. Current literature does not offer a definitive answer regarding which products most safely and effectively work to secure needed devices in the high-risk neonatal population. To determine which adhesive method is best practice to safely and effectively secure lines/tubes in the high-risk neonate population. The only main effect that was significant was age group with mean skin scores. Subjects in the younger group (24-28 weeks) had higher skin scores than in the older group (28-34 weeks), validating that younger gestations are at higher risk of breakdown with the use of adhesives. The findings did not clearly identify which product was superior to secure tubes and lines, or was the least injurious to skin of the high-risk neonate. Neither a transparent dressing only or transparent dressing over hydrocolloid method clearly demonstrated an advantage in the high-risk, preterm neonate. Anecdotal comments suggested staff preferred the transparent dressing over hydrocolloid method as providing better adhesive while protecting skin integrity. The findings validated that younger gestations are at higher risk of breakdown with the use of adhesives and therefore require close vigilance to maintain skin integrity.
To work or not to work: motivation (not low IQ) determines symptom validity test findings.
Chafetz, Michael D; Prentkowski, Erica; Rao, Aparna
2011-06-01
Social Security Disability Determinations Service (DDS) claimants are seeking compensation for an inability to work (Chafetz, 2010). These usually low-functioning claimants fail Symptom Validity Tests (SVTs) at high rates (Chafetz, 2008), typically over 40%. In contrast, claimants for the Rehabilitation Service in Louisiana (LRS) are seeking to work. Individuals referred by the Department of Child and Family Services (DCFS) are seeking reunification with their children. All three groups consisted of equivalently low-IQ claimants when considering only those who passed SVTs. Only the DDS group failed SVTs at high rates, whereas LRS claimants failed at minimal rates and DCFS claimants did not fail. Thus, intrinsic motivation explains effort in this particular study of low-functioning claimants: those seeking to work or to look good to reunify with their children pass SVTs at high rates.
Secure Obfuscation for Encrypted Group Signatures
Fan, Hongfei; Liu, Qin
2015-01-01
In recent years, group signature techniques are widely used in constructing privacy-preserving security schemes for various information systems. However, conventional techniques keep the schemes secure only in normal black-box attack contexts. In other words, these schemes suppose that (the implementation of) the group signature generation algorithm is running in a platform that is perfectly protected from various intrusions and attacks. As a complementary to existing studies, how to generate group signatures securely in a more austere security context, such as a white-box attack context, is studied in this paper. We use obfuscation as an approach to acquire a higher level of security. Concretely, we introduce a special group signature functionality-an encrypted group signature, and then provide an obfuscator for the proposed functionality. A series of new security notions for both the functionality and its obfuscator has been introduced. The most important one is the average-case secure virtual black-box property w.r.t. dependent oracles and restricted dependent oracles which captures the requirement of protecting the output of the proposed obfuscator against collision attacks from group members. The security notions fit for many other specialized obfuscators, such as obfuscators for identity-based signatures, threshold signatures and key-insulated signatures. Finally, the correctness and security of the proposed obfuscator have been proven. Thereby, the obfuscated encrypted group signature functionality can be applied to variants of privacy-preserving security schemes and enhance the security level of these schemes. PMID:26167686
McAllister, Ashley; Nylén, Lotta; Backhans, Mona; Boye, Katarina; Thielen, Karsten; Whitehead, Margaret; Burström, Bo
2015-01-01
People with limiting longstanding illness and low education may experience problems in the labor market. Reduced employment protection that maintains economic security for the individual, known as "flexicurity," has been proposed as a way to increase overall employment. We compared the development of labor market policies and employment rates from 1990 to 2010 in Denmark and the Netherlands (representing flexicurity), the United Kingdom, and Sweden. Employment rates in all countries were much lower in the target group than for other groups over the study period. However, "flexicurity" as practiced in Denmark, far from being a "magic bullet," appeared to fail low-educated people with longstanding illness in particular. The Swedish policy, on the other hand, with higher employment protection and higher economic security, particularly earlier in the study period, led to higher employment rates in this group. Findings also revealed that economic security policies in all countries were eroding and shifting toward individual responsibility. Finally, results showed that active labor market policies need to be subcategorized to better understand which types are best suited for the target group. Increasing employment among the target group could reduce adverse health consequences and contribute to decreasing inequalities in health. © The Author(s) 2015.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Badwan, Faris M.; Demuth, Scott Francis; Miller, Michael Conrad
Small Modular Reactors (SMR) with power levels significantly less than the currently standard 1000 to 1600-MWe reactors have been proposed as a potential game changer for future nuclear power. SMRs may offer a simpler, more standardized, and safer modular design by using factory built and easily transportable components. Additionally, SMRs may be more easily built and operated in isolated locations, and may require smaller initial capital investment and shorter construction times. Because many SMRs designs are still conceptual and consequently not yet fixed, designers have a unique opportunity to incorporate updated design basis threats, emergency preparedness requirements, and then fullymore » integrate safety, physical security, and safeguards/material control and accounting (MC&A) designs. Integrating safety, physical security, and safeguards is often referred to as integrating the 3Ss, and early consideration of safeguards and security in the design is often referred to as safeguards and security by design (SSBD). This paper describes U.S./Russian collaborative efforts toward developing an internationally accepted common approach for implementing SSBD/3Ss for SMRs based upon domestic requirements, and international guidance and requirements. These collaborative efforts originated with the Nuclear Energy and Nuclear Security working group established under the U.S.-Russia Bilateral Presidential Commission during the 2009 Presidential Summit. Initial efforts have focused on review of U.S. and Russian domestic requirements for Security and MC&A, IAEA guidance for security and MC&A, and IAEA requirements for international safeguards. Additionally, example SMR design features that can enhance proliferation resistance and physical security have been collected from past work and reported here. The development of a U.S./Russian common approach for SSBD/3Ss should aid the designer of SMRs located anywhere in the world. More specifically, the application of this approach may lead to more proliferation resistant and physically secure design features for SMRs.« less
Betancourt, Theresa S; Williams, Timothy P; Kellner, Sarah E; Gebre-Medhin, Joy; Hann, Katrina; Kayiteshonga, Yvonne
2012-05-01
This study examines the core components of children's basic security and well-being in order to examine issues central to improving child protection in Rwanda. Sources of data included 15 focus groups with adults, 7 focus groups with children ages 10-17, and 11 key informant interviews with child protection stakeholders, including representatives from international NGOs, community-based groups, and the Rwandan Government, all of which took place in April and May of 2010. Participants painted a complex picture of threats to children's basic security in Rwanda. Three key themes were pervasive across all interviews: (1) deterioration of social and community cohesion in post-genocide Rwanda; (2) the cascading effects of poverty; and (3) the impact of caregiver illness and death on the caregiving environment. Consistent with the SAFE (Safety/freedom from harm; Access to basic physiological needs and healthcare; Family and connection to others; Education and economic security) model of child protection, participants rarely elaborated on a child protection threat independent of other basic security needs and rights. Findings suggest a need for integrated approaches to child protection that recognize this interrelatedness and extend beyond issue-specific child protection responses. This study contributes to a growing body of work highlighting the interrelated nature of child protection threats and the implications of adaptive and dangerous survival strategies that children and families engage in to meet their basic security needs. Analysis of this interrelatedness provides a roadmap for improving policies and implementing integrated and robust child protection strategies in Rwanda and other settings. Copyright © 2012 Elsevier Ltd. All rights reserved.
Deng, Yanhe; Yan, Mengge; Chen, Henry; Sun, Xin; Zhang, Peng; Zeng, Xianglong; Liu, Xiangping; Lye, Yue
2016-01-01
Highly optimistic explanatory style (HOES) and highly pessimistic explanatory style (HPES) are two maladaptive ways to explain the world and may have roots in attachment insecurity. The current study aims to explore the effects of security priming - activating supportive representations of attachment security - on ameliorating these maladaptive explanatory styles. 57 participants with HOES and 57 participants with HPES were randomized into security priming and control conditions. Their scores of overall optimistic attribution were measured before and after priming. Security priming had a moderating effect: the security primed HOES group exhibited lower optimistic attribution, while the security primed HPES group evinced higher scores of optimistic attribution. Furthermore, the security primed HOES group attributed positive outcomes more externally, while the security primed HPES group attributed successful results more internally. The results support the application of security priming interventions on maladaptive explanatory styles. Its potential mechanism and directions for future study are also discussed.
Huang, Jin; Kim, Youngmi; Barnidge, Ellen
2016-11-20
The National School Lunch Program (NSLP) is one of the most important food assistance programs in the United States to ensure children's food security and healthy development. Previous studies have offered mixed results and challenges in estimating the effects of program participation. This study assesses NSLP's effect on household food security using data from the Survey of Income and Program Participation (SIPP). SIPP collects information on food security that covers four reference months, including both summer (June, July, August) and nonsummer months. The number of summer months in these four reference months varies by SIPP rotation group. These unique features allow this study to address the potential selection bias in the research of NSLP and food security by examining a seasonal difference in program participation. The analysis found that one more summer month in the reference period increases the difference in low food security rates by about 1.5 percentage points between recipients and nonrecipients eligible for free or reduced-price lunch. Findings have important social work and health policy implications for increasing food security among low-income households with children. © 2016 National Association of Social Workers.
CAT (Clear Air Turbulence) Forecasting Using Transilient Turbulence Theory
1988-02-20
FILE COP.y AIOL-M-80106 CAT Fwmsft Using Transilient 00 % to, N - 0 William H. Raymond ) Rhad B. Stull O University of Wisconsin V CImSS/epannint...PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO ACCESSIO NO. 62101F 6670 10 DB 11. TITLE (Include Security Classification) CAT Forecasting Using...necessary and identify by block number) FIELD GROUP SUB-GROUP Clear Air Turbulence ( CAT ) Boundary Layer Turbulence parameterization Surface Fluxes 19
Future United States Role in European Security
1992-08-26
MONITORING ORGANIZATION REPORT NUMBER(S) 6a. NAME OF PERFORMING ORGANIZATION 6b. OFFICE SYMBOL 7a. NAME OF MONITORING ORGANIZATION US Army War College (if...necessary and identify by block number) FIELD GROUP SUB- GROUP 19, ABSTRACT (Continue on reverse if necessary and identify by block number) See reverse...concerning these forces: Of course, they used NATO rules of engagement and worked to NATO standards. They had trained together as NATO forces and
Ethics Certification of Health Information Professionals.
Kluge, Eike-Henner; Lacroix, Paulette; Ruotsalainen, Pekka
2018-04-22
To provide a model for ensuring the ethical acceptability of the provisions that characterize the interjurisdictional use of eHealth, telemedicine, and associated modalities of health care deliveiy that are currently in place. Following the approach initiated in their Global Protection of Health Data project within the Security in Health Information Systems (SiHIS) working group of the International Medical Informatics Association (IMIA), the authors analyze and evaluate relevant privacy and security approaches that are intended to stem the erosion of patients' trustworthiness in the handling of their sensitive information by health care and informatics professionals in the international context. The authors found that while the majority of guidelines and ethical codes essentially focus on the role and functioning of the institutions that use EHRs and information technologies, little if any attention has been paid to the qualifications of the health informatics professionals (HIPs) who actualize and operate information systems to deal with or address relevant ethical issues. The apparent failure to address this matter indicates that the ethical qualification of HIPs remains an important security issue and that the Global Protection of Health Data project initiated by the SiHIS working group in 2015 should be expanded to develop into an internationally viable method of certification. An initial model to this effect is sketched and discussed. Georg Thieme Verlag KG Stuttgart.
Giraudo, Massimiliano; Bena, Antonella; Leombruni, Roberto; Costa, Giuseppe
2016-02-13
The relationship between labour market flexibility, job insecurity and occupational injuries is not univocal. The literature generally focuses on the temporary character of work arrangements rather than on the precarity of careers. The aim of this paper is to identify, without defining a priori what a precarious career is, the most common professional profiles of young people who entered the labour market in the 2000s and to correlate them with occupational injury risks. Using the Whip-Salute database, which combines individual work and health histories, we selected the subjects under 30 years of age whose first appearance in the database is dated after 2000. The occupational history of each individual between 2000 and 2005 was described according to 6 variables (type of entry contract, number of contracts, number of jobs, economic activities, work intensity and duration of the longest period of non-employment). Workers were grouped into homogeneous categories using cluster analysis techniques, which enable to identify different career profiles. Injury rates were calculated for each cluster, and compared within and between the groups. We selected 56,760 workers in the study period, who were classified in 6 main career profiles. About 1/3 of the subjects presented an employment-secure career profile, while about 45 % of them were classified into 3 clusters showing precarious career profiles with different work intensities. Precarious workers present significantly higher injury rates than those with secure careers, with an increase in risk between 24 and 57 % (p < 0.05). The comparison of injury rates at the beginning and at the end of the study period revealed a significant decrease in all clusters, but the gap between secure and precarious workers remained wide. Cluster analysis allowed to identify career patterns with clearly different characteristics. A positive association between injury risk and the level of career fragmentation was found. The association cannot be fully interpreted in a causal way, since reversed causality and selection processes may be in action. However the study indicates a disadvantage for precarious workers, who face significantly higher risks of both minor and severe injuries.
United States Air Force Security Forces in an Era of Terrorist Threats
1999-06-01
their primary duties. The third alternative is to eliminate the Palace Tenure deployments of security personnel and replace them with dedicated units...The Phoenix Raven program, the 820th Security Forces Group, and Palace Tenure commitments. The specified mission varies by organization, but the...820th Security Forces Group. January 1999, slide 4. 166 Statement of LT. Col. Larry A. Buckingham , 820th Security Forces Group Commander, “820th Security
experience and expertise in energy projects ranging from 50 kW to 150 MW across distribution and transmission security for Department of Defense Transmission and distribution system design. Education B.S., Energy Working in the Engineering and Modeling Group of NREL's Integrated Applications Center under the Energy
75 FR 7483 - Center for Substance Abuse Prevention; Notice of Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-19
... working groups; and a comparison of HHS and DOT urine collection requirements. DTAB members and invited... ensure that advisory committee meetings proceed in an orderly fashion, are conducted in a safe and secure environment, that the right of free speech is protected, and that the ability of SAMHSA Advisory Committees to...
The Army Civil Affairs Officer Educational Pipeline: A Supply and Demand Analysis
2008-12-01
trust by working with the local government or community to provide these services. This will placate the population and enhance the legitimacy of the...security and control, the U.S. and its allies could prevent or locate hostile threats before they cause harm. Improving the quality of life ...leery of contact with foreigners and CA officers will need a delicate touch. CA officers can integrate extremist groups by working with leaders to focus
IEC 61850: Technology Standards and Cyber-Security Threats
DOE Office of Scientific and Technical Information (OSTI.GOV)
Youssef, Tarek A; El Hariri, mohamed; Bugay, Nicole
Substations constitute a fundamental part in providing reliable electricity to consumers. For a substation to maintain electricity reliability and its own real-time operability, communication between its components is inevitable. Before the emergence of IEC 61850, inter-substation communication was established via expensive copper wires with limited capabilities. IEC 61850 is the standard set by the International Electrotechnical Commission (IEC) Technical Committee Number 57 Working Group 10 and IEEE for Ethernet (IEEE 802.3)-based communication in electrical substations. Like many power grid systems standards, IEC 61850 was set without extensive consideration for critical security measures. This paper discusses IEC 61850 technology standards andmore » applications thoroughly and points out major security vulnerabilities it introduces in the context of current cyber-physical smart grid systems.« less
Cyber Security: Big Data Think II Working Group Meeting
NASA Technical Reports Server (NTRS)
Hinke, Thomas; Shaw, Derek
2015-01-01
This presentation focuses on approaches that could be used by a data computation center to identify attacks and ensure malicious code and backdoors are identified if planted in system. The goal is to identify actionable security information from the mountain of data that flows into and out of an organization. The approaches are applicable to big data computational center and some must also use big data techniques to extract the actionable security information from the mountain of data that flows into and out of a data computational center. The briefing covers the detection of malicious delivery sites and techniques for reducing the mountain of data so that intrusion detection information can be useful, and not hidden in a plethora of false alerts. It also looks at the identification of possible unauthorized data exfiltration.
Writing a group practice business plan.
Reiboldt, J M
1999-07-01
A business plan offers group practices a blueprint to accomplish a variety of goals, such as securing capital, marketing the practice's services, recruiting new employees, developing a strategic plan or a budget, or planning for growth. A business plan should be informative, specific, and visionary. Elements that every business plan should address are a mission statement, strategy, planning, management information, and action scheme. A business plan should include certain information in a prescribed order. By writing a realistic business plan, group practices can work more efficiently and minimize the risk of not meeting their financial projections.
Wichmann, Theresia; Buchheim, Anna; Menning, Hans; Schenk, Ingmar; George, Carol; Pokorny, Dan
2016-01-01
In the last few decades, there has been an increase of experimental research on automatic unconscious processes concerning the evaluation of the self and others. Previous research investigated implicit aspects of romantic attachment using self-report measures as explicit instruments for assessing attachment style. There is a lack of experimental procedures feasible for neurobiological settings. We developed a reaction time (RT) experiment using a narrative attachment measure with an implicit nature and were interested to capture automatic processes, when the individuals’ attachment system is activated. We aimed to combine attachment methodology with knowledge from implicit measures by using a decision RT paradigm. This should serve as a means to capture implicit aspects of attachment. This experiment evaluated participants’ response to prototypic attachment sentences in association with their own attachment classification, measured with the Adult Attachment Projective Picture System (AAP). First the AAP was administered as the standardized interview procedure to 30 healthy participants, which were classified into a secure or insecure group. In the following experimental session, both experimenter and participants were blind with respect to classifications. One hundred twenty eight prototypically secure or insecure sentences related to the eight pictures of the AAP were presented to the participants. Their response and RTs were recorded. Based on the response (accept, reject) a continuous security scale was defined. Both the AAP classification and security scale were related to the RTs. Differentiated study hypotheses were confirmed for insecure sentences, which were accepted faster by participants from the insecure attachment group (or with lower security scale), and rejected faster by participants from secure attachment group (or with higher security scale). The elaborating unconscious processes were more activated by insecure sentences with potential attachment conflicts. The introduced paradigm is able to contribute to an experimental approach in attachment research. The RT analysis with the narrative procedure might be of interest for a broader variety of questions in experimental and neurophysiological settings to capture unconscious processes in association with internal working models of attachment. An electrophysiological model based on preliminary research is proposed for assessing the preconscious neuronal network related to secure or insecure attachment representations. PMID:27853426
Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R
2013-01-01
In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardwaremore » and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.« less
Workarounds to computer access in healthcare organizations: you want my password or a dead patient?
Koppel, Ross; Smith, Sean; Blythe, Jim; Kothari, Vijay
2015-01-01
Workarounds to computer access in healthcare are sufficiently common that they often go unnoticed. Clinicians focus on patient care, not cybersecurity. We argue and demonstrate that understanding workarounds to healthcare workers' computer access requires not only analyses of computer rules, but also interviews and observations with clinicians. In addition, we illustrate the value of shadowing clinicians and conducing focus groups to understand their motivations and tradeoffs for circumvention. Ethnographic investigation of the medical workplace emerges as a critical method of research because in the inevitable conflict between even well-intended people versus the machines, it's the people who are the more creative, flexible, and motivated. We conducted interviews and observations with hundreds of medical workers and with 19 cybersecurity experts, CIOs, CMIOs, CTO, and IT workers to obtain their perceptions of computer security. We also shadowed clinicians as they worked. We present dozens of ways workers ingeniously circumvent security rules. The clinicians we studied were not "black hat" hackers, but just professionals seeking to accomplish their work despite the security technologies and regulations.
Secure medical information sharing in cloud computing.
Shao, Zhiyi; Yang, Bo; Zhang, Wenzheng; Zhao, Yi; Wu, Zhenqiang; Miao, Meixia
2015-01-01
Medical information sharing is one of the most attractive applications of cloud computing, where searchable encryption is a fascinating solution for securely and conveniently sharing medical data among different medical organizers. However, almost all previous works are designed in symmetric key encryption environment. The only works in public key encryption do not support keyword trapdoor security, have long ciphertext related to the number of receivers, do not support receiver revocation without re-encrypting, and do not preserve the membership of receivers. In this paper, we propose a searchable encryption supporting multiple receivers for medical information sharing based on bilinear maps in public key encryption environment. In the proposed protocol, data owner stores only one copy of his encrypted file and its corresponding encrypted keywords on cloud for multiple designated receivers. The keyword ciphertext is significantly shorter and its length is constant without relation to the number of designated receivers, i.e., for n receivers the ciphertext length is only twice the element length in the group. Only the owner knows that with whom his data is shared, and the access to his data is still under control after having been put on the cloud. We formally prove the security of keyword ciphertext based on the intractability of Bilinear Diffie-Hellman problem and the keyword trapdoor based on Decisional Diffie-Hellman problem.
2012-01-01
Background Revalidation for UK doctors is expected to be introduced from late 2012. For general practitioners (GPs), this entails collecting supporting information to be submitted and assessed in a revalidation portfolio every five years. The aim of this study was to explore the feasibility of GPs working in secure environments to collect supporting information for the Royal College of General Practitioners’ (RCGP) proposed revalidation portfolio. Methods We invited GPs working in secure environments in England to submit items of supporting information collected during the previous 12 months using criteria and standards required for the proposed RCGP revalidation portfolio and complete a GP issues log. Initial focus groups and initial and follow-up semi-structured face-to-face and telephone interviews were held to explore GPs’ views of this process. Quantitative and qualitative data were analysed using descriptive statistics and identifying themes respectively. Results Of the 50 GPs who consented to participate in the study, 20 submitted a portfolio. Thirty-eight GPs participated in an initial interview, nine took part in a follow-up interview and 17 completed a GP issues log. GPs reported difficulty in collecting supporting information for valid patient feedback, full-cycle clinical audits and evidence for their extended practice role(s) as sessional practitioners in the high population turnover custodial environment. Peripatetic practitioners experienced more difficulty than their institution based counterparts collating this evidence. Conclusions GPs working in secure environments may experience difficulties in collecting the newer types of supporting information for the proposed RCGP revalidation portfolio primarily due to their employment status within a non-medical environment and characteristics of the detainee population. Increased support from secure environment service commissioners and employers will be a prerequisite for these practitioners to enable them to re-license using the RCGP revalidation proposals. PMID:23253694
Tsirigotis, Konstantinos; Gruszczyński, Wojciech; Pęczkowski, Sebastian
2015-10-01
Prisoners categorised as 'dangerous' are a category of prisoners that require and/or force into using special measures of caution, protection and security. The aim of the study was to examine the intensity of anxiety (as a state and as a trait) experienced by officers working with 'dangerous' prisoners and styles of coping with stress they adopt. A total of 40 officers working with 'dangerous' prisoners (the study group, SG) and 60 officers of the security department not working with 'dangerous' prisoners (the reference group, RG) were studied. The intensity of anxiety was assessed applying the Polish version of 'State-Trait Anxiety Inventory' (STAI); styles of coping with stress were explored employing the Polish version of 'Coping Inventory for Stressful Situations' (CISS) and the author's own questionnaire. Data were analysed using the mean, standard deviation, difference testing (the Mann-Whitney U test), correlation-regression procedure (Kendall's tau, τ correlation coefficient and forward stepwise multiple regression). Officers in the SG faced verbal and physical aggression; nevertheless, scores of officers in both the groups were within the interval of mean scores for all the studied STAI and CISS variables. Officers in the SG achieved significantly higher scores on the state-anxiety scale and the Emotion-Oriented Style (EOS), and lower scores on the Task-Oriented Style (TOS) and Social Diversion (SD). The correlation-regression procedure indicated that there were relationships between anxiety and styles of coping with stress but they differed slightly between the groups. Officers in the SG feel state anxiety stronger and display a stronger preference for the EOS than officers in the RG. Officers in the RG more strongly prefer the TOS and SD. State anxiety is a variable negatively explaining the TOS in the SG, whereas anxiety as a trait is a variable explaining the EOS in both the groups. The coping styles of warders dealing with dangerous prisoners are different and may need specific psychological counselling and training programmes.
Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Bergqvist, Christina Eten; Persson, Jan
2013-02-01
The aim of this prospective randomized multicenter study was to compare retropubic tension-free vaginal tape (TVT) with TVT Secur in terms of efficacy and safety. We set out to enrol 280 stress urinary incontinent (SUI) women with a half-time interim analysis of short-term cure and adverse events. The short-term results have previously been published. Of the 133 randomized women, 125 underwent surgery, and 121 (TVT n = 61, TVT Secur n = 60) were available for follow-up 1 year postsurgery. No significant differences were found between groups regarding demographics or incontinence grade. One year after surgery, both subjective and objective cure rates were significantly lower for TVT Secur than for TVT (subjective cure: TVT 98 %, TVT Secur 80 %, p = 0.03; objective cure: TVT 94 %, TVT Secur 71 % for cough test, p = 0.01; TVT 76 %, TVT Secur 58 % for pad test, p = 0.05 ). Three major complications occurred in the TVT Secur group: one tape erosion into the urethra, one tape inadvertently placed into the bladder, and one immediate postoperative bleeding due to injury to the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding peroperative bleeding, hospital stay, urge symptoms, residual urinary volume, subjective bladder emptying problems, postoperative urinary tract infections, and minor complications. The TVT Secur group used more antimuscarine medication after surgery than the TVT group (p = 0.03). Median time for surgery was 13 and 22 min for TVT Secur and TVT, respectively (p < 0.0001). The TVT Secur procedure had significantly inferior subjective and objective cure rates compared with the retropubic TVT procedure. Three serious adverse events occurred in the TVT Secur group. We therefore discourage further use of TVT Secur.
Risks, benefits and survival strategies-views from female sex workers in Savannakhet, Laos
2012-01-01
Background Female sex workers (FSWs) are vulnerable to sexually transmitted infections (STIs) and encounter socio-economic and health problems, including STIs/HIV, unintended pregnancy and complications from unsafe abortion, stigma, violence, and drug addiction. Reducing risks associated with sex work requires an understanding of the social and cultural context in which sex workers live and work. This study aimed to explore the working environment and perceived risks among FSWs in Savannakhet province in Laos. Methods Five focus group discussions (FGDs) and seven interviews were conducted with FSWs in Kaysone Phomvihan district in Laos. Latent content analysis was used to analyze the transcribed text. Results The results revealed that the FSWs were aware of risks but they also talked about benefits related to their work. The risks were grouped into six categories: STIs/HIV, unintended pregnancy, stigma, violence, being cheated, and social and economic insecurity. The reported benefits were financial security, fulfilling social obligations, and sexual pleasure. The FSWs reported using a number of strategies to reduce risks and increase benefits. Conclusions The desire to be self-sufficient and earn as much money as possible put the FSWs in disadvantaged and vulnerable situations. Fear of financial insecurity, obligations to support one’s family and the need to secure the future influenced FSWs’ decisions to have safe or unsafe sex. The FSWs were, however, not only victims. They also had some control over their lives and working environment, with most viewing their work as an easy and good way of earning money. PMID:23164407
Samele, Chiara; Forrester, Andrew; Bertram, Mark
2018-02-01
Few employment programmes exist to support forensic service users with severe mental health problems and a criminal history. Little is known about how best to achieve this. The Employment and Social Inclusion Project (ESIP) was developed and piloted to support forensic service users into employment and vocational activities. This pilot service evaluation aimed to assess the number of service users who secured employment/vocational activities and explored services users' and staff experiences. Quantitative data were collected to record the characteristics of participating service users and how many secured employment and engaged in vocational activities. Eighteen qualitative interviews were conducted with service users and staff. Fifty-seven service users engaged with the project, most were men (93.0%) and previously employed (82.5%). Four service users (7.0%) secured paid competitive employment. Eight (14.0%) gained other paid employment. Tailored one-to-one support to increase skills and build confidence was an important feature of the project. Creation of a painting and decorating programme offered training and paid/flexible work. This exploratory project achieved some success in assisting forensic service users into paid employment. Further research to identify what works well for this important group will be of great value.
Return to work after renal transplantation: a study of the Brazilian Public Social Security System.
Messias, Alexandre Augusto; Reichelt, Angela J; Dos Santos, Edson F; Albuquerque, Galton C; Kramer, José S P; Hirakata, Vania N; Garcia, Valter D
2014-12-15
Return to work is an objective parameter used worldwide to evaluate the success of organ transplantation and is especially feasible after renal transplantation. This study sought to describe the frequency of return to work after renal transplantation and related characteristics. Retrospective cohort of 511 isolated kidney transplant recipients was recruited from a Brazilian referral center from January 2005 to December 2009; all were matched to the public social security database to determine inclusion and benefit awards, as well as the rate of resumption of contributions to the public social security system, a surrogate marker of work rehabilitation. Characteristics associated with work return were analyzed. No social security records were found for 28 subjects. The remaining 483 subjects had a mean age of 45±13 years; 62% were male; 401 (83%) received some public social security benefit; 298 were paying dues and could, therefore, receive temporary or permanent disability benefits. Of these, 78 subjects made social security payments after transplantation, resulting in a work return rate of 26% (95% confidence interval, 21-32). Younger age, living donor graft, and chronic glomerulonephritis were significantly associated with return to work. In Brazil, most renal transplant recipients are on social security benefits, but only a small proportion return to work after surgery. Clinical characteristics may help define work resumption trends.
McElwain, Nancy L; Holland, Ashley S; Engle, Jennifer M; Wong, Maria S
2012-02-01
Child-mother attachment security, assessed via a modified Strange Situation procedure (Cassidy & Marvin, with the MacArthur Attachment Working Group, 1992), and parent-reported child proneness to anger were examined as correlates of observed child behavior toward mothers during a series of interactive tasks (N = 120, 60 girls). Controlling for maternal sensitivity and child gender and expressive language ability, greater attachment security, and lower levels of anger proneness were related to more child responsiveness to maternal requests and suggestions during play and snack sessions. As hypothesized, anger proneness also moderated several security-behavior associations. Greater attachment security was related to (a) more committed compliance during clean-up and snack-delay tasks for children high on anger proneness, (b) more self-assertiveness during play and snack for children moderate or high on anger proneness, and (c) more help-seeking during play and snack for children moderate or low on anger proneness. Findings further our understanding of the behavioral correlates of child-mother attachment security assessed during late toddlerhood via the Cassidy-Marvin system and underscore child anger proneness as a moderator of attachment-related differences in child behavior during this developmental period.
NASA Astrophysics Data System (ADS)
Sklavos, N.; Selimis, G.; Koufopavlou, O.
2005-01-01
The explosive growth of internet and consumer demand for mobility has fuelled the exponential growth of wireless communications and networks. Mobile users want access to services and information, from both internet and personal devices, from a range of locations without the use of a cable medium. IEEE 802.11 is one of the most widely used wireless standards of our days. The amount of access and mobility into wireless networks requires a security infrastructure that protects communication within that network. The security of this protocol is based on the wired equivalent privacy (WEP) scheme. Currently, all the IEEE 802.11 market products support WEP. But recently, the 802.11i working group introduced the advanced encryption standard (AES), as the security scheme for the future IEEE 802.11 applications. In this paper, the hardware integrations of WEP and AES are studied. A field programmable gate array (FPGA) device has been used as the hardware implementation platform, for a fair comparison between the two security schemes. Measurements for the FPGA implementation cost, operating frequency, power consumption and performance are given.
2012-05-04
FINAL 3. DATES COVERED (From - To) 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Combatting Terrorism, Rebel Groups , and Armed...facing many security threats. Al-Shabaab in Somalia, armed rebel groups , and armed militia in South Sudan pose the greatest security challenges to the...these groups . 15. SUBJECT TERMS United States Africa Command, Al-Shabaab, Lamu Oil Pipeline, Security. 16. SECURITY CLASSIFICATION OF: 17
Effect of a comprehensive health promotion program on employee attitudes.
Holzbach, R L; Piserchia, P V; McFadden, D W; Hartwell, T D; Herrmann, A; Fielding, J E
1990-10-01
A 2-year study was conducted to evaluate the effect of a health promotion program on the work-related attitudes of employees. The study employed a quasi-experimental design with nonequivalent control groups. The change in employee attitudes at companies that participated in the program was significantly greater and more favorable than that found at nonparticipating companies. Significant change was found on attitudes toward organizational commitment, supervision, working conditions, job competence, pay and fringe benefits, and job security.
Very low food security in the USA is linked with exposure to violence.
Chilton, Mariana M; Rabinowich, Jenny R; Woolf, Nicholas H
2014-01-01
To investigate characteristics of exposure to violence in relation to food security status among female-headed households. Ongoing mixed-method participatory action study. Questions addressed food insecurity, public assistance, and maternal and child health. Grounded theory analysis of qualitative themes related to violence was performed. These themes were then categorized by food security status. Homes of low-income families in Philadelphia, PA, USA. Forty-four mothers of children under 3 years of age participating in public assistance programmes. Forty women described exposure to violence ranging from fear of violence to personal experiences with rape. Exposure to violence affected mental health, ability to continue school and obtain work with living wages, and subsequently the ability to afford food. Exposure to violence during childhood and being a perpetrator of violence were both linked to very low food security status and depressive symptoms. Ten of seventeen (59%) participants reporting very low food security described life-changing violence, compared with three of fifteen (20%) participants reporting low food security and four of twelve (33%) reporting food security. Examples of violent experiences among the very low food secure group included exposure to child abuse, neglect and rape that suggest exposure to violence is an important factor in the experience of very low food security. Descriptions of childhood trauma and life-changing violence are linked with severe food security. Policy makers and clinicians should incorporate violence prevention efforts when addressing hunger.
2017 Cybersecurity Workshop: Readouts from Working Groups - Video Text
applicability of artificial intelligence to search for cybersecurity gaps in our existing SKATA networks. Second primarily renewable that all back each other up; that are all highly intelligent, artificial intelligence we have in cyber security, digital technologies, artificial intelligence. We think that that would
ERIC Educational Resources Information Center
Marshall, Verena; Bonner, Dede
2003-01-01
The relationships among career anchors, age, culture, gender, employment experience, and the impact of career planning on downsizing were examined with data from 423 management students (49% had been downsized). Lifestyle was the most valued anchor across age groups, stability/security the least; compared with Schein's earlier anchors research,…
From 5-9 September 2004 the international working group of the NATO/CCMS Pilot Study on the "Use of Landscape Sciences for Environmental Assessment" met in Lecce, Italy. The results of this meeting are documented and the scientific presentations and results are published in EcoSy...
Kornfeld, R; Rupp, K
2000-01-01
The Social Security Administration (SSA) initiated Project NetWork in 1991 to test case management as a means of promoting employment among persons with disabilities. The demonstration, which targeted Social Security Disability Insurance (DI) beneficiaries and Supplemental Security Income (SSI) applicants and recipients, offered intensive outreach, work-incentive waivers, and case management/referral services. Participation in Project NetWork was voluntary. Volunteers were randomly assigned to the "treatment" group or the "control" group. Those assigned to the treatment group met individually with a case or referral manager who arranged for rehabilitation and employment services, helped clients develop an individual employment plan, and provided direct employment counseling services. Volunteers assigned to the control group could not receive services from Project NetWork but remained eligible for any employment assistance already available in their communities. For both treatment and control groups, the demonstration waived specific DI and SSI program rules considered to be work disincentives. The experimental impact study thus measures the incremental effects of case and referral management services. The eight demonstration sites were successful in implementing the experimental design roughly as planned. Project NetWork staff were able to recruit large numbers of participants and to provide rehabilitation and employment services on a substantial scale. Most of the sites easily reached their enrollment targets and were able to attract volunteers with demographic characteristics similar to those of the entire SSI and DI caseload and a broad range of moderate and severe disabilities. However, by many measures, volunteers were generally more "work-ready" than project eligible in the demonstration areas who did not volunteer to receive NetWork services. Project NetWork case management increased average annual earnings by $220 per year over the first 2 years following random assignment. This statistically significant impact, an approximate 11-percent increase in earnings, is based on administrative data on earnings. For about 70 percent of sample members, a third year of followup data was available. For this limited sample, the estimated effect of Project NetWork on annual earnings declined to roughly zero in the third followup year. The findings suggest that the increase in earnings may have been short-lived and may have disappeared by the time Project NetWork services ended. Project NetWork did not reduce reliance on SSI or DI benefits by statistically significant amounts over the 30-42 month followup period. The services provided by Project NetWork thus did not reduce overall SSI and DI caseloads or benefits by substantial amounts, especially given that only about 5 percent of the eligible caseload volunteered to participate in Project NetWork. Project NetWork produced modest net benefits to persons with disabilities and net costs to taxpayers. Persons with disabilities gained mainly because the increases in their earnings easily outweighed the small (if any) reduction in average SSI and DI benefits. For SSA and the federal government as a whole, the costs of Project NetWork were not sufficiently offset by increases in tax receipts resulting from increased earnings or reductions in average SSI and DI benefits. The modest net benefits of Project NetWork to persons with disabilities are encouraging. How such benefits of an experimental intervention should be weighed against costs of taxpayers depends on value judgments of policymakers. Because different case management projects involve different kinds of services, these results cannot be directly generalized to other case management interventions. They are nevertheless instructive for planning new initiatives. Combining case and referral management services with various other interventions, such as longer term financial support for work or altered provider incentives, could produc
Zachary D. Barker: Final DHS HS-STEM Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barker, Z D
Working at Lawrence Livermore National Laboratory (LLNL) this summer has provided a very unique and special experience for me. I feel that the research opportunities given to me have allowed me to significantly benefit my research group, the laboratory, the Department of Homeland Security, and the Department of Energy. The researchers in the Single Particle Aerosol Mass Spectrometry (SPAMS) group were very welcoming and clearly wanted me to get the most out of my time in Livermore. I feel that my research partner, Veena Venkatachalam of MIT, and I have been extremely productive in meeting our research goals throughout thismore » summer, and have learned much about working in research at a national laboratory such as Lawrence Livermore. I have learned much about the technical aspects of research while working at LLNL, however I have also gained important experience and insight into how research groups at national laboratories function. I believe that this internship has given me valuable knowledge and experience which will certainly help my transition to graduate study and a career in engineering. My work with Veena Venkatachalam in the SPAMS group this summer has focused on two major projects. Initially, we were tasked with an analysis of data collected by the group this past spring in a large public environment. The SPAMS instrument was deployed for over two months, collecting information on many of the ambient air particles circulating through the area. Our analysis of the particle data collected during this deployment concerned several aspects, including finding groups, or clusters, of particles that seemed to appear more during certain times of day, analyzing the mass spectral data of clusters and comparing them with mass spectral data of known substances, and comparing the real-time detection capability of the SPAMS instrument with that of a commercially available biological detection instrument. This analysis was performed in support of a group report to the Department of Homeland Security on the results of the deployment. The analysis of the deployment data revealed some interesting applications of the SPAMS instrument to homeland security situations. Using software developed in-house by SPAMS group member Dr. Paul Steele, Veena and I were able to cluster a subset of data over a certain timeframe (ranging from a single hour to an entire week). The software used makes clusters based on the mass spectral characteristics of the each particle in the data set, as well as other parameters. By looking more closely at the characteristics of individual clusters, including the mass spectra, conclusions could be made about what these particles are. This was achieved partially through examination and discussion of the mass spectral data with the members of the SPAMS group, as well as through comparison with known mass spectra collected from substances tested in the laboratory. In many cases, broad conclusions could be drawn about the identity of a cluster of particles.« less
Implementing an electronic medication overview in Belgium.
Storms, Hannelore; Marquet, Kristel; Nelissen, Katherine; Hulshagen, Leen; Lenie, Jan; Remmen, Roy; Claes, Neree
2014-12-16
An accurate medication overview is essential to reduce medication errors. Therefore, it is essential to keep the medication overview up-to-date and to exchange healthcare information between healthcare professionals and patients. Digitally shared information yields possibilities to improve communication. However, implementing a digitally shared medication overview is challenging. This articles describes the development process of a secured, electronic platform designed for exchanging medication information as executed in a pilot study in Belgium, called "Vitalink". The goal of "Vitalink" is to improve the exchange of medication information between professionals working in healthcare and patients in order to achieve a more efficient cooperation and better quality of care. Healthcare professionals of primary and secondary health care and patients of four Belgian regions participated in the project. In each region project groups coordinated implementation and reported back to the steering committee supervising the pilot study. The electronic medication overview was developed based on consensus in the project groups. The steering committee agreed to establish secured and authorized access through the use of electronic identity documents (eID) and a secured, eHealth-platform conform prior governmental regulations regarding privacy and security of healthcare information. A successful implementation of an electronic medication overview strongly depends on the accessibility and usability of the tool for healthcare professionals. Coordinating teams of the project groups concluded, based on their own observations and on problems reported to them, that secured and quick access to medical data needed to be pursued. According to their observations, the identification process using the eHealth platform, crucial to ensure secured data, was very time consuming. Secondly, software packages should meet the needs of their users, thus be adapted to daily activities of healthcare professionals. Moreover, software should be easy to install and run properly. The project would have benefited from a cost analysis executed by the national bodies prior to implementation.
A Practical and Secure Coercion-Resistant Scheme for Internet Voting
NASA Astrophysics Data System (ADS)
Araújo, Roberto; Foulle, Sébastien; Traoré, Jacques
Juels, Catalano, and Jakobsson (JCJ) proposed at WPES 2005 the first voting scheme that considers real-world threats and that is more realistic for Internet elections. Their scheme, though, has a quadratic work factor and thereby is not efficient for large scale elections. Based on the work of JCJ, Smith proposed an efficient scheme that has a linear work factor. In this paper we first show that Smith's scheme is insecure. Then we present a new coercion-resistant election scheme with a linear work factor that overcomes the flaw of Smith's proposal. Our solution is based on the group signature scheme of Camenisch and Lysyanskaya (Crypto 2004).
Lovell, A; Bailey, J
2017-02-01
WHAT IS KNOWN ON THE SUBJECT?: Learning disability nursing in the area of people with a learning disability and an offending background has developed considerably over recent years, particularly since the publication of the Bradley (). There has been limited work into the competencies nurses require to work in this area, and even less about the personal attributes of learning disability nurses. WHAT THIS PAPER ADDS TO EXISTING KNOWLEDGE?: Learning disability nursing's specific contribution to the care of this population lies in their knowledge of the interaction between the learning disability, an individual's, sometimes abusive, personal history and an understanding of the subsequent offending behaviour. The knowledge base of nurses working with people with learning disabilities and an offending background needs to reflect the changing service user group. This is particularly in relation to substance misuse, borderline personality disorder, and mental health and the way such factors inter-relate with the learning disability. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: Further research is required into the relationship among decision making, risk taking or reluctance to do this, and the personal attributes required by nurses to work in secure learning disability care. Learning disability secure services are likely to continue to undergo change as circumstances alter and the offending population demonstrate greater complexity; nursing competencies and personal attributes need similarly to adapt to such changes. Mental health nursing has a great deal to contribute to effective working with this population, specifically with regard to developing strong relationships when concerns around borderline personality disorder or substance misuse are particularly in evidence. Aim To identify and discuss the personal attributes required by learning disability nurses to work effectively with people with an offending background in secure and community settings. Background This study was part of a larger research investigation into the nursing competencies required to work with people with an offending background. There are few existing studies examining the personal attributes necessary for working with this group. Design A qualitative study addressing the perceptions of nurses around the personal attributes required to work with people with learning disabilities and an offending background. Methods A semi-structured interview schedule was devised and constructed, and 39 individual interviews were subsequently undertaken with learning disability nurses working in high, medium, low secure and community settings. Data were collected over 1 year in 2010/11 and analysed using a structured thematic analysis supported by the software package MAXqda. Findings The thematic analysis produced three categories of personal attributes, named as looking deeper, achieving balance and connecting, each of which contained a further three sub-categories. Conclusion Nursing of those with a learning disability and an offending background continues to develop. The interplay among personal history, additional background factors, nurses' personal attributes and learning disability is critical for effective relationship building. © 2016 John Wiley & Sons Ltd.
Craciun, Catrinel; Flick, Uwe
2014-04-01
Nowadays people are growing old in a context where youth culture is the norm and where self-initiative is required in order to prepare for a good old age. However, planning old age may be more difficult for certain social groups with insecure work and living conditions. Precariousness, defined as bad financial conditions but also as having an insecure, unpredictable existence, has been little studied in the context of aging. This study brings its contribution by exploring how middle-aged adults with different social security backgrounds (insurance versus no insurance) think about aging. Episodic interviews were conducted to explore their concepts of aging, contexts of thinking about aging and perceptions of aging. These were compared between groups who have a secure old age ahead of them (N=10) versus those who have to struggle with an uncertain present and future (N=10). Also, differences between men (N=11) and women (N=9) were addressed. Results of the thematic analysis showed the predominance of fears related to aging as well as an emerging meaninglessness attached to old age. Starting from the different images of aging found in the two studied groups, the need for tailored interventions and policy are discussed. Copyright © 2014 Elsevier Inc. All rights reserved.
Patients' experiences when accessing their on-line electronic patient records in primary care.
Pyper, Cecilia; Amery, Justin; Watson, Marion; Crook, Claire
2004-01-01
BACKGROUND: Patient access to on-line primary care electronic patient records is being developed nationally. Knowledge of what happens when patients access their electronic records is poor. AIM: To enable 100 patients to access their electronic records for the first time to elicit patients' views and to understand their requirements. DESIGN OF STUDY: In-depth interviews using semi-structured questionnaires as patients accessed their electronic records, plus a series of focus groups. SETTING: Secure facilities for patients to view their primary care records privately. METHOD: One hundred patients from a randomised group viewed their on-line electronic records for the first time. The questionnaire and focus groups addressed patients' views on the following topics: ease of use; confidentiality and security; consent to access; accuracy; printing records; expectations regarding content; exploitation of electronic records; receiving new information and bad news. RESULTS: Most patients found the computer technology used acceptable. The majority found viewing their record useful and understood most of the content, although medical terms and abbreviations required explanation. Patients were concerned about security and confidentiality, including potential exploitation of records. They wanted the facility to give informed consent regarding access and use of data. Many found errors, although most were not medically significant. Many expected more detail and more information. Patients wanted to add personal information. CONCLUSION: Patients have strong views on what they find acceptable regarding access to electronic records. Working in partnership with patients to develop systems is essential to their success. Further work is required to address legal and ethical issues of electronic records and to evaluate their impact on patients, health professionals and service provision. PMID:14965405
78 FR 45452 - Mailing of Tickets Under the Ticket To Work Program
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-29
... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 411 [Docket No. SSA-2011-0034] RIN 0960-AH34 Mailing of Tickets Under the Ticket To Work Program AGENCY: Social Security Administration. ACTION: Final rule..., Office of Employment Support Programs, Social Security Administration, 6401 Security Boulevard, Baltimore...
Long Pulse Homopolar Generator
1988-08-01
AD-A205 452 AFWAL-TR-88-2045 LONG PULSE HOMOPOLAR GENERATOR Edward A. Knoth David P. Bauer lAP Research, Inc. 2763 Culver Avenue Dayton OH 45429-3723...TASK WORK UNIT ELEMENT NO. NO. NO ACCESSION NO. 61101F ILIR P3 01 11. TITLE (include Security Classiflcation) Long Pulse Homopolar Generator 12. PERSONAL...FIELD GROUP SUB-GROUP C6 6; y .- o- , -, ’, - 20 07 homopolar , high current, high power, high speed, generator, 19. ABIT!CT (Contkwe on rer if =ray and
Campbell, Kikuko; Bond, Gary R; Drake, Robert E; McHugo, Gregory J; Xie, Haiyi
2010-08-01
Research on vocational rehabilitation for clients with severe mental illness over the past 2 decades has yielded inconsistent findings regarding client factors statistically related to employment. The present study aimed to elucidate the relationship between baseline client characteristics and competitive employment outcomes-job acquisition and total weeks worked during an 18-month follow-up-in Individual Placement and Support (IPS). Data from 4 recent randomized controlled trials of IPS were aggregated for within-group regression analyses. In the IPS sample (N = 307), work history was the only significant predictor for job acquisition, but receiving Supplemental Security Income-with or without Social Security Disability Insurance-was associated with fewer total weeks worked (2.0%-2.8% of the variance). In the comparison sample (N = 374), clients with a diagnosis of mood disorder or with less severe thought disorder symptoms were more likely to obtain competitive employment. The findings confirm that clients with severe mental illness interested in competitive work best benefit from high-fidelity supported employment regardless of their work history and sociodemographic and clinical background, and highlight the needs for changes in federal policies for disability income support and insurance regulations.
Work security in a global economy.
Rosskam, Ellen
2003-01-01
Work security is a fundamental right of all working people. After World War II, the welfare state became an intrinsic part of the "Golden Age" of capitalism, in which universal prosperity seemed attainable. Workers' organizations frequently played a crucial role in policy decisions that promoted full employment, income stability, and equitable treatment of workers. Today's world order is quite different. Globalization in its present form is a major obstacle to work security. Globalization is not simply a market-driven phenomenon. It is a political and ideological movement that grants authority to capital over governments and labor. This transfer of authority hinders national efforts to promote work security and may impact the well-being of communities worldwide. In the absence of domestic autonomy, international labor standards are needed to protect social welfare. They should be geared toward curbing unemployment, poverty, and social exclusion in the global economy. The article looks at three initiatives to promote global work security.
1999-07-28
Inf Med, 35 (1996). 8. J. P . O’Connor, J. W. Gray, C. McCollum, L. Notargiacomo, in Research Directions in Database Security, T. F. Lunt, Ed...Therefore, in general we favour refusal over lying. 104 There are several directions for further interesting research. We only mention a few of them...of the rules of P . Given two nodes p1 and p2 there is a direct edge from p1 to p2 if and only if predicate p2 occurs positively or negatively in the
78 FR 58376 - Home System Group, Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Home System Group, Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Home System Group because Home System Group...
U.S.-CHINA RADIOLOGICAL SOURCE SECURITY PROJECT: CONTINUING AND EXPANDING BILATERAL COOPERATION
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhu, Zhixuan; Zhou, Qifu; Yang, Yaoyun
2009-10-07
The successful radiological security cooperation between the U.S. and China to secure at-risk sites near venues of the 2008 Beijing Summer Olympics has led to an expanded bilateral nonproliferation cooperation scope. The U.S. Department of Energy’s National Nuclear Security Administration, the Chinese Atomic Energy Authority and the China Ministry of Environmental Protection are continuing joint efforts to secure radiological sources throughout China under the U.S.-China Peaceful Uses of Nuclear Technology (PUNT) Agreement. Joint cooperation activities include physical security upgrades of sites with International Atomic Energy Agency (IAEA) Category 1 radiological sources, packaging, recovery, and storage of high activity transuranic andmore » beta gamma sources, and secure transportation practices for the movement of recovered sources. Expansion of cooperation into numerous provinces within China includes the use of integrated training workshops that will demonstrate methodologies and best practices between U.S. and Chinese radiological source security and recovery experts. The fiscal year 2009 expanded scope of cooperation will be conducted similar to the 2008 Olympic cooperation with the Global Threat Reduction Initiative taking the lead for the U.S., PUNT being the umbrella agreement, and Los Alamos, Sandia, and Oak Ridge National Laboratories operating as technical working groups. This paper outlines the accomplishments of the joint implementation and training efforts to date and discusses the possible impact on future U.S./China cooperation.« less
Arm yourself for the coming battle over Social Security.
Pozen, Robert C
2002-11-01
The U.S. Social Security system is in deep trouble--and that's not just bad news for your friends and family. It's also bad news for your company. Unless the Social Security system is changed, by 2017 the cash flowing out of it will exceed the cash coming in, and by 2041 the system will be utterly insolvent. But the trouble will start sooner than that: In the next decade, the very prospect of the rising deficit will mean serious pressure on recent tax cuts, higher long-term interest rates, increased pension-funding costs, and other punishing conditions for U.S. businesses. Clearly, there's a lot at stake for companies, which is why executives need to participate in the growing debate about Social Security reform, says Robert Pozen, a visiting professor at Harvard Law School who served on the President's Commission to Strengthen Social Security. In this article, he urges business leaders to take a stance on how the system should be reformed, suggesting they work with interest groups to make their voices heard. After taking a comprehensive look at the debates surrounding Social Security reform, Pozen outlines the three main alternatives executives might choose to support: increasing contributions to Social Security, decreasing the growth of benefits for more-affluent workers, and increasing investment returns on Social Security assets. What's needed to fix the current system, he contends, is a careful balance of all three.
Framework for Flexible Security in Group Communications
NASA Technical Reports Server (NTRS)
McDaniel, Patrick; Prakash, Atul
2006-01-01
The Antigone software system defines a framework for the flexible definition and implementation of security policies in group communication systems. Antigone does not dictate the available security policies, but provides high-level mechanisms for implementing them. A central element of the Antigone architecture is a suite of such mechanisms comprising micro-protocols that provide the basic services needed by secure groups.
31 CFR 375.23 - How does the securities delivery process work?
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... the securities delivery process work? If any of the offers you submitted are accepted, you must...
1986-01-01
995AB.081 IDA303502 11. TITLE (Indclude Security Classafication) Developments in Neuropsychological and Neurophysiological Assessment: An overview of...progress and products of the JWGD3 Level I Neuropsychology Task Area Group 12. PERSONAL AU1TOR(S) Reeves, D.L.; Taube, S.L. 13a. TYPE OF REPORT I13b...Phone: (301) 588-0058 7 Developments in Neuropsychological and Neurophysiological Assessment An Overview of Progress and Products of the JWGD3 Level I
Multiple attachments and group psychotherapy: implications for college counseling centers.
Marmarosh, Cheri L
2009-10-01
A large body of literature has supported the application of attachment theory to the understanding of college student development and the process of individual psychotherapy. Despite group treatment being one of the major methods of intervention in college counseling centers, there has been very little research guided by attachment theory that has been applied to the area of group psychotherapy. Many current assessment instruments used in college counseling centers can be supported with attachment theory, and many group therapy interventions are aimed at facilitating secure working models of self, other, and groups. This paper explores the importance of personal and group attachments in group psychotherapy and specifically addresses implications for clinical training and research in university counseling centers.
26 CFR 1.1081-7 - Sale of stock or securities received upon exchange by members of system group.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Orders § 1.1081-7 Sale of stock or securities received upon exchange by members of system group. (a... which are members of the same system group consists of stock or securities issued by the corporation... 26 Internal Revenue 11 2010-04-01 2010-04-01 true Sale of stock or securities received upon...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-23
... context of the security-based swap dealer definition, for affiliated groups with a registered security... for Affiliated Groups with Registered Security-Based Swap Dealers); Rule 3a71-5 (Substituted... 13n-12 (Exemption from Requirements Governing Security-Based Swap Data Repositories for Certain Non-U...
Role of farmer group institutions in increasing farm production and household food security
NASA Astrophysics Data System (ADS)
Rahmadanih; Bulkis, S.; Arsyad, M.; Amrullah, A.; Viantika, N. M.
2018-05-01
Food productions and food security are still becomes serious issue in agriculture development. The research objectives are (1) Examining the role of Farmer Group in increasing farm production and (2) Analyzing the role of Farmer Group in relationship with the household food security. The research was conducted in Soppeng District, South Sulawesi, Indonesia by taking unit of analysis at household level of Farmer Group members. Sample were 6 farmer groups, consisting of 365 households. The Results showed that the Farmer Group has a good role as a production, collaboration and market unit to increase farming production (score 2.3-2.6), but haven’t much impact to increase household food security. Rice production are 4.2 – 6.2 tons per hectare and household food security level are “low and marginal food secure” (mean score 4 and 6). Nevertheless, the role of Farmer Group showed a positive relationship with the level of household food security. So, it is necessarry to increase the role of Farmer Group in order to increase income and household food security based on Farmer Group’s needs and potencies through facilitation of (a) seed and water/irrigation availability, (b) preparing organization rules (AD/ART) and (c) appropriate training and education of food and nutrition.
ERIC Educational Resources Information Center
O'Higgins, Aoife
2012-01-01
Many young refugees face significant difficulties in securing support from social services providers. This study invited 21 young refugees aged 16 to 21 to take part in focus groups and follow-up interviews about their experiences of accessing this support. The findings reveal that young refugees may deliberately conform to expectations about…
A Study of Current World Telecommunications and a Projection of the Future
1992-09-01
SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) A STUDY OF CURRENT...51 b. Integrated Services Digital Network 53 c. Network Switching ...... ........... 54 d. SS7 ...54 Table IX PERCENTAGE OF CO WITH SS7 CAPABILITY FOR THE GROUP OF SEVEN ............. .................. 55 Table X TRENDS, FORECAST IN
Job Tenure Factors for Airline Passenger Baggage Screeners.
1994-10-01
Wanted to learn something new 3.0 4.0 4.0 19. Like working with co-workers companionship) 3.0 3.5 4.0 20. Doing airport security work - 4.0 3.0 21...importantly, airport security personnel found considerable gratification in the importance of their work, were very proud of the work they perform, and had...limited contact with people would cause them to become dissatisfied and leave. A number of examples of "isolated" work stations in airport security were
Heidarian, Ali Reza; Jafari Kelarijani, Seyed Ebrahim; Jamshidi, Reza; Khorshidi, Mohamad
2015-01-01
Health worker motivation has the potential to have a large impact on health system performance, and this depends on some factors. The purpose of this study was to determine the factors affecting this motivation. From Winter 2013 to Spring 2014, 1046 employees and physicians (439 males and 607 females) with a mean age of 36 and 37.2 years in men and women, respectively were chosen in selected hospitals of Social Security Organization (SSO). They were randomly categorized into six different classes of service record, age education class of hiring (permanent and contractual), marital status, and gender. The variables assessed via the classification groups were as follows: interpersonal relations, working conditions, equity, pay, job security, supervision, advancement, recognition, responsibility, and attractiveness of job, educational and organizational policies. Bachelor's degree (65%) or higher were the education degrees of most participants. Significant relations were observed regarding age, marital status, hiring, gender and years of service with promotion, recognition, responsibility, attractiveness of job, education, relations, working condition, equity, salary, job security, supervision and organizational policies. There were significant relations with hire status and degree with advancement and other variables. There were significant relations between marital status, gender, years of service and age with the above variables. The results show that the important variables that influence motivational factors are academic degree, hire status, marital status, gender, age and years of service.
Hyder, Adnan A; Maman, Suzanne; Nyoni, Joyce E; Khasiani, Shaniysa A; Teoh, Noreen; Premji, Zul; Sohani, Salim
2005-12-01
This study was designed to explore the interactions between food securing activities, health and gender equity from the perspective of rural east African women. The specific objectives were to document the critical interaction among these three issues-food security, gender inequity, women's health within the context of sub-Saharan Africa; to describe the nature of this triad from the perspective of women farmers in Africa; and to propose a framework for linking available interventions to the vicious nature of this triad. In-depth interviews and focus group discussions were conducted with rural women farmers in Kwale District, Kenya and Bagamoyo District, Tanzania. A total of 12 in-depth interviews and 4 focus group discussions have been included in this analysis. Transcribed text from interviews and focus group discussions were coded and thematic conceptual matrices were developed to compare dimensions of common themes across interviews and settings. A thematic analysis was then performed and a framework developed to understand the nature of the triad and explore the potential for interventions within the interactions. The vicious cycle of increasing work, lack of time, and lack of independent decision making for women who are responsible for food production and health of their families, has health and social consequences. Food securing activities have negative health consequences for women, which are further augmented by issues of gender inequity. The African development community must respond by thinking of creative solutions and appropriate interventions for the empowerment of women farmers in the region to ensure their health.
DOT National Transportation Integrated Search
2000-05-01
The member countries of the Organization of American States (OAS) have recognized that a coordinated multilateral approach to improving port security in the Western Hemisphere is needed and has established a Technical Advisory Group on Port Security ...
Retirement security: It's not just about the money.
James, Jacquelyn Boone; Matz-Costa, Christina; Smyer, Michael A
2016-01-01
Retirement security is not just about the money. Although there are many guidelines for financial security, there are few for crafting a rewarding life in the new era of longevity and health. With the meaning of "retirement" being actively redefined, there is a gap between what older adults want and need and what their employers and policymakers are offering. Retirement security in its broadest sense requires programs and policies that encourage and support flexible work that allow some choice and control over when, where, and how work gets done, and which work tasks are assumed by which employees or work teams, self-employment, and formal and informal volunteer work. This article has 3 purposes: (a) to summarize the current context of retirement, (b) to identify barriers to psychological security in later life, and (c) to suggest how psychologists can support the rewriting of the retirement chapter for future retirees. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Effects of Shift Work on Air Force Security Police Personnel.
1986-01-01
Naitoh, Paul. " Chronobiologic Approach for Optimizing Human Performance ." In Rhythmic Aspects of Behavior. eds. Frederick M. Brown and R. Curtis...Effects of Shift Work on Air Force THESIS/DISSERTATION Security Police Personnel 6. PERFORMING O1G. REPORT NUMBER 7. AUTHOR(.) 8. CONTRACT OR GRANT...shift work has a significant effect on those who perform it, this study examines the perceived effects of shift work on a population of security
OPSAID Initial Design and Testing Report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Steven A.; Stamp, Jason Edwin; Chavez, Adrian R.
2007-11-01
Process Control System (PCS) security is critical to our national security. Yet, there are a number of technological, economic, and educational impediments to PCS owners implementing effective security on their systems. OPSAID (Open PCS Security Architecture for Interoperable Design), a project sponsored by the US Department of Energy's Office of Electricity Delivery and Reliability, aims to address this issue through developing and testing an open source architecture for PCS security. Sandia National Laboratories, along with a team of PCS vendors and owners, have developed and tested this PCS security architecture. This report describes their progress to date.2 AcknowledgementsThe authors acknowledgemore » and thank their colleagues for their assistance with the OPSAID project.Sandia National Laboratories: Alex Berry, Charles Perine, Regis Cassidy, Bryan Richardson, Laurence PhillipsTeumim Technical, LLC: Dave TeumimIn addition, the authors are greatly indebted to the invaluable help of the members of the OPSAID Core Team. Their assistance has been critical to the success and industry acceptance of the OPSAID project.Schweitzer Engineering Laboratory: Rhett Smith, Ryan Bradetich, Dennis GammelTelTone: Ori Artman Entergy: Dave Norton, Leonard Chamberlin, Mark AllenThe authors would like to acknowledge that the work that produced the results presented in this paper was funded by the U.S. Department of Energy/Office of Electricity Delivery and Energy Reliability (DOE/OE) as part of the National SCADA Test Bed (NSTB) Program. Executive SummaryProcess control systems (PCS) are very important for critical infrastructure and manufacturing operations, yet cyber security technology in PCS is generally poor. The OPSAID (Open PCS (Process Control System) Security Architecture for Interoperable Design) program is intended to address these security shortcomings by accelerating the availability and deployment of comprehensive security technology for PCS, both for existing PCS and inherently secure PCS in the future. All activities are closely linked to industry outreach and advisory efforts.Generally speaking, the OPSAID project is focused on providing comprehensive security functionality to PCS that communicate using IP. This is done through creating an interoperable PCS security architecture and developing a reference implementation, which is tested extensively for performance and reliability.This report first provides background on the PCS security problem and OPSAID, followed by goals and objectives of the project. The report also includes an overview of the results, including the OPSAID architecture and testing activities, along with results from industry outreach activities. Conclusion and recommendation sections follow. Finally, a series of appendices provide more detailed information regarding architecture and testing activities.Summarizing the project results, the OPSAID architecture was defined, which includes modular security functionality and corresponding component modules. The reference implementation, which includes the collection of component modules, was tested extensively and proved to provide more than acceptable performance in a variety of test scenarios. The primary challenge in implementation and testing was correcting initial configuration errors.OPSAID industry outreach efforts were very successful. A small group of industry partners were extensively involved in both the design and testing of OPSAID. Conference presentations resulted in creating a larger group of potential industry partners.Based upon experience implementing and testing OPSAID, as well as through collecting industry feedback, the OPSAID project has done well and is well received. Recommendations for future work include further development of advanced functionality, refinement of interoperability guidance, additional laboratory and field testing, and industry outreach that includes PCS owner education. 4 5 --This page intentionally left blank --« less
The development of the Project NetWork administrative records database for policy evaluation.
Rupp, K; Driessen, D; Kornfeld, R; Wood, M
1999-01-01
This article describes the development of SSA's administrative records database for the Project NetWork return-to-work experiment targeting persons with disabilities. The article is part of a series of papers on the evaluation of the Project NetWork demonstration. In addition to 8,248 Project NetWork participants randomly assigned to receive case management services and a control group, the simulation identified 138,613 eligible nonparticipants in the demonstration areas. The output data files contain detailed monthly information on Supplemental Security Income (SSI) and Disability Insurance (DI) benefits, annual earnings, and a set of demographic and diagnostic variables. The data allow for the measurement of net outcomes and the analysis of factors affecting participation. The results suggest that it is feasible to simulate complex eligibility rules using administrative records, and create a clean and edited data file for a comprehensive and credible evaluation. The study shows that it is feasible to use administrative records data for selecting control or comparison groups in future demonstration evaluations.
Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man
2014-01-01
Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. A qualitative study using group discussions during a workshop. A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. The results of the planning workshop provide a blueprint for future research and intervention projects.
A Secure Architecture to Provide a Medical Emergency Dataset for Patients in Germany and Abroad.
Storck, Michael; Wohlmann, Jan; Krudwig, Sarah; Vogel, Alexander; Born, Judith; Weber, Thomas; Dugas, Martin; Juhra, Christian
2017-01-01
The ongoing fragmentation of medical care and mobility of patients severely restrains exchange of lifesaving information about patient's medical history in case of emergencies. Therefore, the objective of this work is to offer a secure technical solution to supply medical professionals with emergency-relevant information concerning the current patient via mobile accessibility. To achieve this goal, the official national emergency data set was extended by additional features to form a patient summary for emergencies, a software architecture was developed and data security and data protection issues were taken into account. The patient has sovereignty over his/her data and can therefore decide who has access to or can change his/her stored data, but the treating physician composes the validated dataset. Building upon the introduced concept, future activities are the development of user-interfaces for the software components of the different user groups as well as functioning prototypes for upcoming field tests.
The relationship between human security, demand for arms and disarmament in the horn of Africa.
Gebrewold, Kiflemariam
2002-01-01
The drive to find security through possession of weapons is linked to the history and culture of a social group. Amongst pastoralists in the Horn of Africa there is a failure of security through state systems such as police and the recent replacement of less-lethal traditional weapons by small arms and other light weapons. A warrior or vendetta culture with these arms leads to violent inter-clan clashes with many casualties, although traditional methods of weapons control still seem operational within clans. Understanding the drive to seek weapons is essential in finding ways to control their use. Improving the capacities of the police must come hand in hand with human rights training and an end to corruption. Further work is required on how traditional methods of arms control can be co-operatively linked with state controls.
NASA Astrophysics Data System (ADS)
Tsaur, Woei-Jiunn; Pai, Haw-Tyng
2008-11-01
The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). The operation in MANETs' groups performs a decentralized manner and accommodated membership dynamically. Moreover, due to lack of centralized control, MANETs' groups are inherently insecure and vulnerable to attacks from both within and outside the groups. Such features make access control more challenging in MANETs. Recently, several researchers have proposed group access control mechanisms in MANETs based on a variety of threshold signatures. However, these mechanisms cannot actually satisfy MANETs' dynamic environments. This is because the threshold-based mechanisms cannot be achieved when the number of members is not up to the threshold value. Hence, by combining the efficient elliptic curve cryptosystem, self-certified public key cryptosystem and secure filter technique, we construct dynamic key management schemes based on hierarchical clustering for securing group access control in MANETs. Specifically, the proposed schemes can constantly accomplish secure group access control only by renewing the secure filters of few cluster heads, when a cluster head joins or leaves a cross-cluster. In such a new way, we can find that the proposed group access control scheme can be very effective for securing practical applications in MANETs.
Towards a coherent global framework for health financing: recommendations and recent developments.
Ottersen, Trygve; Elovainio, Riku; Evans, David B; McCoy, David; Mcintyre, Di; Meheus, Filip; Moon, Suerie; Ooms, Gorik; Røttingen, John-Arne
2017-04-01
The articles in this special issue have demonstrated how unprecedented transitions have come with both challenges and opportunities for health financing. Against the background of these challenges and opportunities, the Working Group on Health Financing at the Chatham House Centre on Global Health Security laid out, in 2014, a set of policy responses encapsulated in 20 recommendations for how to make progress towards a coherent global framework for health financing. These recommendations pertain to domestic financing of national health systems, global public goods for health, external financing for national health systems and the cross-cutting issues of accountability and agreement on a new global framework. Since the Working Group concluded its work, multiple events have reinforced the group's recommendations. Among these are the agreement on the Addis Ababa Action Agenda, the adoption of the Sustainable Development Goals, the outbreak of Ebola in West Africa and the release of the Panama Papers. These events also represent new stepping stones towards a new global framework.
Nuclear thermal source transfer unit, post-blast soil sample drying system
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wiser, Ralph S.; Valencia, Matthew J
Los Alamos National Laboratory states that its mission is “To solve national security challenges through scientific excellence.” The Science Undergraduate Laboratory Internship (SULI) programs exists to engage undergraduate students in STEM work by providing opportunity to work at DOE facilities. As an undergraduate mechanical engineering intern under the SULI program at Los Alamos during the fall semester of 2016, I had the opportunity to contribute to the mission of the Laboratory while developing skills in a STEM discipline. I worked with Technology Applications, an engineering group that supports non-proliferation, counter terrorism, and emergency response missions. This group specializes in toolmore » design, weapons engineering, rapid prototyping, and mission training. I assisted with two major projects during my appointment Los Alamos. The first was a thermal source transportation unit, intended to safely contain a nuclear thermal source during transit. The second was a soil drying unit for use in nuclear postblast field sample collection. These projects have given me invaluable experience working alongside a team of professional engineers. Skills developed include modeling, simulation, group design, product and system design, and product testing.« less
[Characteristics of art therapists in rehabilitative therapy].
Oster, Jörg
2017-09-01
Characteristics of art therapists in rehabilitative therapy Objectives: This study examines the sociodemographic, qualification- and activity-related characteristics of art therapists working in the field of rehabilitation. In 2013, an analysis of occupational groups was carried out in Germany, with the objective of describing the art therapists working there.A total of 2,303 complete datasets were submitted. From this group, those therapists mainly working in the field of rehabilitation/follow-up care/participation of disabled persons (according to Social Security Code VI and IX, n = 302) were selected and described. Most art therapists are female (average age 45 years) and largelywork part-time. Music and art therapy are the most common venues.More than 80% have a graduate degree. Methods of quality management are used.More than half of the therapists working in rehabilitation hospitals are employed in the field of psychosomatic medicine. Both individual and group therapy (each patient attending 1-2 times a week) are common. The results provide an overview of art therapy in the field of rehabilitation and show the spread in rehabilitation. Further research is indicated.
Teleradiology applications with DICOM-e-mail.
Weisser, G; Engelmann, U; Ruggiero, S; Runa, A; Schröter, A; Baur, S; Walz, M
2007-05-01
For the connection of several partners to a Dicom-e-mail based teleradiology network concepts were developed to allow the integration of different teleradiology applications. The organisational and technical needs for such an integration were analysed. More than 60 institutions including 23 hospitals in the Rhein-Neckar-Region, Germany were connected. The needed functionality was grouped in six teleradiology applications (emergency consultation, tele-guided examinations, expert consultations, cooperative work, scientific cooperations and homework with on call services) and their technical and organisational needs according to availability, speed of transfer, workflow definitions and data security needs was analysed. For the local integration of teleradiology services the setup and workflow is presented for a standalone teleradiology workstation and a server based teleradiology gateway. The line type needed for different groups of applications and users is defined. The security concept and fallback strategies are laid out, potential security problems and sources of errors are discussed. The specialties for the emergency teleradiology application are presented. The DICOM-e-mail protocol is a flexible and powerful protocol that can be used for a variety of teleradiology applications. It can meet the conditions for emergency applications but is limited if synchronous applications like teleconferences are needed.
NASA Astrophysics Data System (ADS)
Vijay Singh, Ran; Agilandeeswari, L.
2017-11-01
To handle the large amount of client’s data in open cloud lots of security issues need to be address. Client’s privacy should not be known to other group members without data owner’s valid permission. Sometime clients are fended to have accessing with open cloud servers due to some restrictions. To overcome the security issues and these restrictions related to storing, data sharing in an inter domain network and privacy checking, we propose a model in this paper which is based on an identity based cryptography in data transmission and intermediate entity which have client’s reference with identity that will take control handling of data transmission in an open cloud environment and an extended remote privacy checking technique which will work at admin side. On behalf of data owner’s authority this proposed model will give best options to have secure cryptography in data transmission and remote privacy checking either as private or public or instructed. The hardness of Computational Diffie-Hellman assumption algorithm for key exchange makes this proposed model more secure than existing models which are being used for public cloud environment.
Sugarman, J; Kaalund, V; Kodish, E; Marshall, M F; Reisner, E G; Wilfond, B S; Wolpe, P R
1997-09-17
Banking umbilical cord blood (UCB) to be used as a source of stem cells for transplantation is associated with a set of ethical issues. An examination of these issues is needed to inform public policy and to raise the awareness of prospective parents, clinicians, and investigators. Individuals with expertise in anthropology, blood banking, bone marrow transplantation, ethics, law, obstetrics, pediatrics, and the social sciences were invited to join the Working Group on Ethical Issues in Umbilical Cord Blood Banking. Members were assigned topics to present to the Working Group. Following independent reviews, background materials were sent to the Working Group. Individual presentations of topics at a 2-day meeting were followed by extensive group discussions in which consensus emerged. A writing committee then drafted a document that was circulated to the entire Working Group. After 3 rounds of comments over several months, all but 1 member of the Working Group agreed with the presentation of our conclusions. (1) Umbilical cord blood technology is promising although it has several investigational aspects; (2) during this investigational phase, secure linkage should be maintained of stored UCB to the identity of the donor; (3) UCB banking for autologous use is associated with even greater uncertainty than banking for allogeneic use; (4) marketing practices for UCB banking in the private sector need close attention; (5) more data are needed to ensure that recruitment for banking and use of UCB are equitable; and (6) the process of obtaining informed consent for collection of UCB should begin before labor and delivery.
O'Higgins, Aoife
2012-01-01
Many young refugees face significant difficulties in securing support from social services providers. This study invited 21 young refugees aged 16 to 21 to take part in focus groups and follow-up interviews about their experiences of accessing this support. The findings reveal that young refugees may deliberately conform to expectations about their vulnerability in order to benefit from greater support from service providers. Social workers may fail to consider young refugees' abilities and understand the ways in which each individual is vulnerable. The study suggests that group work may be an effective way to engage young refugees to overcome this. Copyright © 2012 Wiley Periodicals, Inc., A Wiley Company.
Modeling Tools for Propulsion Analysis and Computational Fluid Dynamics on the Internet
NASA Technical Reports Server (NTRS)
Muss, J. A.; Johnson, C. W.; Gotchy, M. B.
2000-01-01
The existing RocketWeb(TradeMark) Internet Analysis System (httr)://www.iohnsonrockets.com/rocketweb) provides an integrated set of advanced analysis tools that can be securely accessed over the Internet. Since these tools consist of both batch and interactive analysis codes, the system includes convenient methods for creating input files and evaluating the resulting data. The RocketWeb(TradeMark) system also contains many features that permit data sharing which, when further developed, will facilitate real-time, geographically diverse, collaborative engineering within a designated work group. Adding work group management functionality while simultaneously extending and integrating the system's set of design and analysis tools will create a system providing rigorous, controlled design development, reducing design cycle time and cost.
Hitchcock, Penny J; Mair, Michael; Inglesby, Thomas V; Gross, Jonathan; Henderson, D A; O'Toole, Tara; Ahern-Seronde, Joa; Bahnfleth, William P; Brennan, Terry; Burroughs, H E Barney; Davidson, Cliff; Delp, William; Ensor, David S; Gomory, Ralph; Olsiewski, Paula; Samet, Jonathan M; Smith, William M; Streifel, Andrew J; White, Ronald H; Woods, James E
2006-01-01
The prospect of biological attacks is a growing strategic threat. Covert aerosol attacks inside a building are of particular concern. In the summer of 2005, the Center for Biosecurity of the University of Pittsburgh Medical Center convened a Working Group to determine what steps could be taken to reduce the risk of exposure of building occupants after an aerosol release of a biological weapon. The Working Group was composed of subject matter experts in air filtration, building ventilation and pressurization, air conditioning and air distribution, biosecurity, building design and operation, building decontamination and restoration, economics, medicine, public health, and public policy. The group focused on functions of the heating, ventilation, and air conditioning systems in commercial or public buildings that could reduce the risk of exposure to deleterious aerosols following biological attacks. The Working Group's recommendations for building owners are based on the use of currently available, off-the-shelf technologies. These recommendations are modest in expense and could be implemented immediately. It is also the Working Group's judgment that the commitment and stewardship of a lead government agency is essential to secure the necessary financial and human resources and to plan and build a comprehensive, effective program to reduce exposure to aerosolized infectious agents in buildings.
NASA Electronic Library System (NELS): The system impact of security
NASA Technical Reports Server (NTRS)
Mcgregor, Terry L.
1993-01-01
This paper discusses security issues as they relate to the NASA Electronic Library System which is currently in use as the repository system for AdaNET System Version 3 (ASV3) being operated by MountainNET, Inc. NELS was originally designed to provide for public, development, and secure collections and objects. The secure feature for collections and objects was deferred in the initial system for implementation at a later date. The NELS system is now 9 months old and many lessons have been learned about the use and maintenance of library systems. MountainNET has 9 months of experience in operating the system and gathering feedback from the ASV3 user community. The user community has expressed an interest in seeing security features implemented in the current system. The time has come to take another look at the whole issue of security for the NELS system. Two requirements involving security have been put forth by MountainNET for the ASV3 system. The first is to incorporate at the collection level a security scheme to allow restricted access to collections. This should be invisible to end users and be controlled by librarians. The second is to allow inclusion of applications which can be executed only by a controlled group of users; for example, an application which can be executed by librarians only. The requirements provide a broad framework in which to work. These requirements raise more questions than answers. To explore the impact of these requirements a top down approach will be used.
Borre, Kristen; Ertle, Luke; Graff, Mariaelisa
2010-04-01
Food insecurity and obesity have potential health consequences for migrant and seasonal farm workers (MSFW). Thirty-six Latino MSFW working in eastern North Carolina whose children attended Migrant Head Start completed interviews, focus groups and home visits. Content analysis, nutrient analysis, and non-parametric statistical analysis produced results. MSFW (63.8%) families were food insecure; of those, 34.7% experienced hunger. 32% of pre-school children were food insecure. Food secure families spent more money on food. Obesity was prevalent in adults and children but the relationship to food insecurity remains unclear. Strategies to reduce risk of foods insecurity were employed by MSFW, but employer and community assistance is needed to reduce their risk. Food insecurity is rooted in the cultural lifestyle of farmwork, poverty, and dependency. MSFW obesity and food insecurity require further study to determine the relationship with migration and working conditions. Networking and social support are important for MSFW families to improve food security. Policies and community/workplace interventions could reduce risk of food insecurity and improve the health of workers. (c) 2010 Wiley-Liss, Inc.
Socio-economic status of workers of building construction industry.
Tiwary, Guddi; Gangopadhyay, P K; Biswas, S; Nayak, K; Chatterjee, M K; Chakraborty, D; Mukherjee, S
2012-05-01
Informal/unorganised sector covers 92% of the total work force in India. About 50% of the construction industrial workers belonged to informal/unorganised sector. The present study was undertaken to know the socio-economic status of construction worker and availing of the social security measures by this working group. The study covered 150 subjects with an average age of 32 years and mean duration of work was nine years. They were poorly paid with an average income of Rs. 4956/-per month. Though the literacy rate was high (79%) yet most of them were addicted to different habits like drinking alcohol, smoking bidi, tobacco chewing etc., Abusing the family members were noted in (30%) of the cases. Their regular intake of food, usually inadequate in quantity and was mainly consisted of rice, pulses, vegetables. Though most of the subjects (73%) were living in kacha houses yet the latrine facilities were available to 62% of total covered houses. Majority of them were unaware of the different social security schemes/measures. The details have been discussed here.
Socio-economic status of workers of building construction industry
Tiwary, Guddi; Gangopadhyay, P. K.; Biswas, S.; Nayak, K.; Chatterjee, M. K.; Chakraborty, D.; Mukherjee, S.
2012-01-01
Background: Informal/unorganised sector covers 92% of the total work force in India. About 50% of the construction industrial workers belonged to informal/unorganised sector. Material and Methods: The present study was undertaken to know the socio-economic status of construction worker and availing of the social security measures by this working group. Results and Conclusion: The study covered 150 subjects with an average age of 32 years and mean duration of work was nine years. They were poorly paid with an average income of Rs. 4956/-per month. Though the literacy rate was high (79%) yet most of them were addicted to different habits like drinking alcohol, smoking bidi, tobacco chewing etc., Abusing the family members were noted in (30%) of the cases. Their regular intake of food, usually inadequate in quantity and was mainly consisted of rice, pulses, vegetables. Though most of the subjects (73%) were living in kacha houses yet the latrine facilities were available to 62% of total covered houses. Majority of them were unaware of the different social security schemes/measures. The details have been discussed here. PMID:23580836
Cyber indicators of compromise: a domain ontology for security information and event management
2017-03-01
COMPROMISE: A DOMAIN ONTOLOGY FOR SECURITY INFORMATION AND EVENT MANAGEMENT by Marsha D. Rowell March 2017 Thesis Co-Advisors: J. D...to automate this work is Security Information and Event Management (SIEM). In short, SIEM technology works by aggregating log information , and then...Distribution is unlimited. CYBER INDICATORS OF COMPROMISE: A DOMAIN ONTOLOGY FOR SECURITY INFORMATION AND EVENT MANAGEMENT Marsha D. Rowell
The MICROBE Project, A Report from the Interagency Working Group on Microbial Genomics
2001-01-01
including targeting of genes related to pathogenesis, possibilities for acquired pathogen resistance, industrial and food -grade enzymes, and probiotics ...safety, food security, biotechnology, value-added products , human nutrition and functional foods , plant and animal protection and furthering fundamental...supports a number of microbial studies, which are integral components of the USDA national programs in animal health, food animal production , food
76 FR 6499 - China 9D Construction Group; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China 9D Construction Group; Order of Suspension of Trading February 2, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China 9D Construction Group...
Georgiou, Andrew; Magrabi, Farah; Hypponen, Hannele; Wong, Zoie Shui-Yee; Nykänen, Pirkko; Scott, Philip J; Ammenwerth, Elske; Rigby, Michael
2018-04-22
The paper draws attention to: i) key considerations involving the confidentiality, privacy, and security of shared data; and ii) the requirements needed to build collaborative arrangements encompassing all stakeholders with the goal of ensuring safe, secure, and quality use of shared data. A narrative review of existing research and policy approaches along with expert perspectives drawn from the International Medical Informatics Association (IMIA) Working Group on Technology Assessment and Quality Development in Health Care and the European Federation for Medical Informatics (EFMI) Working Group for Assessment of Health Information Systems. The technological ability to merge, link, re-use, and exchange data has outpaced the establishment of policies, procedures, and processes to monitor the ethics and legality of shared use of data. Questions remain about how to guarantee the security of shared data, and how to establish and maintain public trust across large-scale shared data enterprises. This paper identifies the importance of data governance frameworks (incorporating engagement with all stakeholders) to underpin the management of the ethics and legality of shared data use. The paper also provides some key considerations for the establishment of national approaches and measures to monitor compliance with best practice. Data sharing endeavours can help to underpin new collaborative models of health care which provide shared information, engagement, and accountability amongst all stakeholders. We believe that commitment to rigorous evaluation and stakeholder engagement will be critical to delivering health data benefits and the establishment of collaborative models of health care into the future. Georg Thieme Verlag KG Stuttgart.
2016-03-01
PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as
The research of computer network security and protection strategy
NASA Astrophysics Data System (ADS)
He, Jian
2017-05-01
With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.
Heckle, Rosa R; Lutters, Wayne G
2011-08-01
Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due to a concern for privacy. From a preliminary analysis of our on-going field study at a community hospital, there appears to be a number of mismatches between the SSO vision and the realities of routine work. While we cannot conclusively say if a SSO adoption will be effective in meeting its goals in a hospital environment, we do know that it will affect the work practice and that will make the management of the SSO system problematic. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Code of Federal Regulations, 2014 CFR
2014-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2010 CFR
2010-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2012 CFR
2012-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2011 CFR
2011-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
Code of Federal Regulations, 2013 CFR
2013-07-01
... Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY MARITIME SECURITY MARITIME SECURITY: FACILITIES Facility Security Assessment (FSA) § 105.300 General. (a) The Facility Security... the Facility Security Officer (FSO) reviews and accepts their work. (d) Those involved in a FSA must...
20 CFR 416.901 - Scope of subpart.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... defined in title XVI of the Social Security Act. This subpart explains how we determine whether you are... work; (3) How we consider the vocational factors of age, education, and work experience; (4) What we...
20 CFR 416.901 - Scope of subpart.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... defined in title XVI of the Social Security Act. This subpart explains how we determine whether you are... work; (3) How we consider the vocational factors of age, education, and work experience; (4) What we...
20 CFR 416.901 - Scope of subpart.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... defined in title XVI of the Social Security Act. This subpart explains how we determine whether you are... work; (3) How we consider the vocational factors of age, education, and work experience; (4) What we...
20 CFR 416.901 - Scope of subpart.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... defined in title XVI of the Social Security Act. This subpart explains how we determine whether you are... work; (3) How we consider the vocational factors of age, education, and work experience; (4) What we...
20 CFR 416.901 - Scope of subpart.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND... defined in title XVI of the Social Security Act. This subpart explains how we determine whether you are... work; (3) How we consider the vocational factors of age, education, and work experience; (4) What we...
Study and validation of tools interoperability in JPSEC
NASA Astrophysics Data System (ADS)
Conan, V.; Sadourny, Y.; Jean-Marie, K.; Chan, C.; Wee, S.; Apostolopoulos, J.
2005-08-01
Digital imagery is important in many applications today, and the security of digital imagery is important today and is likely to gain in importance in the near future. The emerging international standard ISO/IEC JPEG-2000 Security (JPSEC) is designed to provide security for digital imagery, and in particular digital imagery coded with the JPEG-2000 image coding standard. One of the primary goals of a standard is to ensure interoperability between creators and consumers produced by different manufacturers. The JPSEC standard, similar to the popular JPEG and MPEG family of standards, specifies only the bitstream syntax and the receiver's processing, and not how the bitstream is created or the details of how it is consumed. This paper examines the interoperability for the JPSEC standard, and presents an example JPSEC consumption process which can provide insights in the design of JPSEC consumers. Initial interoperability tests between different groups with independently created implementations of JPSEC creators and consumers have been successful in providing the JPSEC security services of confidentiality (via encryption) and authentication (via message authentication codes, or MACs). Further interoperability work is on-going.
NASA Astrophysics Data System (ADS)
Michaelis, A.; Ganguly, S.; Nemani, R. R.; Votava, P.; Wang, W.; Lee, T. J.; Dungan, J. L.
2014-12-01
Sharing community-valued codes, intermediary datasets and results from individual efforts with others that are not in a direct funded collaboration can be a challenge. Cross organization collaboration is often impeded due to infrastructure security constraints, rigid financial controls, bureaucracy, and workforce nationalities, etc., which can force groups to work in a segmented fashion and/or through awkward and suboptimal web services. We show how a focused community may come together, share modeling and analysis codes, computing configurations, scientific results, knowledge and expertise on a public cloud platform; diverse groups of researchers working together at "arms length". Through the OpenNEX experimental workshop, users can view short technical "how-to" videos and explore encapsulated working environment. Workshop participants can easily instantiate Amazon Machine Images (AMI) or launch full cluster and data processing configurations within minutes. Enabling users to instantiate computing environments from configuration templates on large public cloud infrastructures, such as Amazon Web Services, may provide a mechanism for groups to easily use each others work and collaborate indirectly. Moreover, using the public cloud for this workshop allowed a single group to host a large read only data archive, making datasets of interest to the community widely available on the public cloud, enabling other groups to directly connect to the data and reduce the costs of the collaborative work by freeing other individual groups from redundantly retrieving, integrating or financing the storage of the datasets of interest.
Security warning method and system for worker safety during live-line working
NASA Astrophysics Data System (ADS)
Jiang, Chilong; Zou, Dehua; Long, Chenhai; Yang, Miao; Zhang, Zhanlong; Mei, Daojun
2017-09-01
Live-line working is an essential part in the operations in an electric power system. Live-line workers are required to wear shielding clothing. Shielding clothing, however, acts as a closed environment for the human body. Working in a closed environment for a long time can change the physiological responses of the body and even endanger personal safety. According to the typical conditions of live-line working, this study synthesizes environmental factors related to shielding clothing and the physiological factors of the body to establish the heart rate variability index RMSSD and the comprehensive security warning index SWI. On the basis of both indices, this paper proposes a security warning method and system for the safety live-line workers. The system can monitor the real-time status of workers during live-line working to provide security warning and facilitate the effective safety supervision by the live operation center during actual live-line working.
Preventive Interventions and Sustained Attachment Security in Maltreated Children
Stronach, Erin Pickreign; Toth, Sheree L.; Rogosch, Fred; Cicchetti, Dante
2013-01-01
Thirteen-month-old maltreated infants (n = 137) and their mothers were randomly assigned to one of three conditions: child-parent psychotherapy (CPP), psychoeducational parenting intervention (PPI), and community standard (CS). A fourth group of nonmaltreated infants (n =52) and their mothers served as a normative comparison (NC) group. A prior investigation found that the CPP and PPI groups demonstrated substantial increases in secure attachment at post-intervention, whereas this change was not found in the CS and NC groups. The current investigation involved the analysis of data obtained at a follow-up assessment that occurred 12-months after the completion of treatment. At follow-up, children in the CPP group had higher rates of secure and lower rates of disorganized attachment than did children in the PPI or CS groups. Rates of disorganized attachment did not differ between the CPP and NC groups. Intention-to-treat analyses (ITT) also showed higher rates of secure attachment at follow-up in the CPP group relative to the PPI and CS groups. However, groups did not differ on disorganized attachment. Both primary and ITT analyses demonstrated that maternal reported child behavior problems did not differ among the four groups at the follow-up assessment. This is the first investigation to demonstrate sustained attachment security in maltreated children 12 months after the completion of an attachment theory-informed intervention. Findings also suggest that, while effective in the short term, parenting interventions alone may not be effective in maintaining secure attachment in children over time. PMID:24229539
Rivera, Rebecca L; Maulding, Melissa K; Abbott, Angela R; Craig, Bruce A; Eicher-Miller, Heather A
2016-11-01
Food insecurity is negatively associated with US children's dietary intake and health. The Supplemental Nutrition Assistance Program-Education (SNAP-Ed) aims to alleviate food insecurity by offering nutrition, budgeting, and healthy lifestyle education to low-income individuals and families. The objective of this study was to evaluate the long-term impact of the Indiana SNAP-Ed on food security among households with children. A randomized, controlled, parallel study design with SNAP-Ed as an intervention was carried out during a 4- to 10-wk intervention period. Intervention group participants received the first 4 Indiana SNAP-Ed curriculum lessons. Study participants (n = 575) were adults aged ≥18 y from low-income Indiana households with ≥1 child living in the household. Both treatment groups completed an assessment before and after the intervention period and 1 y after recruitment. The 18-item US Household Food Security Survey Module was used to classify the primary outcomes of food security for the household and adults and children in the household. A linear mixed model was used to compare intervention with control group effects over time on food security. Mean ± SEM changes in household food security score and food security score among household adults from baseline to 1-y follow-up were 1.2 ± 0.4 and 0.9 ± 0.3 units lower, respectively, in the intervention group than in the control group (P < 0.01). The mean change in food security score from baseline to 1-y follow-up among household children was not significantly different in the intervention group compared with the control group. SNAP-Ed improved food security over a longitudinal time frame among low-income Indiana households with children in this study. SNAP-Ed may be a successful intervention to improve food security. © 2016 American Society for Nutrition.
Gray, Sarah A O
2015-01-01
This pilot program evaluation was undertaken to examine the effectiveness of an attachment-based, group professional-development experience, Circle of Security-Parenting, on family childcare (FCC) providers' psychological resources and self-efficacy in managing children's challenging behaviors and supporting children's socioemotional development. Licensed FCC providers with children actively in their care (n = 34) self-selected into the program, offered in English and Spanish through a regional support network for FCC providers; a comparison group of providers was recruited from the state database of licensed providers (n = 17). A significant Time × Group interaction was observed for self-efficacy in managing challenging behaviors, F(1, 46) = 30.59, p = .000, partial η(2) = .40, with participating providers' mean self-efficacy scores increasing, p = .000, d = .78, while comparison providers' decreased, p = .003, d = 1.40. Mean depressive symptoms decreased over time for both groups whereas job stress-related resources were stable over time in both groups. Patterns of association were found between providers' self-report of difficulties considering children's mental states and depressive symptoms, job stress resources, and self-efficacy. Limitations and implications for future research are reviewed, including the impact of conducting this work within an organized support network for FCC providers. © 2015 Michigan Association for Infant Mental Health.
Nystuen, Pal; Hagen, Kare B
2006-01-01
Background Long-term sick leave has been of concern to politicians and decision-makers in Norway for several years. In the current study we assess the efficacy of a solution-focused follow-up for sick-listed employees. Methods Employees on long-term sick leave due to psychological problems or muscle skeletal pain (n = 703) were invited to participate in the project. Following self-recruitment, 103 were randomly allocated to receive solution-focused follow-up (n = 53) or "treatment as usual" (n = 50). The intervention was integrated within the regular follow up of six social security offices and organised as eight weekly solution focused work sessions. Effectiveness was measured by rate of return to work and health related quality of life (SF-36). Results Intention to treat analysis showed no significant differences between the two groups for any of the outcome measures. Secondary analysis, comparing those who attended at least 50% of the sessions with the control group revealed a significant difference in favour of the active intervention group in the SF-36 subscale of mental health (Effect Size 0.56, p = 0.05). When comparing the subgroup of participants with psychological problems there was a significant difference in mental health in favour of the intervention group (Effect Size 0.71, p = 0.041). Conclusion A voluntary solution-focused intervention offered by social-security offices is no more effective than regular follow up for employees on long-term sick leave due to psychological problems or muscle skeletal pain. PMID:16542443
Heidarian, Ali Reza; Jafari Kelarijani, Seyed Ebrahim; Jamshidi, Reza; Khorshidi, Mohamad
2015-01-01
Background: Health worker motivation has the potential to have a large impact on health system performance, and this depends on some factors. The purpose of this study was to determine the factors affecting this motivation. Methods: From Winter 2013 to Spring 2014, 1046 employees and physicians (439 males and 607 females) with a mean age of 36 and 37.2 years in men and women, respectively were chosen in selected hospitals of Social Security Organization (SSO). They were randomly categorized into six different classes of service record, age education class of hiring (permanent and contractual), marital status, and gender. The variables assessed via the classification groups were as follows: interpersonal relations, working conditions, equity, pay, job security, supervision, advancement, recognition, responsibility, and attractiveness of job, educational and organizational policies. Results: Bachelor’s degree (65%) or higher were the education degrees of most participants. Significant relations were observed regarding age, marital status, hiring, gender and years of service with promotion, recognition, responsibility, attractiveness of job, education, relations, working condition, equity, salary, job security, supervision and organizational policies. There were significant relations with hire status and degree with advancement and other variables. There were significant relations between marital status, gender, years of service and age with the above variables. Conclusion: The results show that the important variables that influence motivational factors are academic degree, hire status, marital status, gender, age and years of service. PMID:26644886
Engage States on Energy Assurance and Energy Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kara Colton; John Ratliff; Sue Gander
2008-09-30
The NGA Center's 'Engaging States on Energy Security and Energy Assurance' has been successful in achieving the stated project purposes and objectives both in the initial proposal as well as in subsequent revisions to it. Our activities, which involve the NGA Center for Best Practices (The NGA Center) Homeland Security and Technology Division, included conducting tabletop exercises to help federal and state homeland security and energy officials determine roles and actions for various emergency scenarios. This included efforts to education state official on developing an energy assurance plan, harmonizing approaches to controlling price volatility, implementing reliability standards, understanding short andmore » long-term energy outlooks and fuel diversification, and capitalizing on DOE's research and development activities. Regarding our work on energy efficiency and renewable energy, the NGA Center's Environment, Energy and Natural Resources Division hosted three workshops which engaged states on the clean energy and alternative transportation fuel and also produced several reports on related topics. In addition, we convened 18 meetings, via conference call, of the Energy Working Group. Finally, through the NGA Center's Front and Center newsletter articles, the NGA Center disseminated promising practices to a wide audience of state policymakers. The NGA Center also hosted a number of workshops and web conferences designed to directly engage states on the deliverables under this Cooperative Agreement. Through the NGA Center's written products and newsletter articles, the NGA Center was able to disseminate promising practices to a wide audience of state policymakers.« less
Connecting to the Internet Securely; Protecting Home Networks CIAC-2324
DOE Office of Scientific and Technical Information (OSTI.GOV)
Orvis, W J; Krystosek, P; Smith, J
2002-11-27
With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does notmore » consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.« less
Walker, T; Edge, D; Shaw, J; Wilson, H; McNair, L; Mitchell, H; Gutridge, K; Senior, J; Sutton, M; Meacock, R; Abel, K
2017-11-01
WHAT IS KNOWN ON THE SUBJECT?: Three pilot UK-only Women's Enhanced Medium Secure Services (WEMSS) was opened in 2007 to support women's movement from high secure care and provide a bespoke, women-only service. Evidence suggests that women's secure services are particularly challenging environments to work in and staffing issues (e.g., high turnover) can cause difficulties in establishing a therapeutic environment. Research in this area has focused on the experiences of service users. Studies which have examined staff views have focused on their feelings towards women in their care and the emotional burden of working in women's secure services. No papers have made a direct comparison between staff working in different services. WHAT DOES THIS STUDY ADD TO EXISTING KNOWLEDGE?: This is the first study to explore the views and experiences of staff in the three UK WEMSS pilot services and contrast them with staff from women's medium secure services. Drawing upon data from eighteen semi-structured interviews (nine WEMSS, nine non-WEMSS), key themes cover staff perceptions of factors important for women's recovery and their views on operational aspects of services. This study extends our understanding of the experiences of staff working with women in secure care and bears relevance for staff working internationally, as well as in UK services. WHAT ARE THE IMPLICATIONS FOR PRACTICE?: The study reveals the importance of induction and training for bank and agency staff working in women's secure services. Further, regular clinical supervision should be mandatory for all staff so they are adequately supported. Introduction Women's Enhanced Medium Secure Services (WEMSS) is bespoke, gender-sensitive services which opened in the UK in 2007 at three pilot sites. This study is the first of its kind to explore the experiences of WEMSS staff, directly comparing them to staff in a standard medium secure service for women. The literature to date has focused on the experiences of service users or staff views on working with women in secure care. Aim This qualitative study, embedded in a multimethod evaluation of WEMSS, aimed to explore the views and experiences of staff in WEMSS and comparator medium secure services. Methods Qualitative interviews took place with nine WEMSS staff and nine comparator medium secure staff. Interviews focused on factors important for recovery, barriers to facilitating recovery and operational aspects of the service. Discussion This study provides a rare insight into the perspectives of staff working in UK women's secure services, an under-researched area in the UK and internationally. Findings suggest that the success of services, including WEMSS, is compromised by operational factors such as the use of bank staff. Implications for practice Comprehensive training and supervision should be mandatory for all staff, so best practice is met and staff adequately supported. © 2017 John Wiley & Sons Ltd.
Fillion, Myriam; Laird, Brian; Douglas, Vasiliki; Van Pelt, Linda; Archie, Diane; Chan, Hing Man
2014-01-01
Background Current social and environmental changes in the Arctic challenge the health and well-being of its residents. Developing evidence-informed adaptive measures in response to these changes is a priority for communities, governments and researchers. Objectives To develop strategic planning to promote food security and food safety in the Inuvialuit Settlement Region (ISR), Northwest Territories (NWT), Canada. Design A qualitative study using group discussions during a workshop. Methods A regional workshop gathered Inuit organizations and community representatives, university-based researchers from the Inuit Health Survey (IHS) and NWT governmental organizations. Discussions were structured around the findings from the IHS. For each key area, programs and activities were identified and prioritized by group discussion and voting. Results The working group developed a vision for future research and intervention, which is to empower communities to promote health, well-being and environmental sustainability in the ISR. The group elaborated missions for the region that address the following issues: (a) capacity building within communities; (b) promotion of the use of traditional foods to address food security; (c) research to better understand the linkages between diseases and contaminants in traditional foods, market foods and lifestyle choices; (d) and promotion of affordable housing. Five programs to address each key area were developed as follows: harvest support and traditional food sharing; education and promotion; governance and policy; research; and housing. Concrete activities were identified to guide future research and intervention projects. Conclusions The results of the planning workshop provide a blueprint for future research and intervention projects. PMID:25147772
Andrada Hamer, Maria; Larsson, Per-Göran; Teleman, Pia; Etén-Bergqvist, Christina; Persson, Jan
2011-07-01
The aim of this prospective randomized multicenter study was to compare TVT (tension-free vaginal tape) with TVT-Secur in terms of efficacy and safety. We set out to enrol 280 stress incontinent women with a half time interim analysis of short-term cure and a continuous registration of adverse events. Of 133 randomized women, 126 were operated and 123 (TVT n = 62, TVT-Secur n = 61) available for 2 months follow-up. No significant differences were found between groups regarding demographics or grade of incontinence. At 2 months follow-up, subjective cure rate following TVT-Secur was significantly lower than for TVT (72% and 92%, respectively, p = 0.01). Three major complications occurred in the TVT-Secur group: tape erosion into the urethra, a tape inadvertently placed inside the bladder, and an immediate postoperative bleeding from the corona mortis. No major complications occurred in the TVT group. No significant differences were found between groups regarding perioperative bleeding, hospital stay, urge symptoms, or postoperative urinary tract infections. Median time for surgery was 13 and 22 min for TVT-Secur and TVT, respectively (p < 0.0001). In a prospective randomized controlled study, the TVT-Secur procedure had a significantly lower subjective cure rate than the retropubic TVT procedure. Due to this, in addition to three serious complications in the TVT-Secur group, we decided to stop further enrolment after the interim analysis. We discourage from further use of the TVT-Secur.
31 CFR 375.23 - How does the securities delivery process work?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...
31 CFR 375.23 - How does the securities delivery process work?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 31 Money and Finance: Treasury 2 2014-07-01 2014-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...
31 CFR 375.23 - How does the securities delivery process work?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...
31 CFR 375.23 - How does the securities delivery process work?
Code of Federal Regulations, 2013 CFR
2013-07-01
... 31 Money and Finance:Treasury 2 2013-07-01 2013-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... transfer the correct book-entry Treasury securities in the correct par amount against the correct...
IT Security Support for Spaceport Command and Control System
NASA Technical Reports Server (NTRS)
McLain, Jeffrey
2013-01-01
During the fall 2013 semester, I worked at the Kennedy Space Center as an IT Security Intern in support of the Spaceport Command and Control System under the guidance of the IT Security Lead Engineer. Some of my responsibilities included assisting with security plan documentation collection, system hardware and software inventory, and malicious code and malware scanning. Throughout the semester, I had the opportunity to work on a wide range of security related projects. However, there are three projects in particular that stand out. The first project I completed was updating a large interactive spreadsheet that details the SANS Institutes Top 20 Critical Security Controls. My task was to add in all of the new commercial of the shelf (COTS) software listed on the SANS website that can be used to meet their Top 20 controls. In total, there are 153 unique security tools listed by SANS that meet one or more of their 20 controls. My second project was the creation of a database that will allow my mentor to keep track of the work done by the contractors that report to him in a more efficient manner by recording events as they occur throughout the quarter. Lastly, I expanded upon a security assessment of the Linux machines being used on center that I began last semester. To do this, I used a vulnerability and configuration tool that scans hosts remotely through the network and presents the user with an abundance of information detailing each machines configuration. The experience I gained from working on each of these projects has been invaluable, and I look forward to returning in the spring semester to continue working with the IT Security team.
Cost Accounting in the Automated Manufacturing Environment
1988-06-01
1 NAVAL POSTGRADUATE SCHOOL M terey, California 0 DTIC II ELECTE R AD%$° NO 0,19880 -- THESIS COST ACCOUNTING IN THE AUTOMATED MANUFACTURING...PROJECT TASK WORK UNIT ELEMENT NO. NO NO ACCESSION NO 11. TITLE (Include Security Classification) E COST ACCOUNTING IN THE AUTOMATED MANUFACTURING...GROUP ’" Cost Accounting ; Product Costing ; Automated Manufacturing; CAD/CAM- CIM 19 ABSTRACT (Continue on reverse if necessary and identify by blo
Data Management Working Group report
NASA Technical Reports Server (NTRS)
Filardo, Edward J.; Smith, David B.
1986-01-01
The current flight qualification program lags technology insertion by 6 to 10 years. The objective is to develop an integrated software engineering and development environment assisted by an expert system technology. An operating system needs to be developed which is portable to the on-board computers of the year 2000. The use of ADA verses a High-Order Language; fault tolerance; fiber optics networks; communication protocols; and security are also examined and outlined.
The Helsinki Process: Negotiating Security and Cooperation in Europe
1993-12-01
cooperation advocated among the states. Recognizing "the growing role of international trade as one of the most important factors in economic growth and...in human rights would seriously unbalance the Helsinki Process. After the meeting, Soviet representative to the UN Commission on Human Rights Vladimir...note, stressing the growth of East-West trade and the number of bilateral agreements concluded with various countries. During some 20 working group
SSC San Diego Command History Calendar Year 2006
2007-03-01
Year: Dr. Visarath In, Yong Kho, Dr. Adi Bulsara, Dr. Joseph Neff, Dr. Brian Meadows, “Self-Induced Oscillations in Coupled Fluxgate Magnetometer : A... digital assistant. The USCG’s Underwater Port Security Working Group reviews ongoing efforts and provides direction to the USCG and the Department...provides the data link gateway as the JDN communications equipment that is used in MDSE to exchange Tactical Digital Information Link (TADIL) J, Satellite
Environmental security: a geographic information system analysis approach--the case of Kenya.
Bocchi, Stefano; Disperati, Stefano Peppino; Rossi, Simone
2006-02-01
Studies into the relationships between environmental factors and violence or conflicts constitute a very debated research field called environmental security. Several authors think that environmental scarcity, which is scarcity of renewable resources, can contribute to generate violence or social unrest, particularly within states scarcely endowed with technical know-how and social structures, such as developing countries. In this work, we referred to the theoretical model developed by the Environmental Change and Acute Conflict Project. Our goal was to use easily available spatial databases to map the various sources of environmental scarcity through geographic information systems, in order to locate the areas apparently most at risk of suffering negative social effects and their consequences in terms of internal security. The analysis was carried out at a subnational level and applied to the case of Kenya. A first phase of the work included a careful selection of databases relative to renewable resources. Spatial operations among these data allowed us to obtain new information on the availability of renewable resources (cropland, forests, water), on the present and foreseen demographic pressure, as well as on the social and technical ingenuity. The results made it possible to identify areas suffering from scarcity of one or more renewable resources, indicating different levels of gravity. Accounts from Kenya seem to confirm our results, reporting clashes between tribal groups over the access to scarce resources in areas that our work showed to be at high risk.
Carlos-Rivera, Fernando; Aguilar-Madrid, Guadalupe; Gómez-Montenegro, Pablo Anaya; Juárez-Pérez, Cuauhtémoc A; Sánchez-Román, Francisco Raúl; Durcudoy Montandon, Jaqueline E A; Borja-Aburto, Víctor Hugo
2009-03-01
Data on the economic consequences of occupational injuries is scarce in developing countries which prevents the recognition of their economic and social consequences. This study assess the direct heath care costs of work-related accidents in the Mexican Institute of Social Security, the largest health care institution in Latin America, which covered 12,735,856 workers and their families in 2005. We estimated the cost of treatment for 295,594 officially reported occupational injuries nation wide. A group of medical experts devised treatment algorithms to quantify resource utilization for occupational injuries to which unit costs were applied. Total costs were estimated as the product of the cost per illness and the severity weighted incidence of occupational accidents. Occupational injury rate was 2.9 per 100 workers. Average medical care cost per case was $2,059 USD. The total cost of the health care of officially recognized injured workers was $753,420,222 USD. If injury rate is corrected for underreporting, the cost for formal injured workers is 791,216,460. If the same costs are applied for informal workers, approximately half of the working population in Mexico, the cost of healthcare for occupational injuries is about 1% of the gross domestic product. Health care costs of occupational accidents are similar to the economic direct expenditures to compensate death and disability in the social security system in Mexico. However, indirect costs might be as important as direct costs.
Baker, Hallie E; Brown, Pamela Pitman
2015-01-01
The three-legged stool concept is widely used in gerontological and geriatric education as an explanation on how one should fiscally approach his or her retirement. Financial managers, planners, retirees, business owners, even the Social Security Administration uses this metaphor of fiscal soundness in retirement planning. Gerontologists are moving away from the "tripod of retirement income" and "three-legged stool" term, as more often market work is needed for financial security. This activity focuses on the tripod or three-legged stool concepts of retirement planning using active learning, allowing the students to work collaboratively in a group, reflect upon the activity, and most importantly have fun. The game also allows for an expansion of the tripod concepts into the four pillars of economic security, broaching the use of personal assets and the possible need for longer employment. Game scenarios also emphasize macro- and microlevel forces, such as race, gender, health status, education, or marital status, which can influence timing of retirement or the level of retirement income available. The authors include instructions on how to set up the learning experience including worksheets, as well as reflection questions posed throughout the process.
Policy revision in health enterprise information security: P3WG final report
NASA Astrophysics Data System (ADS)
Sostrom, Kristen; Collmann, Jeff R.
2003-05-01
Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center (TATRC), TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG) examined military policies and regulations relating to computer-based information systems and medical records management. Using an interdisciplinary and interservice QA approach they compared existing military policies with the Health Insurance Portability and Accountability Act (HIPAA) Security Rule to identify gaps and discrepancies. The final report, including a plain English explanation of the individual standards and relevance to the Department of Defense (DoD), a comparative analysis and recommendations, will feed in to the security management process and HIPAA implementation efforts at multiple levels within the DoD. In light of High Reliability Theory, this process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains, building consensus on key policy reforms among military stakeholders across different disciplines, levels of command hierarchy and services.
Integrated Work Management: Overview, Course 31881
DOE Office of Scientific and Technical Information (OSTI.GOV)
Simpson, Lewis Edward
Integrated work management (IWM) is the process used for formally implementing the five-step process associated with integrated safety management (ISM) and integrated safeguards and security management (ISSM) at Los Alamos National Laboratory (LANL). IWM also directly supports the LANL Environmental Management System (EMS). IWM helps all workers and managers perform work safely and securely and in a manner that protects people, the environment, property, and the security of the nation. The IWM process applies to all work activities at LANL, from working in the office to designing experiments to assembling and detonating explosives. The primary LANL document that establishes andmore » describes IWM requirements is Procedure (P) 300, Integrated Work Management.« less
A comparison of offenders with intellectual disability across three levels of security.
Hogue, Todd; Steptoe, Lesley; Taylor, John L; Lindsay, William R; Mooney, Paul; Pinkney, Lisa; Johnston, Susan; Smith, Anne H W; O'Brien, Gregory
2006-01-01
A number of authors have described, with disparate results, the prevalence of people with intellectual disability and their characteristics, in a range of offender cohorts defined by service use. These have included high security, a range of criminal justice services and community services. There is a need for research comparing cohorts of offenders with intellectual disabilities across different settings. AIM AND HYPOTHESIS: To conduct such a comparison and test the hypothesis that severity of characteristics measured will be highest in highest levels of residential security. A clinical-record-based comparison a offenders with intellectual disability in high security (n = 73), medium/low security (n = 70), and a community service (n = 69). Groups were similar in age and tested IQ levels. Early psychiatric service contact had been more likely in the lower security groups. In line with the hypothesis, more complex presentations, in particular comorbid personality disorder, was more likely in the highest security group. Both fatal and non-fatal interpersonal violence convictions were significantly related to group, with more in the high security group sustaining a conviction both at the index offence and prior to that. Over 50% of all groups had at least one conviction for a sexual offence. A regression model accounting for 78% of the variance was made up largely of disposal variables (Mental Health Act status and probation) and indications of antisocial traits (criminal damage, lifetime conviction for murder and ICD-10 personality disorder classification). The authors show that context of sampling affects most relationships between intellectual disability (ID) and offending when the methods for measuring ID are held constant. The results also present several questions on the relationship between risk, services available in an area and referral to higher security.
Household Food Security in Isfahan Based on Current Population Survey Adapted Questionnaire
Rafiei, Morteza; Rastegari, Hosein Ali; Ghiasi, Mojdeh; Shahsanaie, Vahid
2013-01-01
Background: Food security is a state in which all people at every time have physical and economic access to adequate food to obviate nutritional needs and live a healthy and active life. Therefore, this study was performed to quantitatively evaluate the household food security in Esfahan using the localized version of US Household Food Security Survey Module (US HFSSM). Methods: This descriptive cross-sectional study was performed in year 2006 on 3000 households of Esfahan. The study instrument used in this work is 18-item US food security module, which is developed into a localized 15-item questionnaire. This study is performed in two stages of families with no children (under 18 years old) and families with children over 18 years old. Results: The results showed that item severity coefficient, ratio of responses given by households and item infit and outfit coefficient in adult's and children's questionnaire respectively. According to obtained data, scale score of +3 in adults group is described as determination limit of slight food insecurity and +6 is stated as the limit for severe food insecurity. For children's group, scale score of +2 is defined to be the limit of slight food insecurity and +5 is the determination limit of severe food insecurity. Conclusions: The main hypothesis of this survey analysis is based on the raw scale score of USFSSM The item of “lack of enough money for buying food” (item 2) and the item of “lack of balanced meal” (3rd item) have the lowest severity coefficient. Then, the ascending rate of item severity continues in first item, 4th item and keeps increasing into 10th item. PMID:24498498
Homeland security in the USA: past, present, and future.
Kemp, Roger L
2012-01-01
This paper examines the evolving and dynamic field of homeland security in the USA. Included in this analysis is the evolution of the creation of the Department of Homeland Security, an overview of the National Warning System, a summary of citizen support groups, and how the field of homeland security has had an impact on the location and architecture of public buildings and facilities. Also included are website directories of citizen support groups and federal agencies related to the field of homeland security.
Williams, Timothy P; Binagwaho, Agnes; Betancourt, Theresa S
2012-04-01
To illuminate the different manifestations of transactional sexual exploitation and abuse among Rwanda's children in order to inform effective responses by policies, programs, and communities. Qualitative data was collected during April and May 2010. One-hundred and thirty-nine adults (56% female) and 52 children (60% female) participated in focus groups across three geographic locations in Rwanda. Eleven interviews were held with child protection stakeholders. Interview and focus group participants reported how children, primarily girls, engaged in transactional sex as a survival strategy in response to situations of adversity including economic deprivation, difficulty accessing school, and social pressure. Policy and programs should work to address the underlying social and economic determinants of transactional sexual exploitation through structural interventions that reduce gender inequalities to accessing school and securing basic needs. Further quantitative and qualitative research to better understand the complexities of this issue is warranted. Copyright © 2012 Elsevier Ltd. All rights reserved.
Nissen, Alexander; Heir, Trond
2016-12-01
We aimed to explore how perceived safety after terrorism is connected to views on security measures and emergency preparedness in a workplace setting. Using a questionnaire-based, cross-sectional study of ministerial employees in Norway who were targeted in a terrorist attack in 2011 (n=3344), we investigated how employees' perceived safety at work 9 to 10 months after the attack was associated with their perceptions of whether security measures were sufficiently prioritized at work, whether there had been sufficient escape and evacuation training, and whether they were confident with evacuation procedures. We found strong evidence of increasing perceived safety at work the more employees believed security measures were sufficiently prioritized at work (partially confounded by post-traumatic stress disorder), and the better their knowledge of evacuation procedures (modified by gender and education). The present study suggests that employers may enhance perceived safety at work for terror-exposed employees by showing a commitment to security measures and by ensuring employees know evacuation procedures well. More research is needed to investigate causality patterns behind the associations found in this cross-sectional study. (Disaster Med Public Health Preparedness. 2016;10:805-811).
Integrating security in a group oriented distributed system
NASA Technical Reports Server (NTRS)
Reiter, Michael; Birman, Kenneth; Gong, LI
1992-01-01
A distributed security architecture is proposed for incorporation into group oriented distributed systems, and in particular, into the Isis distributed programming toolkit. The primary goal of the architecture is to make common group oriented abstractions robust in hostile settings, in order to facilitate the construction of high performance distributed applications that can tolerate both component failures and malicious attacks. These abstractions include process groups and causal group multicast. Moreover, a delegation and access control scheme is proposed for use in group oriented systems. The focus is the security architecture; particular cryptosystems and key exchange protocols are not emphasized.
Code of Federal Regulations, 2010 CFR
2010-04-01
... another identity (this would include working under another social security number or a forged social... 404.471 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY... disability benefits under title II of the Social Security Act are not payable for months in which you...
NASA Astrophysics Data System (ADS)
Giltz, S.; Trtanj, J.; Jones, H.
2017-12-01
The One Health concept recognizes that the health of humans is inextricably linked with the health of animals and the environment. With a growing world population, changing climate, and increased global travel One Health approaches are increasingly useful. The National Oceanic and Atmospheric Administration (NOAA) provides key stakeholders in the public health sector with the environmental intelligence they need to mitigate emerging health threats. The NOAA One Health Working Group's mission is to integrate and coordinate the network of observing systems and in situ sensors, detection and diagnostic capacity, research and modeling efforts, and sustained engagement with health partners to deliver useful information to public health and resource management communities. The NOAA One Health group divides its broad focus into themes: thermal extremes, water-borne disease, seafood security, Arctic, wildlife and zoonotic disease, vector-borne disease, and air quality (including wildfire). The group connects the work being done throughout NOAA to coordinate One Health related efforts, increase information sharing, promote interdisciplinary approaches, and work towards better disease prevention. We are working to enhance NOAA Science and services to deliver useful information on current and emerging health risks and benefits to health decision makers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Sheldon, Frederick T.
Cyber physical computing infrastructures typically consist of a number of sites are interconnected. Its operation critically depends both on cyber components and physical components. Both types of components are subject to attacks of different kinds and frequencies, which must be accounted for the initial provisioning and subsequent operation of the infrastructure via information security analysis. Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, andmore » information assets. We concentrated our analysis on the electric sector failure scenarios and impact analyses by the NESCOR Working Group Study, From the Section 5 electric sector representative failure scenarios; we extracted the four generic failure scenarios and grouped them into three specific threat categories (confidentiality, integrity, and availability) to the system. These specific failure scenarios serve as a demonstration of our simulation. The analysis using our ABGT simulation demonstrates how to model the electric sector functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the cyber physical infrastructure network with respect to CIA.« less
Mahmoudi, Ghahraman; Rostami, Fahimeh Hoseinian; Mahmoudjanloo, Shaharbanoo; Jahani, Mohammad Ali
2017-01-01
Introduction: Motivational deficiencies and the low quality of working life significantly reduce employees’ work performance and consequently their efficacy (effectiveness and proper performance in doing a task or specific tasks). Aim: The aim of this study was to determine the relationship between achievement motivation and quality of working life with self-efficacy among staff working in Mazandaran hospitals, by taking organizational ownership as a mediator variable. Materials and Methods: This study was an applied descriptive-correlation. Research population consisted of all staff working in selected hospitals of Mazandaran Province, Iran. 341 employees were selected with randomly-stratified sampling as the statistical sample. Three valid questionnaires were used for data collection. Data were analysis based on structured equations and path analysis with SPSS19 and AMOS. Results: In private hospitals, there was a significant relationship between the quality of working life and self-efficacy (p<0.001). In relationship between achievement motivation and self-efficacy, there was no significant differences between university hospitals and social security hospitals, but relationship between the quality of working life and self-efficacy was significant (p <0. 05). Considering achievement motivation and self-efficacy in private hospitals and university hospitals, a significant differences was observed (p<0. 05). Conclusion: The hospital ownership has a moderating in relationship of achievement motivation and quality of working life with self-efficacy. Staff’s empowerment courses for university hospitals and improvement in the overall space of job, increase in job security, reducing salary differences is suggested for private hospitals. PMID:29284991
Mahmoudi, Ghahraman; Rostami, Fahimeh Hoseinian; Mahmoudjanloo, Shaharbanoo; Jahani, Mohammad Ali
2017-12-01
Motivational deficiencies and the low quality of working life significantly reduce employees' work performance and consequently their efficacy (effectiveness and proper performance in doing a task or specific tasks). The aim of this study was to determine the relationship between achievement motivation and quality of working life with self-efficacy among staff working in Mazandaran hospitals, by taking organizational ownership as a mediator variable. This study was an applied descriptive-correlation. Research population consisted of all staff working in selected hospitals of Mazandaran Province, Iran. 341 employees were selected with randomly-stratified sampling as the statistical sample. Three valid questionnaires were used for data collection. Data were analysis based on structured equations and path analysis with SPSS19 and AMOS. In private hospitals, there was a significant relationship between the quality of working life and self-efficacy (p<0.001). In relationship between achievement motivation and self-efficacy, there was no significant differences between university hospitals and social security hospitals, but relationship between the quality of working life and self-efficacy was significant (p <0. 05). Considering achievement motivation and self-efficacy in private hospitals and university hospitals, a significant differences was observed (p<0. 05). The hospital ownership has a moderating in relationship of achievement motivation and quality of working life with self-efficacy. Staff's empowerment courses for university hospitals and improvement in the overall space of job, increase in job security, reducing salary differences is suggested for private hospitals.
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF-SUFFICIENCY PROGRAM Introduction § 411... Security Act which establishes the Ticket to Work and Self-Sufficiency Program (hereafter referred to as... provisions relating to employment networks in the Ticket to Work program. (f) Subpart F contains provisions...
Between security and military identities: The case of Israeli security experts.
Grassiani, Erella
2018-02-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism.
Between security and military identities: The case of Israeli security experts
Grassiani, Erella
2018-01-01
The relationship between private security professionals and the military in Israel is complex. While there is growing attention to the fact that security and military actors and their activities are becoming increasingly blurred, the Israeli case shows something different. In this ground-up analysis of the relationship between private security practices and the military, I investigate its constant negotiation by private security professionals through their identification with and differentiation from the military, whereby they reconfigure the meaning of military capital. This identity work should be understood, I propose, within the strongly militarist context of Israeli society, where military capital is highly valued. I argue that actors who exit the military system feel the need to demonstrate the added value of their work in the private sector in order for it to gain value in the light of the symbolic capital given to the military. I analyse these processes as leading to a new kind of militarism, which includes security skills and ideas about professionalism. Such an approach sheds new light on the ways in which security actors can actively reconfigure the workings of military capital in and outside the nation-state and produce a different kind of militarism. PMID:29416228
Lin, Tsung-Hung; Tsung, Chen-Kun; Lee, Tian-Fu; Wang, Zeng-Bo
2017-12-03
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie-Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
2004-11-01
the context of, e.g., a smart home (Section 7). Our implementation is detailed in Section 8, with a security analysis is Section 9. Section 10...establishment of security parame- ters [17]. This work considers a smart home , where a user may want to establish a security context for controlling...appliances or other devices in a smart - home . We refer to the security property discussed in this work as presence, where it is desirable that only users or
Looking back, looking forward: Recovery journeys in a high secure hospital.
McKeown, Mick; Jones, Fiona; Foy, Paul; Wright, Karen; Paxton, Tracey; Blackmon, Mike
2016-06-01
A qualitative study of staff and service users' views of recovery was undertaken in a UK high secure hospital working to implement recovery practices. 30 staff and 25 service users participated in semi-structured interviews or focus groups. Thematic analysis identified four broad accounts of how recovery was made sense of in the high secure environment: the importance of meaningful occupation; valuing relationships; recovery journeys and dialogue with the past; and recovery as personal responsibility. These themes are discussed with an emphasis on service user strategies of cooperation or resistance, respectively advancing or impeding progress through the system. In this context the notion of cooperation is, for many, commensurate with compliance with a dominant medical model. The policy framing of recovery opens up contemplation of treatment alternatives, more participatory approaches to risk management, and emphasise the value of relational skills, but may not elude the overarching bio-psychiatric episteme. © 2016 Australian College of Mental Health Nurses Inc.
Falcão-Reis, Filipa; Correia, Manuel E
2010-01-01
With the advent of more sophisticated and comprehensive healthcare information systems, system builders are becoming more interested in patient interaction and what he can do to help to improve his own health care. Information systems play nowadays a crucial and fundamental role in hospital work-flows, thus providing great opportunities to introduce and improve upon "patient empowerment" processes for the personalization and management of Electronic Health Records (EHRs). In this paper, we present a patient's privacy generic control mechanisms scenarios based on the Extended OpenID (eOID), a user centric digital identity provider previously developed by our group, which leverages a secured OpenID 2.0 infrastructure with the recently released Portuguese Citizen Card (CC) for secure authentication in a distributed health information environment. eOID also takes advantage of Oauth assertion based mechanisms to implement patient controlled secure qualified role based access to his EHR, by third parties.
Security Analysis of Selected AMI Failure Scenarios Using Agent Based Game Theoretic Simulation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abercrombie, Robert K; Schlicher, Bob G; Sheldon, Frederick T
Information security analysis can be performed using game theory implemented in dynamic Agent Based Game Theoretic (ABGT) simulations. Such simulations can be verified with the results from game theory analysis and further used to explore larger scale, real world scenarios involving multiple attackers, defenders, and information assets. We concentrated our analysis on the Advanced Metering Infrastructure (AMI) functional domain which the National Electric Sector Cyber security Organization Resource (NESCOR) working group has currently documented 29 failure scenarios. The strategy for the game was developed by analyzing five electric sector representative failure scenarios contained in the AMI functional domain. From thesemore » five selected scenarios, we characterize them into three specific threat categories affecting confidentiality, integrity and availability (CIA). The analysis using our ABGT simulation demonstrates how to model the AMI functional domain using a set of rationalized game theoretic rules decomposed from the failure scenarios in terms of how those scenarios might impact the AMI network with respect to CIA.« less
A survey of visualization systems for network security.
Shiravi, Hadi; Shiravi, Ali; Ghorbani, Ali A
2012-08-01
Security Visualization is a very young term. It expresses the idea that common visualization techniques have been designed for use cases that are not supportive of security-related data, demanding novel techniques fine tuned for the purpose of thorough analysis. Significant amount of work has been published in this area, but little work has been done to study this emerging visualization discipline. We offer a comprehensive review of network security visualization and provide a taxonomy in the form of five use-case classes encompassing nearly all recent works in this area. We outline the incorporated visualization techniques and data sources and provide an informative table to display our findings. From the analysis of these systems, we examine issues and concerns regarding network security visualization and provide guidelines and directions for future researchers and visual system developers.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Doyle, C.; Truitt, A.; Inda, D.
The following Photovoltaics Installation Best Practices Guide is one of several work products developed by the Solar Access to Public Capital (SAPC) working group, which works to open capital market investment. SAPC membership includes over 450 leading solar developers, financiers and capital managers, law firms, rating agencies, accounting and engineering firms, and other stakeholders engaged in solar asset deployment. SAPC activities are directed toward foundational elements necessary to pool project cash flows into tradable securities: standardization of power purchase and lease contracts for residential and commercial end customers; development of performance and credit data sets to facilitate investor due diligencemore » activities; comprehension of risk perceived by rating agencies; and the development of best practice guides for PV system installation and operations and maintenance (O&M) in order to encourage high-quality system deployment and operation that may improve lifetime project performance and energy production. This PV Installation Best Practices Guide was developed through the SAPC Installation Best Practices subcommittee, a subgroup of SAPC comprised of a wide array of solar industry leaders in numerous fields of practice. The guide was developed over roughly one year and eight months of direct engagement by the subcommittee and two working group comment periods.« less
2003-07-24
KENNEDY SPACE CENTER, FLA. - Children enjoy displays of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.
Gulacti, Umut; Lok, Ugur
2017-07-19
Consultation, the process of an Emergency Physician seeking an opinion from other specialties, occurs frequently in the Emergency Department (ED). The aim of this study was to determine the effect of secure messaging application (WhatsApp) usage for medical consultations on Emergency Department Length of Stay (ED LOS) and consult time. We conducted a prospective, randomized controlled trial in the ED using allocation concealment over three months. Consultations requested in the ED were allocated into two groups: consultations requested via the secure messaging application and consultations requested by telephone as verbal. A total of 439 consultations requested in the ED were assessed for eligibility and 345 were included in the final analysis: 173 consultations were conducted using secure messaging application and 172 consultations were conducted using standard telephone communications. The median ED LOS was 240 minutes (IQR:230-270, 95% CI:240 to 255.2) for patients in the secure messaging application group and 277 minutes (IQR:270-287.8, 95% CI:277 to 279) for patients in the telephone group. The median total ED LOS was significantly lower among consults conducted using Secure messaging application relative to consults conducted by telephone (median dif: -30, 95%CI:-37to-25, p<0.0001). The median consult time was 158 minutes (IQR:133 to 177.25, 95% CI:150 to 169) for patients in the Secure messaging application group and 170 minutes (IQR:165 to 188.5, 95% CI:170-171) for patients in the Telephone group (median dif: -12, 95%CI:-19 to-7,p<0.0001). Consultations completed without ED arrival was 61.8% in the secure messaging group and 33.1% in the Telephone group (dif: 28.7, 95% CI:48.3 to 66, p<0.001). Use of secure messaging application for consultations in the ED reduces the total ED LOS and consultation time. Consultation with secure messaging application eliminated more than half of in-person ED consultation visits.
Fernando, Juanita
2010-01-01
This case study of 9 information technology (IT) support staff in 3 Australian (Victoria) public hospitals juxtaposes their experiences at the user-level of eHealth security in the Natural Hospital Environment with that previously reported by 26 medical, nursing and allied healthcare clinicians. IT support responsibilities comprised the entire hospital, of which clinician eHealth security needs were only part. IT staff believed their support tasks were often fragmented while work responsibilities were hampered by resources shortages. They perceived clinicians as an ongoing security risk to private health information. By comparison clinicians believed IT staff would not adequately support the private and secure application of eHealth for patient care. Preliminary data analysis suggests the tension between these cohorts manifests as an eHealth environment where silos of clinical work are disconnected from silos of IT support work. The discipline-based silos hamper health privacy outcomes. Privacy and security policies, especially those influencing the audit process, will benefit by further research of this phenomenon.
C, Francisca Pérez; Moessner, Markus; A, María Pía Santelices
2017-03-01
This study examines the relationship between triadic family interactions and preschoolers' attachment representations, or internal working models (IWMs), from a qualitative and dimensional perspective. Individual, relational, and sociocultural variables were evaluated using two different samples. The results showed that triadic family interactions were linked to preschoolers' attachment security levels in both groups, indicating the reliability of the proposed model. © 2017 Michigan Association for Infant Mental Health.
Deterrence of Nuclear Terrorism via Post-Detonation Attribution: Is the United States on Target?
2009-12-01
Dr. Vahid Majidi , then Assistant FBI Director for the Weapons of Mass Destruction Directorate, the FBI Laboratory Division is “central” to...www.fbi.gov/hq/nsb/wmd/wmd_home.htm. 236 Joint Working Group, Nuclear Forensics: Role, State of the Art, and Program Needs, 36. 237 Vahid Majidi ...accessed November 7, 2009). Majidi , Vahid. Written Testimony before the U.S. House of Representatives Homeland Security Committee, Subcommittee on
National Test Bed Security and Communications Architecture Working Group Report
1992-04-01
computer systems via a physical medium. Most of those physical media are tappable or interceptable. This means that all the data that flows across the...provides the capability for NTBN nodes to support users operating in differing COIs to share the computing resources and communication media and for...representation. Again generally speaking, the NTBN must act as the high-speed, wide-bandwidth communications media that would provide the "near real-time
Improving Mobile Infrastructure for Pervasive Personal Computing
2007-11-01
fulfillment of the requirements for the degree of Master of Science. Copyright c© 2007 Ajay Surie This research was supported by the National Science Foundation...NSF) under grant number CNS-0509004 and by the Army Research Office (ARO) through grant number DAAD19-02-1-0389 (“Perpetually Available and Secure...efforts my final project could not have been successful. Working with the members of my research group, Niraj Tolia, Benjamin Gilbert, Jan Harkes, Adam
Vecchione, Michele; Caprara, Gianvittorio; Schoen, Harald; Castro, Josè Luis Gonzàlez; Schwartz, Shalom H
2012-08-01
Using data from Italy, Spain, and Germany (N= 1,569), this study investigated the role of basic values (universalism and security) and basic traits (openness and agreeableness) in predicting perceptions of the consequences of immigration. In line with Schwartz's (1992) theory, we conceptualized security as having two distinct components, one concerned with safety of the self (personal security) and the other with harmony and stability of larger groups and of society (group security). Structural equation modelling revealed that universalism values underlie perceptions that immigration has positive consequences and group security values underlie perceptions that it has negative consequences. Personal security makes no unique, additional contribution. Multi-group analyses revealed that these associations are invariant across the three countries except for a stronger link between universalism and perceptions of the consequences of immigration in Spain. To examine whether values mediate relations of traits to perceptions of immigration, we used the five-factor model. Findings supported a full mediation model. Individuals' traits of openness and agreeableness explained significant variance in security and universalism values. Basic values, in turn, explained perceptions of the consequences of immigration. ©2011 The British Psychological Society.
NASA Astrophysics Data System (ADS)
Frühwirth, Christian
Industry managers have long recognized the vital importance of information security for their businesses, but at the same time they perceived security as a technology-driven rather then a business-driven field. Today, this notion is changing and security management is shifting from technology- to business-oriented approaches. Whereas there is evidence of this shift in the literature, this paper argues that security standards and academic work have not yet taken it fully into account. We examine whether this disconnect has lead to a misalignment of IT security requirements in businesses versus industry standards and academic research. We conducted 13 interviews with practitioners from 9 different firms to investigate this question. The results present evidence for a significant gap between security requirements in industry standards and actually reported security vulnerabilities. We further find mismatches between the prioritization of security factors in businesses, standards and real-world threats. We conclude that security in companies serves the business need of protecting information availability to keep the business running at all times.
2015-07-09
Page ii GAO-15-700 Diplomatic Security Figure 2: Time Frames for Updates to Overseas Security Policy Board Residential Security...Standards since 2005 14 Abbreviations ARB Accountability Review Board DS Bureau of Diplomatic Security DS/C DS Directorate...Overseas Buildings Operations OSPB Overseas Security Policy Board RSO Regional Security Officer State Department of State This is a work of
Identifying the Key Weaknesses in Network Security at Colleges.
ERIC Educational Resources Information Center
Olsen, Florence
2000-01-01
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Trumbell, Jill M; Hibel, Leah C; Mercado, Evelyn; Posada, Germán
2018-06-21
The current study examines associations between marital conflict and negative parenting behaviors among fathers and mothers, and the extent to which internal working models (IWMs) of attachment relationships may serve as sources of risk or resilience during family interactions. The sample consisted of 115 families (mothers, fathers, and their 6-month-old infants) who participated in a controlled experiment. Couples were randomly assigned to engage in either a conflict or positive marital discussion, followed by parent-infant freeplay sessions and assessment of parental IWMs of attachment (i.e., secure base script knowledge). While no differences in parenting behaviors emerged between the conflict and positive groups, findings revealed that couple withdrawal during the marital discussion was related to more intrusive and emotionally disengaged parenting for mothers and fathers. Interestingly, secure base script knowledge was inversely related to intrusion and emotional disengagement for fathers, but not for mothers. Furthermore, only among fathers did secure base script knowledge serve to significantly buffer the impact of marital disengagement on negative parenting (emotional disengagement). Findings are discussed using a family systems framework and expand our understanding of families, and family members, at risk. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
NASA Astrophysics Data System (ADS)
Morgan, John S.
2005-05-01
Law enforcement agencies play a key role in protecting the nation from and responding to terrorist attacks. Preventing terrorism and promoting the nation"s security is the Department of Justice"s number one strategic priority. This is reflected in its technology development efforts, as well as its operational focus. The National Institute of Justice (NIJ) is the national focal point for the research, development, test and evaluation of technology for law enforcement. In addition to its responsibilities in supporting day-to-day criminal justice needs in areas such as less lethal weapons and forensic science, NIJ also provides critical support for counter-terrorism capacity improvements in state and local law enforcement in several areas. The most important of these areas are bomb response, concealed weapons detection, communications and information technology, which together offer the greatest potential benefit with respect to improving the ability to law enforcement agencies to respond to all types of crime including terrorist acts. NIJ coordinates its activities with several other key federal partners, including the Department of Homeland Security"s Science and Technology Directorate, the Technical Support Working Group, and the Department of Defense.
20 CFR 416.973 - General information about work activity.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false General information about work activity. 416.973 Section 416.973 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME... conditions that take into account your impairment, such as work done in a sheltered workshop or as a patient...
The Psychology of Working Theory.
Duffy, Ryan D; Blustein, David L; Diemer, Matthew A; Autin, Kelsey L
2016-03-01
In the current article, we build on research from vocational psychology, multicultural psychology, intersectionality, and the sociology of work to construct an empirically testable Psychology of Working Theory (PWT). Our central aim is to explain the work experiences of all individuals, but particularly people near or in poverty, people who face discrimination and marginalization in their lives, and people facing challenging work-based transitions for which contextual factors are often the primary drivers of the ability to secure decent work. The concept of decent work is defined and positioned as the central variable within the theory. A series of propositions is offered concerning (a) contextual predictors of securing decent work, (b) psychological and economic mediators and moderators of these relations, and (c) outcomes of securing decent work. Recommendations are suggested for researchers seeking to use the theory and practical implications are offered concerning counseling, advocacy, and public policy. (c) 2016 APA, all rights reserved).
Hemrich, Günter
2005-06-01
This case study reviews the experience of the Somalia Food Security Assessment Unit (FSAU) of operating a food security information system in the context of a complex emergency. In particular, it explores the linkages between selected features of the protracted crisis environment in Somalia and conceptual and operational aspects of food security information work. The paper specifically examines the implications of context characteristics for the establishment and operations of the FSAU field monitoring component and for the interface with information users and their diverse information needs. It also analyses the scope for linking food security and nutrition analysis and looks at the role of conflict and gender analysis in food security assessment work. Background data on the food security situation in Somalia and an overview of some key features of the FSAU set the scene for the case study. The paper is targeted at those involved in designing, operating and funding food security information activities.
Simple group password-based authenticated key agreements for the integrated EPR information system.
Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng
2013-04-01
The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.
Standardization of quantum technologies and QKD activities within ETSI (Conference Presentation)
NASA Astrophysics Data System (ADS)
Lenhart, Gaby
2016-04-01
In order to establish new ICT technologies successfully on the market it is essential to build trust within any potential users. This is especially true for technologies which are based upon paradigms that are not yet familiar to these users, such as quantum technologies. Technical standards are an excellent means to offer a certain degree of legal reliability and technical interoperability that is required by industry for commercial take up. While such standards on the one hand must be clear enough to provide strict rules for implementers, on the other hand they also must remain flexible enough to not restrict progress in further research and development on the standardized technology. Hence such standards have to be produced by a wide variety of stakeholders taking into account all their different needs. The paper will provide some insight into the general mechanisms of standardization and their relation to quantum technologies. Alongside with the relevance of standardization as an enabler for certification of quantum based technologies it will explain its potential for securing intellectual property. In its first part paper will concentrate on the advantages of standardization and discuss fears some of the stakeholders share, in detail. The second part will focus on the technical work going on in ETSI in relation to quantum technologies. In 2008 ETSI created a standards work group on Quantum Key Distribution, the ETSI ISG QKD and more recently a group on Quantum-Safe Cryptography, the ETSI ISG QSC. A significant part of the technical work of these groups has already been published and will be introduced in the following. However a big share of work is still ongoing and lot more is planned for the future, as are continuous revisions and updates of the published specifications. This standardization work covers several levels: It starts of by problem statements in the form of use cases, from which technical requirements can be derived. These requirements then form the base upon which a reference architecture is created. Various different specifications describe in detail components, protocols and interfaces. An ontology is developed in order to guarantee common understanding of the technical terms used in standardization for quantum technologies. Special emphasis is provided to security proofs.
Alsaker, Kjersti; Moen, Bente E; Baste, Valborg; Morken, Tone
A qualitative study was conducted among 18 abused women from different parts of Norway to explore what paid work means for women exposed to partner violence and how living with an abusive partner affected their working life. Based on systematic text condensation analyses of their experiences as described in individual and focus group interviews, the study's findings reveal two major themes. The first is about recovery and survival, and the other about the spillover of problems caused by a violent partner into paid work. Work was important to the women, as it represented time off from violence, contact with others who cared for them, and maintenance of self-esteem and self-confidence. Having their own money provided security and strengthened the belief that they could manage on their own. The spillover of intimate partner violence problems appeared through feelings of fear, shame and guilt at work.
The Third Annual NASA Science Internet User Working Group Conference
NASA Technical Reports Server (NTRS)
Lev, Brian S. (Editor); Gary, J. Patrick (Editor)
1993-01-01
The NASA Science Internet (NSI) User Support Office (USO) sponsored the Third Annual NSI User Working Group (NSIUWG) Conference March 30 through April 3, 1992, in Greenbelt, MD. Approximately 130 NSI users attended to learn more about the NSI, hear from projects which use NSI, and receive updates about new networking technologies and services. This report contains material relevant to the conference; copies of the agenda, meeting summaries, presentations, and descriptions of exhibitors. Plenary sessions featured a variety of speakers, including NSI project management, scientists, and NSI user project managers whose projects and applications effectively use NSI, and notable citizens of the larger Internet community. The conference also included exhibits of advanced networking applications; tutorials on internetworking, computer security, and networking technologies; and user subgroup meetings on the future direction of the conference, networking, and user services and applications.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading June 5, 2012. It appears to the Securities and Exchange... concerning the securities of Gammacan International, Inc. because it has not filed any periodic reports since...
2003-07-24
KENNEDY SPACE CENTER, FLA. - Children enjoy a hands-on display of security equipment during Take Our Children to Work Day. Employees were invited to share their work experience with their children on this annual event.
ERIC Educational Resources Information Center
Weathers, Robert R., II; Hemmeter, Jeffrey
2011-01-01
SSDI beneficiaries lose their entire cash benefit if they perform work that is substantial gainful activity (SGA) after using Social Security work incentive programs. The complete loss of benefits might be a work disincentive for beneficiaries. We report results from a pilot project that replaces the complete loss of benefits with a gradual…
Lee, Tian-Fu; Wang, Zeng-Bo
2017-01-01
The security is a critical issue for business purposes. For example, the cloud meeting must consider strong security to maintain the communication privacy. Considering the scenario with cloud meeting, we apply extended chaotic map to present passwordless group authentication key agreement, termed as Passwordless Group Authentication Key Agreement (PL-GAKA). PL-GAKA improves the computation efficiency for the simple group password-based authenticated key agreement (SGPAKE) proposed by Lee et al. in terms of computing the session key. Since the extended chaotic map has equivalent security level to the Diffie–Hellman key exchange scheme applied by SGPAKE, the security of PL-GAKA is not sacrificed when improving the computation efficiency. Moreover, PL-GAKA is a passwordless scheme, so the password maintenance is not necessary. Short-term authentication is considered, hence the communication security is stronger than other protocols by dynamically generating session key in each cloud meeting. In our analysis, we first prove that each meeting member can get the correct information during the meeting. We analyze common security issues for the proposed PL-GAKA in terms of session key security, mutual authentication, perfect forward security, and data integrity. Moreover, we also demonstrate that communicating in PL-GAKA is secure when suffering replay attacks, impersonation attacks, privileged insider attacks, and stolen-verifier attacks. Eventually, an overall comparison is given to show the performance between PL-GAKA, SGPAKE and related solutions. PMID:29207509
The Operational Manager - Enemy or Hero of Secure Business Practice?
NASA Astrophysics Data System (ADS)
Goucher, Wendy
This paper will investigate the role of the non-IT manager in information security. He can, for example, be the reason why sensitive work is carried out on the move and security focused spending is given a low priority in the budget. Alternatively, he can also be the driving force behind empowering the team to have a dynamic attitude to protecting data both at work and at home. Now is the time for managers to stop pushing information security issues away from their desk and into the in-tray of the IT department.
1987-03-01
information and work in a completely secure environment. Information used with today’s C3I systems must be protected. To better understand the role of...and security was of minor concern. The user either worked on his own behalf or as a programmer for someone else. The computer power was limited. With...Although the modules may be of the same classification level, the manager may want to limit each team’s access to the module on which they are working
Employment of individuals in the Social Security disability programs.
O'Leary, Paul; Livermore, Gina A; Stapleton, David C
2011-01-01
The articles in this special issue present findings from research on the employment and work-related activities of individuals receiving benefits through the Social Security Disability Insurance and Supplemental Security Income programs, and on the factors that hinder their efforts to work at levels that lead to exiting the disability rolls. This article introduces the other articles, highlights their important findings, and discusses the implications for ongoing efforts to increase the earnings and self-sufficiency of these beneficiaries, such as the Ticket to Work program and the Benefit Offset National Demonstration.
2014-01-01
Background Long-term sick leave has considerably negative impact on the individual and society. Hence, the need to identify effective occupational rehabilitation programs is pressing. In Norway, group based occupational rehabilitation programs merging patients with different diagnoses have existed for many years, but no rigorous evaluation has been performed. The described randomized controlled trial aims primarily to compare two structured multicomponent inpatient rehabilitation programs, differing in length and content, with a comparative cognitive intervention. Secondarily the two inpatient programs will be compared with each other, and with a usual care reference group. Methods/design The study is designed as a randomized controlled trial with parallel groups. The Social Security Office performs monthly extractions of sick listed individuals aged 18–60 years, on sick leave 2–12 months, with sick leave status 50% - 100% due to musculoskeletal, mental or unspecific disorders. Sick-listed persons are randomized twice: 1) to receive one of two invitations to participate in the study or not receive an invitation, where the latter “untouched” control group will be monitored for future sick leave in the National Social Security Register, and 2) after inclusion, to a Long or Short inpatient multicomponent rehabilitation program (depending on which invitation was sent) or an outpatient cognitive behavioral therapy group comparative program. The Long program consists of 3 ½ weeks with full rehabilitation days. The Short program consists of 4 + 4 full days, separated by two weeks, in which a workplace visit will be performed if desirable. Three areas of rehabilitation are targeted: mental training, physical training and work-related problem solving. The primary outcome is number of sick leave days. Secondary outcomes include time until full sustainable return to work, health related quality of life, health related behavior, functional status, somatic and mental health, and perceptions of work. In addition, health economic evaluation will be performed, and the implementation of the interventions, expectations and experiences of users and service providers will be investigated with different qualitative methods. Trial registration ClinicalTrials.gov: NCT01926574. PMID:24735616
Proposing Telecardiology Services on Cloud for Different Medical Institutions: A Model of Reference.
de la Torre-Díez, Isabel; Garcia-Zapirain, Begoña; López-Coronado, Miguel; Rodrigues, Joel J P C
2017-08-01
For a cloud-based telecardiology solution to be established in any scenario, it is necessary to ensure optimum levels of security, as patient's data will not be in the same place from where access is gained. The main objective of this article is to present a secure, cloud-based solution for a telecardiology service in different scenarios: a hospital, a health center in a city, and a group of health centers in a rural area. iCanCloud software is used to simulate the scenarios. The first scenario will be a city hospital with over 220,000 patients at its emergency services, and ∼1 million outpatient consultations. For the health center in a city, it serves ∼107,000 medical consultations and 16,700 pediatric consultations/year. In the last scenario, a group of health centers in a rural area serve an average 437.08 consultations/month and around 15.6 a day. Each one of the solutions proposed shares common features including the following: secure authentication through smart cards, the use of StorageGRID technology, and load balancers. For all cases, the cloud is private and the estimated price of the solution would cost around 450 €/month. Thanks to the research conducted in this work, it has been possible to provide an adapted solution in the form of a telecardiology service for a hospital, city health center, and rural health centers that offer security, privacy, and robustness, and is also optimum for a large number of cloud requests.
Morales-Perez, Arcadio; Nava-Aguilera, Elizabeth; Legorreta-Soberanis, José; Paredes-Solís, Sergio; Balanzar-Martínez, Alejandro; Serrano-de Los Santos, Felipe René; Ríos-Rivera, Claudia Erika; García-Leyva, Jaime; Ledogar, Robert J; Cockcroft, Anne; Andersson, Neil
2017-05-30
Community mobilisation for prevention requires engagement with and buy in from those communities. In the Mexico state of Guerrero, unprecedented social violence related to the narcotics trade has eroded most community structures. A recent randomised controlled trial in 90 coastal communities achieved sufficient mobilisation to reduce conventional vector density indicators, self-reported dengue illness and serologically proved dengue virus infection. The Camino Verde intervention was a participatory research protocol promoting local discussion of baseline evidence and co-design of vector control solutions. Training of facilitators emphasised community authorship rather than trying to convince communities to do specific activities. Several discussion groups in each intervention community generated a loose and evolving prevention plan. Facilitators trained brigadistas, the first wave of whom received a small monthly stipend. Increasing numbers of volunteers joined the effort without pay. All communities opted to work with schoolchildren and for house-to-house visits by brigadístas. Children joined the neighbourhood vector control movements where security conditions permitted. After 6 months, a peer evaluation involved brigadista visits between intervention communities to review and to share progress. Although most communities had no active social institutions at the outset, local action planning using survey data provided a starting point for community authorship. Well-known in their own communities, brigadistas faced little security risk compared with the facilitators who visited the communities, or with governmental programmes. We believe the training focus on evidence-based dialogue and a plural community ownership through multiple design groups were key to success under challenging security conditions. ISRCTN27581154 .
Fuel Cycle Research & Development Technical Monthly-March 2012
DOE Office of Scientific and Technical Information (OSTI.GOV)
Miller, Michael C.
2012-05-10
Several MPACT BCPs were executed in February, reflecting the shift in MPACT priorities directed late last year. Work continued on the FY2014 IPL, also bringing it in line with the new priorities. Preparations were made for the March MPACT Working Group meeting, in conjunction with Savannah River which is hosting the meeting. Steps were taken to initiate a new project with the World Institute for Nuclear Security, including discussions with WINS staff and preliminary work on the required procurement documentation. Several hardware issues were worked through. The newest detector array is working at LANL. A thorough analysis of previously collectedmore » Pu sample data using recently developed analysis code with improved spectral energy calibrations was completed. We now have a significantly better understanding of measurement uncertainties. Post-test analyses of the salt and sensor material for the first sensor test are almost complete. Sensor testing with different arrangements will continue and will be oriented based on post-test analysis of the first sensor test. Sensor materials for the next couple of tests are being fabricated. Materials with different annealing temperatures are being prepared for analysis. Fast Neutron Imaging to Quantify Nuclear Materials - The imager detectors repairs are complete and work with the imager is under way. The milestone requiring a report on LANSCE experiments was completed and submitted. Analysis of previous experiments and comparisons to simulations is near complete. Results are being compared with previous LANSCE-LSDS and RPI results. Additional data library (TENDL) is also being checked to see whether there are differences in the simulation results. The mid-year MIP Monitor project accomplishments and progress was presented at the MPACT meeting held in March at SRNL. Discussions around the meeting included inquiries into the feasibility of collecting process measurement data at H-Canyon, and it was explored further after the meeting. Kenneth Dayman, the graduate student from University of Texas, completed an initial draft of his master's thesis. His research will contribute to the multivariate classifier currently under development. Sarah Bender, the graduate student from Pennsylvania State University, presented her work on a poster and in a conference paper at the MARC IX meeting. A mass balance flowsheet for the fast reactor fuel was completed and a model simulation is scheduled to begin construction next month. The development of a mass balance flowsheet for light water reactor fuel will predict the behavior of the separation process using mathematical functions. The completed flowsheet will be utilized as the basis for constructing the model simulation for the electrochemical separations. Comments and review of the model from the MPACT Working Group meeting have been used to evaluate updates to the EChem model. A preliminary physical security layout has been developed in ATLAS. Thermal stability tests for high temperature microfluidic interconnections were completed on all compounds tested for bonding strength. An interconnection strategy was determined based on these results that we expect will allow for operation at 400C in the first generation of sampling systems. Design of the sampling system using the chosen interconnections was initiated, with handoff to an external foundry for fabrication based on ANL specified process conditions expected by the middle of the month. Monte Carlo simulations of the sampling system were conducted under conditions of realistic sampling size distributions, electrorefiner inhomogeneity distributions, and detector efficiencies. These simulations were used to establish a baseline limit of detection for system operation, assuming an on-line separation step is conducted before detection. Sensor for measuring density and depth of molten electrolyte - The procurement effort continued. 80% of the components ordered to assemble the double bubbler have arrived at the INL. Pratap Sadasivan, and his team have been working on the new metrics for proliferation and security. They have defined the basic structure and method, implementation strategy, needed data, and approach to application. Initial drafting of several sections of the milestone document was started. The MPACT Working Group meeting was hosted at SRS on March 13-15, 2012. Approximately 65 researchers from national labs, industry and universities attended the technical meetings at the Center for Hydrogen Research on March 13-14 with a working lunch each day. 37 persons participated in a site tour, including H-Canyon and the MOX Facility, on March 15. As part of the WG meeting, a presentation by SRNL was given on H-Canyon history, capabilities and opportunities for its use as an MPACT technology test bed. Used fuels storage security analysis, guidance and best practices - Coordination discussions continued for the MPACT used fuel security work packages.« less
MAINTENANCE MANAGEMENT ACCOUNTING SYSTEM OF WASTE WATER DISPOSAL SYSTEMS
NASA Astrophysics Data System (ADS)
Hori, Michihiro; Tsuruta, Takashi; Kaito, Kiyoyuki; Kobayashi, Kiyoshi
Sewage works facilities consist of various assets groups. And there are many kinds of financial resources. In order to optimize the maintenance plan, and to secure the stability and sustainability of sewage works management, it is necessary to carry out financial simulation based on the life-cycle cost analysis. Furthermore, it is important to develop management accounting system that is interlinked with the financial accounting system, because many sewage administration bodies have their financial accounting systems as public enterprises. In this paper, a management accounting system, which is designed to provide basic information for asset management of sewage works facilities, is presented. Also the applicability of the management accounting system presented in this paper is examined through financial simulations.
Wang, Yi-jun; Li, Fei-ping; Wang, Qian; Yang, Sen; Cai, Xian-guo; Chen, Ying-he
2011-11-01
The purpose of the study was to evaluate and compare the clinical values of tension-free vaginal tape (TVT), tension-free vaginal tape-transobturator (TVT-O), or tension-free vaginal tape-Secur (TVT-Secur) as treatment for female stress urinary incontinence. The pre-operative and 1-year post-operative follow-up protocols for patients who were treated with serial mid-urethral tension-free tape procedures in two hospitals from October 2008 to December 2009 were prospectively studied. These patients were randomly allocated to TVT, TVT-O, or TVT-Secur. A total of 102 women participated. At the 1-year follow-up, complications were not statistically different across the three groups except for pain in the thigh, which was more common in the TVT-O group. The overall efficacy and cure rate were similar between the TVT and TVT-O groups, but were significantly lower in the TVT-Secur group. A comparison of the three procedures shows that TVT-O is easy to operate and is as safe as TVT-Secur, and it has similar long-term efficacy to TVT, though, as one of the third-generation mid-urethral tension-free tapes, TVT-Secur is still being evaluated. Basing on the outcome of our study, it had rare complications but unsatisfactory efficacy, and we suggest that TVT-Secur is not fit for severe cases. However, observation and comparison of these groups in a larger sample size on a longer term are needed.
The Effects of Evaluation and Production Blocking on the Performance of Brainstorming Groups
1992-08-01
NUMBER OF PAGES 701 16. PRICE CODE 17. SECURITY CLASSIFICATION 18. SECURITY CLASSIFICATION 19. SECURITY CLASSIFICATION 20. LMIITATION OF ABSTRACT OF...special interest group. Once again, the people in the above examples share many things in common such as a sense of civil duty, an employer, a love for a...people respond differently in the presence of others, a phenomenon Zajonc refers to as compresence . In group settings, social facilitation can be
Sandia National Laboratories: National Security Missions: International
Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Payable Contract Information Construction & Facilities Contract Audit Sandia's Economic Impact
37 CFR 202.2 - Copyright notice.
Code of Federal Regulations, 2010 CFR
2010-07-01
... may be on a container which is designed and can be expected to remain with the work; (11) The notice...) General. (1) With respect to a work published before January 1, 1978, copyright was secured, or the right to secure it was lost, except for works seeking ad interim copyright, at the date of publication, i.e...
30 CFR 57.14211 - Blocking equipment in a raised position.
Code of Federal Regulations, 2010 CFR
2010-07-01
... in a raised position. (a) Persons shall not work on top of, under, or work from mobile equipment in a... of mobile equipment until the component has been blocked or mechanically secured to prevent... must be secured to prevent accidental lowering when persons are working on or around mobile equipment...
20 CFR 404.1021 - Work for the District of Columbia.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 404.1021 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND...; or (b) You are— (1) A patient or inmate of a hospital or penal institution and your work is for that... employment. If your work is not covered under Social Security, it may be covered as Medicare qualified...
The hobbyist phenomenon in physical security.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Michaud, E. C.
Pro-Ams (professional amateurs) are groups of people who work on a problem as amateurs or unpaid persons in a given field at professional levels of competence. Astronomy is a good example of Pro-Am activity. At Galaxy Zoo, Pro-Ams evaluate data generated by professional observatories and are able to evaluate the millions of galaxies that have been observed but not classified, and report their findings at professional levels for fun. To allow the archiving of millions of galaxies that have been observed but not classified, the website has been engineered so that the public can view and classify galaxies even ifmore » they are not professional astronomers. In this endeavor, it has been found that amateurs can easily outperform automated vision systems. Today in the world of physical security, Pro-Ams are playing an ever-increasing role. Traditionally, locksmiths, corporations, and government organizations have been largely responsible for developing standards, uncovering vulnerabilities, and devising best security practices. Increasingly, however, nonprofit sporting organizations and clubs are doing this. They can be found all over the world, from Europe to the US and now South East Asia. Examples include TOOOL (The Open Organization of Lockpickers), the Longhorn Lockpicking Club, Sportsfreunde der Sperrtechnik - Deustcheland e.V., though there are many others. Members of these groups have been getting together weekly to discuss many elements of security, with some groups specializing in specific areas of security. When members are asked why they participate in these hobbyist groups, they usually reply (with gusto) that they do it for fun, and that they view defeating locks and other security devices as an interesting and entertaining puzzle. A lot of what happens at these clubs would not be possible if it weren't for 'Super Abundance', the ability to easily acquire (at little or no cost) the products, security tools, technologies, and intellectual resources traditionally limited to corporations, government organizations, or wealthy individuals. With this new access comes new discoveries. For example, hobbyist sport lockpicking groups discovered - and publicized - a number of new vulnerabilities between 2004 and 2009 that resulted in the majority of high-security lock manufacturers having to make changes and improvements to their products. A decade ago, amateur physical security discoveries were rare, at least those discussed publicly. In the interim, Internet sites such as lockpicking.org, lockpicking101.com and others have provided an online meeting place for people to trade tips, find friends with similar interests, and develop tools. The open, public discussion of software vulnerabilities, in contrast, has been going on for a long time. These two industries, physical security and software, have very different upgrade mechanisms. With software, a patch can typically be deployed quickly to fix a serious vulnerability, whereas a hardware fix for a physical security device or system can take upwards of months to implement in the field, especially if (as is often the case) hardware integrators are involved. Even when responding to publicly announced security vulnerabilities, manufacturers of physical security devices such as locks, intrusion detectors, or access control devices rarely view hobbyists as a positive resource. This is most unfortunate. In the field of software, it is common to speak of Open Source versus Closed Source. An Open Source software company may choose to distribute their software with a particular license, and give it away openly, with full details and all the lines of source code made available. Linux is a very popular example of this. A Close Source company, in contrast, chooses not to reveal its source code and will license its software products in a restrictive manor. Slowly, the idea of Open Source is now coming to the world of physical security. In the case of locks, it provides an alternative to the traditional Closed Source world of locksmiths. Now locks are physical objects, and can therefore be disassembled. As such, they have always been Open Source in a limited sense. Secrecy, in fact, is very difficult to maintain for a lock that is widely distributed. Having direct access to the lock design provides the hobbyist with a very open environment for finding security flaws, even if the lock manufacturer attempts to follow a Close Source model. It is clear that the field of physical security is going the digital route with companies such as Medeco, Mul-T-Lock, and Abloy manufacturing electromechanical locks. Various companies have already begun to add microcontrollers, cryptographic chip sets, solid-state sensors, and a number of other high-tech improvements to their product lineup in an effort to thwart people from defeating their security products.« less
[The nursing team and Maslow: (dis)satisfaction in the work].
Vitória Regis, Lorena Fagundes Ladeia; Porto, Isaura Setenta
2006-01-01
This text tries to understand the Nursing team and their (dis)satisfactions in the work. We consider the association with the theory of basic human needs of Abraham Maslow as a way to systemize and to comprehend the recurrent situations and the day-by-day Nursing issues. The necessities are structuralized hierarchically in physiological, security, social, auto-esteem and auto-accomplishment indicating the degree of satisfaction (from the disease to the fullness) of an individual or group. The advantage of this approach consists of being able to use the solid, depth and rich Maslow theory in concrete and particular situations of the Nursing team.
Cocchiola-Silva, Rafaela A
2016-03-01
This study discusses the inclusion of mental disorders as work-related diseases in occupational health policies in Brazil. Mental disorders first appeared as a group of occupational diseases in 1999. Establishing mental disorders as occupational diseases was a result of the confluence of several factors: a broader notion of health, a positive shift in public perception regarding preconceived judgements relating to mental disorders and the improvement in the process that defines social security benefit entitlements due to the implementation of a new methodology in 2007. © The Author(s) 2016.
CORBASec Used to Secure Distributed Aerospace Propulsion Simulations
NASA Technical Reports Server (NTRS)
Blaser, Tammy M.
2003-01-01
The NASA Glenn Research Center and its industry partners are developing a Common Object Request Broker (CORBA) Security (CORBASec) test bed to secure their distributed aerospace propulsion simulations. Glenn has been working with its aerospace propulsion industry partners to deploy the Numerical Propulsion System Simulation (NPSS) object-based technology. NPSS is a program focused on reducing the cost and time in developing aerospace propulsion engines. It was developed by Glenn and is being managed by the NASA Ames Research Center as the lead center reporting directly to NASA Headquarters' Aerospace Technology Enterprise. Glenn is an active domain member of the Object Management Group: an open membership, not-for-profit consortium that produces and manages computer industry specifications (i.e., CORBA) for interoperable enterprise applications. When NPSS is deployed, it will assemble a distributed aerospace propulsion simulation scenario from proprietary analytical CORBA servers and execute them with security afforded by the CORBASec implementation. The NPSS CORBASec test bed was initially developed with the TPBroker Security Service product (Hitachi Computer Products (America), Inc., Waltham, MA) using the Object Request Broker (ORB), which is based on the TPBroker Basic Object Adaptor, and using NPSS software across different firewall products. The test bed has been migrated to the Portable Object Adaptor architecture using the Hitachi Security Service product based on the VisiBroker 4.x ORB (Borland, Scotts Valley, CA) and on the Orbix 2000 ORB (Dublin, Ireland, with U.S. headquarters in Waltham, MA). Glenn, GE Aircraft Engines, and Pratt & Whitney Aircraft are the initial industry partners contributing to the NPSS CORBASec test bed. The test bed uses Security SecurID (RSA Security Inc., Bedford, MA) two-factor token-based authentication together with Hitachi Security Service digital-certificate-based authentication to validate the various NPSS users. The test bed is expected to demonstrate NPSS CORBASec-specific policy functionality, confirm adequate performance, and validate the required Internet configuration in a distributed collaborative aerospace propulsion environment.
Iris Cryptography for Security Purpose
NASA Astrophysics Data System (ADS)
Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.
2018-04-01
In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.
Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun
2015-01-01
Objectives Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. Methods This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. Results The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. Conclusions The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff. PMID:26618034
Lee, Jae Dong; Yoon, Tae Sik; Chung, Seung Hyun; Cha, Hyo Soung
2015-10-01
Remote medical services have been expanding globally, and this is expansion is steadily increasing. It has had many positive effects, including medical access convenience, timeliness of service, and cost reduction. The speed of research and development in remote medical technology has been gradually accelerating. Therefore, it is expected to expand to enable various high-tech information and communications technology (ICT)-based remote medical services. However, the current state lacks an appropriate security framework that can resolve security issues centered on the Internet of things (IoT) environment that will be utilized significantly in telemedicine. This study developed a medical service-oriented frame work for secure remote medical services, possessing flexibility regarding new service and security elements through its service-oriented structure. First, the common architecture of remote medical services is defined. Next medical-oriented secu rity threats and requirements within the IoT environment are identified. Finally, we propose a "service-oriented security frame work for remote medical services" based on previous work and requirements for secure remote medical services in the IoT. The proposed framework is a secure framework based on service-oriented cases in the medical environment. A com parative analysis focusing on the security elements (confidentiality, integrity, availability, privacy) was conducted, and the analysis results demonstrate the security of the proposed framework for remote medical services with IoT. The proposed framework is service-oriented structure. It can support dynamic security elements in accordance with demands related to new remote medical services which will be diversely generated in the IoT environment. We anticipate that it will enable secure services to be provided that can guarantee confidentiality, integrity, and availability for all, including patients, non-patients, and medical staff.
Secure voice for mobile satellite applications
NASA Technical Reports Server (NTRS)
Vaisnys, Arvydas; Berner, Jeff
1990-01-01
The initial system studies are described which were performed at JPL on secure voice for mobile satellite applications. Some options are examined for adapting existing Secure Telephone Unit III (STU-III) secure telephone equipment for use over a digital mobile satellite link, as well as for the evolution of a dedicated secure voice mobile earth terminal (MET). The work has included some lab and field testing of prototype equipment. The work is part of an ongoing study at JPL for the National Communications System (NCS) on the use of mobile satellites for emergency communications. The purpose of the overall task is to identify and enable the technologies which will allow the NCS to use mobile satellite services for its National Security Emergency Preparedness (NSEP) communications needs. Various other government agencies will also contribute to a mobile satellite user base, and for some of these, secure communications will be an essential feature.
A Secure and Efficient Threshold Group Signature Scheme
NASA Astrophysics Data System (ADS)
Zhang, Yansheng; Wang, Xueming; Qiu, Gege
The paper presents a secure and efficient threshold group signature scheme aiming at two problems of current threshold group signature schemes: conspiracy attack and inefficiency. Scheme proposed in this paper takes strategy of separating designed clerk who is responsible for collecting and authenticating each individual signature from group, the designed clerk don't participate in distribution of group secret key and has his own public key and private key, designed clerk needs to sign part information of threshold group signature after collecting signatures. Thus verifier has to verify signature of the group after validating signature of the designed clerk. This scheme is proved to be secure against conspiracy attack at last and is more efficient by comparing with other schemes.
Weak and Failing States: Evolving Security Threats and U.S. Policy
2008-08-28
terrorists operate in both “ caves ” (i.e., failed states, where militant groups can exist with impunity) and “condos” (i.e., states that have the...of World Bank Support to Low-Income Countries Under Stress (Washington, DC: The World Bank, 2006); Chauvet and Collier, “Helping Hand? Aid to Failing...States,” Oxford University Working Paper (2006). 29 See Chauvet and Collier (2004), op. cit.; Francois Bourguignon, “Broadening Progress Toward the
2008-12-01
Palestinians like other foreign or migrant workers , are required to apply for work permits, which are difficult to obtain and are revocable at any time. Next...Adamson, although grouping refugees among all migrants , also identifies cross border movement, changing cultural identity, Diasporas and humanitarian...Karen Jacobson focuses on how international, local and refugee pressures affect whether a host government is acquiescent and responds according to
Safe and secure. How to create an effective OSHA compliance program in your practice.
Anderson, Douglas G
2007-08-01
Medical group practice administrators have a responsibility to provide a safe working environment for their employees and patients. You must create an effective Occupational Safety and Health Administration (OSHA) compliance program in your organization. The complexity and diversity of OSHA standards are significant, and developing an effective program requires more than a cut-and-paste approach. This article describes the scope of the task, the steps to take and tools you can use.
Report of the Working Group on Strengthening the Biosecurity of the United States
2009-10-01
affecting humans and granted the USDA authority comparable to that of the CDC to regulate entities that possess, use, and transfer BSAT that present a... fruitful history in academia, and includes research on pathogens that only recently have been designated “select agents and toxins.” This open...risk, with less emphasis on biosecurity and biodefense, and fail to consider issues that affect U.S. national security (e.g., selection of an agent
Evaluation of Corrosion Inhibitors as Lubricity Improvers
1988-07-01
IF AFWAL-TR-88-2036 I. ov EVALUATION OF CORROSION , INHIBITORS AS LUBRICITY IMPROVERS 0 T.B. Biddle W. H. Edwards United Technologies Corporation...TASK WORK UNIT ELEMENT NO. NO. NO. NO. ITL (include Security C.aulf.cal.on) 6220 F .--- 3048-_ 05 51 valuation of Corrosion Inhibitors as Lubricity...numkr) o GROUP SUB. GR. Bal12nQ ylinder Lubricity)Eva ator, BOCLE, Corrosion Inhibitor , Fuel 01 03 Lubricity, MIL!AI5017, QPL-2 17 Reverse Phase) High
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods
Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman
2017-01-01
Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users’ security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users’ behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals’ awareness of the consequences of security threats. By comparing participants’ behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users’ security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones. PMID:28297719
Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods.
Alsaleh, Mansour; Alomar, Noura; Alarifi, Abdulrahman
2017-01-01
Protecting smartphones against security threats is a multidimensional problem involving human and technological factors. This study investigates how smartphone users' security- and privacy-related decisions are influenced by their attitudes, perceptions, and understanding of various security threats. In this work, we seek to provide quantified insights into smartphone users' behavior toward multiple key security features including locking mechanisms, application repositories, mobile instant messaging, and smartphone location services. To the best of our knowledge, this is the first study that reveals often unforeseen correlations and dependencies between various privacy- and security-related behaviors. Our work also provides evidence that making correct security decisions might not necessarily correlate with individuals' awareness of the consequences of security threats. By comparing participants' behavior and their motives for adopting or ignoring certain security practices, we suggest implementing additional persuasive approaches that focus on addressing social and technological aspects of the problem. On the basis of our findings and the results presented in the literature, we identify the factors that might influence smartphone users' security behaviors. We then use our understanding of what might drive and influence significant behavioral changes to propose several platform design modifications that we believe could improve the security levels of smartphones.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AIMS Worldwide, Inc., Apollo Capital Group, Inc., CommunitySouth Financial Corp., Last Mile Logistics Group, Inc., Made in America Entertainment... concerning the securities of Last Mile Logistics Group, Inc. because it has not filed any periodic reports...
Social Security disability beneficiaries with work-related goals and expectations.
Livermore, Gina A
2011-01-01
This study examines working-age Social Security Disability Insurance and Supplemental Security Income beneficiaries who report having work goals or expectations, referring to these individuals as "work-oriented." The study uses data from the 2004 National Beneficiary Survey matched to administrative data spanning 2004-2007 to identify work-oriented beneficiaries and to analyze their sociodemographic, health, and employment characteristics, as well as their earnings-related benefit suspensions and terminations. Relative to other disability beneficiaries, the 40 percent classified as work-oriented were younger and more educated, had been on the disability rolls a shorter time, had lower income from public assistance, and were healthier. Just over half had recently engaged in work or in work preparation activities at interview, about half had earnings at some point during 2004-2007, and 10 percent left the disability rolls because of earnings for at least 1 month during that period. The findings show that a large share of beneficiaries have work goals, most are attempting to work, and many experience some success.
Making Technology Work for Campus Security
ERIC Educational Resources Information Center
Floreno, Jeff; Keil, Brad
2010-01-01
The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems.
Ko, Hoon; Song, MoonBae
2016-01-01
Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.
Sandia National Laboratories: National Security Missions: International
; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What Information Construction & Facilities Contract Audit Sandia's Economic Impact Licensing & Technology
Sandia National Laboratories: National Security Missions: International
Programs Environmental Responsibility Environmental Management System Pollution Prevention History 60 ; Security Weapons Science & Technology Defense Systems & Assessments About Defense Systems & ; Development Technology Deployment Centers Working With Sandia Working With Sandia Prospective Suppliers What
Woolford, Susan J; Esperanza Menchaca, Alicia D M; Sami, Areej; Blake, Natalie
2013-08-01
Social media may have the potential to enhance weight management efforts. However, the acceptability of incorporating this entity into pediatrics is unknown. The objective of this project was to explore patients' and parents' perspectives about developing a Facebook group as a component of a pediatric weight management program. Semistructured interviews were performed between September, 2011, and February, 2012, with patients and parents in a multidisciplinary weight management program. Interviews explored participants' perceptions of potential benefits, concerns, and preferences related to a program-specific Facebook group. Transcripts were reviewed and themes identified. The study concluded when thematic saturation was achieved. Participants (n=32) were largely enthusiastic about the idea of a program-specific Facebook group for adolescents. Most preferred a secret group, where only participants would know of the group's existence or group members' identity. No parents expressed concern about security or privacy related to a program-specific Facebook group; one parent expressed concern about undesirable advertisements. Participants endorsed a variety of ideas for inclusion on the page, including weight loss tips, live chats with providers, quizzes, and an incentive system where participants could gain points for making healthy choices. Many parents requested a separate parent-focused page, an idea that was supported by the adolescents. This study suggests that participants perceive potential benefits from incorporating social media interventions into pediatric weight management efforts. Privacy and security issues do not appear to be major parental concerns. Future work should explore the impact of program-specific social media interventions on outcomes for patients in weight management programs.
Vaughn, B E; Gove, F L; Egeland, B
1980-12-01
The effects of routine daily separations occasioned by out-of-home care on the formation and maintenance of infant-mother attachment relationships were examined in a population of economically disadvantaged mothers. 3 groups were constituted on the basis of the time in the infant's life when out-of-home care began: (1) before 12 months; (2) between 12 and 18 months; (3) home-care controls. The infant-mother pairs were observed in the Ainsworth strange situation at both 12 and 18 months, and were classified as secure, anxious-avoidant, or anxious-resistant. Because previous research has implicated the psychological accessibility of the mother to the infant in the development of anxious-avoidant attachments during the first year of life, the hypothesis that physical inaccessibility due to out-of-home care would also be associated with anxious-avoidant attachments was tested. The data support this hypothesis. At 12 months 47% of the infants whose mothers had returned to work/school were classified in the anxious-avoidant group, while the other 2 groups did not differ significantly in the proportions of infants assigned to the 3 attachment classifications. At 18 months, differences among the 3 work status groups also showed a large portion of anxious-avoidant infants (41%) in this early working group. However, infants whose out-of-home care began after 12 months did not show an increase in the proportion of anxious attachments. Additional analyses of variables related to mother's return to work indicated that single mothers were more likely to return to work/school, that mothers who worked reported higher levels of life stress than mothers who stayed home with the infants, and that, by 18 months, both anxious-avoidant and anxious-resistant attachments were also associated with non-intact families.
Secure Multicast Tree Structure Generation Method for Directed Diffusion Using A* Algorithms
NASA Astrophysics Data System (ADS)
Kim, Jin Myoung; Lee, Hae Young; Cho, Tae Ho
The application of wireless sensor networks to areas such as combat field surveillance, terrorist tracking, and highway traffic monitoring requires secure communication among the sensor nodes within the networks. Logical key hierarchy (LKH) is a tree based key management model which provides secure group communication. When a sensor node is added or evicted from the communication group, LKH updates the group key in order to ensure the security of the communications. In order to efficiently update the group key in directed diffusion, we propose a method for secure multicast tree structure generation, an extension to LKH that reduces the number of re-keying messages by considering the addition and eviction ratios of the history data. For the generation of the proposed key tree structure the A* algorithm is applied, in which the branching factor at each level can take on different value. The experiment results demonstrate the efficiency of the proposed key tree structure against the existing key tree structures of fixed branching factors.
Practical and secure telemedicine systems for user mobility.
Rezaeibagha, Fatemeh; Mu, Yi
2018-02-01
The application of wireless devices has led to a significant improvement in the quality delivery of care in telemedicine systems. Patients who live in a remote area are able to communicate with the healthcare provider and benefit from the doctor consultations. However, it has been a challenge to provide a secure telemedicine system, which captures users (patients and doctors) mobility and patient privacy. In this work, we present several secure protocols for telemedicine systems, which ensure the secure communication between patients and doctors who are located in different geographical locations. Our protocols are the first of this kind featured with confidentiality of patient information, mutual authentication, patient anonymity, data integrity, freshness of communication, and mobility. Our protocols are based on symmetric-key schemes and capture all desirable security requirements in order to better serve our objectives of research for secure telemedicine services; therefore, they are very efficient in implementation. A comparison with related works shows that our work contributes first comprehensive solution to capture user mobility and patient privacy for telemedicine systems. Copyright © 2018 Elsevier Inc. All rights reserved.
77 FR 50204 - Star Entertainment Group, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Star Entertainment Group, Inc., Order of... lack of current and accurate information concerning the securities of Star Entertainment Group, Inc. (``Star Entertainment'') because of questions regarding the accuracy of the company's financial statements...
77 FR 14839 - Harris & Harris Group, Inc.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-13
... SECURITIES AND EXCHANGE COMMISSION [Investment Company Act Release No. 29976; 812-13313] Harris & Harris Group, Inc.; Notice of Application March 7, 2012. AGENCY: Securities and Exchange Commission... from section 23(c) of the Act. SUMMARY OF THE APPLICATION: Harris & Harris Group, Inc. (``Applicant...
Evans, Rhiannon E
2018-05-01
Research on clinicians' interpretations of self-harming practices has shown that they can often be negative. To date there has been limited consideration of other professionals' narratives, notably those working in social care. This article presents focus group and interview data generated with foster carers ( n = 15) and residential carers ( n = 15) to explore the symbolic meanings ascribed to self-harm among the children and young people they care for. Three repertoires of interpretation are presented: survival, which conceives self-harm as a mechanism for redefining the identity of "looked-after"; signaling, which understands self-harm as a communicative tool for the expression of emotion; and security, which sees self-harming practices as testing the authenticity and safety of the caring relationship. Through their focus on sociocultural narratives, carers position themselves as experts on self-harm due to their intimacy with young people's social worlds. This construction potentially creates distance from health professionals, which is problematic given the current privileging of interprofessional working.
Cahalin, Lawrence P
2009-01-01
Job strain is the psychological and physiological response to a lack of control or support in the work environment. It appears to be an important risk factor for continued employment throughout the lifespan. Reducing job strain earlier in a workers life has the potential to have substantial beneficial health effects throughout a workers life. Early screening for job strain should be implemented in known high risk or high strain jobs. This is particularly important since there a fewer younger workers entering the labor force and there will be a growing need for older workers to remain in the workforce. Furthermore, healthier workers will require less medical care and are likely to work longer if they are willing and able. Healthier older workers who are willing and able to work longer will defer receipt of retirement benefits while continuing to pay into the Social Security System. Further investigation of older individuals (1) willingness and motivation to work past the normal retirement age, (2) career and employment security, skills development, and reconciliation of working and non-working life, and (3) job strain and effects of reducing job strain is needed. The current job strain literature has been expanded to the Social Security System arena and suggests that reducing job strain has the potential to help eliminate the Social Security drain by increasing older worker labor force retention.
Parent-infant psychotherapy for improving parental and infant mental health.
Barlow, Jane; Bennett, Cathy; Midgley, Nick; Larkin, Soili K; Wei, Yinghui
2015-01-08
Parent-infant psychotherapy (PIP) is a dyadic intervention that works with parent and infant together, with the aim of improving the parent-infant relationship and promoting infant attachment and optimal infant development. PIP aims to achieve this by targeting the mother's view of her infant, which may be affected by her own experiences, and linking them to her current relationship to her child, in order to improve the parent-infant relationship directly. 1. To assess the effectiveness of PIP in improving parental and infant mental health and the parent-infant relationship.2. To identify the programme components that appear to be associated with more effective outcomes and factors that modify intervention effectiveness (e.g. programme duration, programme focus). We searched the following electronic databases on 13 January 2014: Cochrane Central Register of Controlled Trials (CENTRAL, 2014, Issue 1), Ovid MEDLINE, EMBASE, CINAHL, PsycINFO, BIOSIS Citation Index, Science Citation Index, ERIC, and Sociological Abstracts. We also searched the metaRegister of Controlled Trials, checked reference lists, and contacted study authors and other experts. Two review authors assessed study eligibility independently. We included randomised controlled trials (RCT) and quasi-randomised controlled trials (quasi-RCT) that compared a PIP programme directed at parents with infants aged 24 months or less at study entry, with a control condition (i.e. waiting-list, no treatment or treatment-as-usual), and used at least one standardised measure of parental or infant functioning. We also included studies that only used a second treatment group. We adhered to the standard methodological procedures of The Cochrane Collaboration. We standardised the treatment effect for each outcome in each study by dividing the mean difference (MD) in post-intervention scores between the intervention and control groups by the pooled standard deviation. We presented standardised mean differences (SMDs) and 95% confidence intervals (CI) for continuous data, and risk ratios (RR) for dichotomous data. We undertook meta-analysis using a random-effects model. We included eight studies comprising 846 randomised participants, of which four studies involved comparisons of PIP with control groups only. Four studies involved comparisons with another treatment group (i.e. another PIP, video-interaction guidance, psychoeducation, counselling or cognitive behavioural therapy (CBT)), two of these studies included a control group in addition to an alternative treatment group. Samples included women with postpartum depression, anxious or insecure attachment, maltreated, and prison populations. We assessed potential bias (random sequence generation, allocation concealment, incomplete outcome data, selective reporting, blinding of participants and personnel, blinding of outcome assessment, and other bias). Four studies were at low risk of bias in four or more domains. Four studies were at high risk of bias for allocation concealment, and no study blinded participants or personnel to the intervention. Five studies did not provide adequate information for assessment of risk of bias in at least one domain (rated as unclear).Six studies contributed data to the PIP versus control comparisons producing 19 meta-analyses of outcomes measured at post-intervention or follow-up, or both, for the primary outcomes of parental depression (both dichotomous and continuous data); measures of parent-child interaction (i.e. maternal sensitivity, child involvement and parent engagement; infant attachment category (secure, avoidant, disorganised, resistant); attachment change (insecure to secure, stable secure, secure to insecure, stable insecure); infant behaviour and secondary outcomes (e.g. infant cognitive development). The results favoured neither PIP nor control for incidence of parental depression (RR 0.74, 95% CI 0.52 to 1.04, 3 studies, 278 participants, low quality evidence) or parent-reported levels of depression (SMD -0.22, 95% CI -0.46 to 0.02, 4 studies, 356 participants, low quality evidence). There were improvements favouring PIP in the proportion of infants securely attached at post-intervention (RR 8.93, 95% CI 1.25 to 63.70, 2 studies, 168 participants, very low quality evidence); a reduction in the number of infants with an avoidant attachment style at post-intervention (RR 0.48, 95% CI 0.24 to 0.95, 2 studies, 168 participants, low quality evidence); fewer infants with disorganised attachment at post-intervention (RR 0.32, 95% CI 0.17 to 0.58, 2 studies, 168 participants, low quality evidence); and an increase in the proportion of infants moving from insecure to secure attachment at post-intervention (RR 11.45, 95% CI 3.11 to 42.08, 2 studies, 168 participants, low quality evidence). There were no differences between PIP and control in any of the meta-analyses for the remaining primary outcomes (i.e. adverse effects), or secondary outcomes.Four studies contributed data at post-intervention or follow-up to the PIP versus alternative treatment analyses producing 15 meta-analyses measuring parent mental health (depression); parent-infant interaction (maternal sensitivity); infant attachment category (secure, avoidant, resistant, disorganised) and attachment change (insecure to secure, stable secure, secure to insecure, stable insecure); infant behaviour and infant cognitive development. None of the remaining meta-analyses of PIP versus alternative treatment for primary outcomes (i.e. adverse effects), or secondary outcomes showed differences in outcome or any adverse changes.We used the Grades of Recommendation, Assessment, Development and Evaluation Working Group (GRADE) approach to rate the overall quality of the evidence. For all comparisons, we rated the evidence as low or very low quality for parental depression and secure or disorganised infant attachment. Where we downgraded the evidence, it was because there was risk of bias in the study design or execution of the trial. The included studies also involved relatively few participants and wide CI values (imprecision), and, in some cases, we detected clinical and statistical heterogeneity (inconsistency). Lower quality evidence resulted in lower confidence in the estimate of effect for those outcomes. Although the findings of the current review suggest that PIP is a promising model in terms of improving infant attachment security in high-risk families, there were no significant differences compared with no treatment or treatment-as-usual for other parent-based or relationship-based outcomes, and no evidence that PIP is more effective than other methods of working with parents and infants. Further rigorous research is needed to establish the impact of PIP on potentially important mediating factors such as parental mental health, reflective functioning, and parent-infant interaction.
Locum doctors in general practice: motivation and experiences.
McKevitt, C; Morgan, M; Hudson, M
1999-01-01
BACKGROUND: There is evidence of dissatisfaction with locum doctors' performance, but little is known about doctors who work as locums in general practice or about their experiences of this work. AIM: To describe the motivations and experiences of doctors providing locum cover in general practices. METHOD: A postal questionnaire survey distributed to locums through organizations such as locum groups, commercial agencies, and general practices. RESULTS: Questionnaires were returned by 111 doctors currently working as locums in general practice. Four main reasons for working as a locum GP were: as a short-term option while between posts, to gain experience of different practices before commitment to one practice, to balance work and family or other commitments, to continue part-time work after retirement. One-quarter of responders intended to continue working as a locum indefinitely. The drawbacks of locum work included frustration with low status, lack of security, and difficulty accessing structured training and education. CONCLUSION: Locum doctors in general practice are a heterogeneous group that includes those who have chosen this type of work. The doctors who intend to continue as locums indefinitely represent a useful resource in primary care whose ability to provide short-term cover could be maximized. The need to control the quality of 'freelance' doctors should not overshadow the need to control the quality of their working environments. PMID:10621983
The electronic security partnership of safety/security and information systems departments.
Yow, J Art
2012-01-01
The ever-changing world of security electronics is reviewed in this article. The author focuses on its usage in a hospital setting and the need for safety/security and information systems departments to work together to protect and get full value from IP systems.
Social security reforms and poverty among older dual-earner couples.
Mitchell, O S
1991-01-01
The author analyzes factors affecting the retirement decisions of couples in which both spouses work. She "develops a framework for assessing how several past and prospective Social Security reforms might be expected to affect older working couples' retirement ages and retirement incomes. Two questions are addressed in some detail: (1) What are the likely effects of various changes in Social Security rules on the retirement decisions of older working women and their husbands? and (2) How might these changes alter the incidence of poverty among retired dual-earner couples? Empirical evidence from the United States suggests that many benefit reforms currently being discussed in policy circles will enhance Social Security system revenues, but will also worsen the economic status of an important segment of dual-earner couples." excerpt
Beyond a series of security nets: Applying STAMP & STPA to port security
Williams, Adam D.
2015-11-17
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
Beyond a series of security nets: Applying STAMP & STPA to port security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, Adam D.
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
Sandia National Laboratories: National Security Missions: International
Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia Licensing & Technology Transfer Browse Technology Portfolios Technology Partnerships Business, Industry
Sandia National Laboratories: National Security Missions: International
Prevention History 60 impacts Diversity Locations Facts & Figures Programs Nuclear Weapons About Nuclear Weapons Safety & Security Weapons Science & Technology Defense Systems & Assessments About Directed Research & Development Technology Deployment Centers Working With Sandia Working With Sandia
Lammerts, Lieke; Vermeulen, Sylvia J; Schaafsma, Frederieke G; van Mechelen, Willem; Anema, Johannes R
2014-06-12
Workers without a permanent employment contract represent a vulnerable group within the working population. Mental disorders are a major cause of sickness absence within this group. Common mental disorders are stress-related, depressive and anxiety disorders. To date, little attention has been paid to effective return to work interventions for this type of sick-listed workers. Therefore, a participatory supportive return to work program has been developed. It combines elements of a participatory return to work program, integrated care and direct placement in a competitive job.The objective of this paper is to describe the design of a randomised controlled trial to evaluate the cost-effectiveness of this program compared to care as usual. The cost-effectiveness of the participatory supportive return to work program will be examined in a randomised controlled trial with a follow-up of twelve months.The program strongly involves the sick-listed worker in the identification of obstacles for return to work and possible solutions, resulting in a consensus based action plan. This plan will be used as a starting point for the search of suitable competitive employment with support of a rehabilitation agency. During this process the insurance physician of the sick-listed worker contacts other caregivers to promote integrated care.Workers eligible to participate in this study have no permanent employment contract, have applied for a sickness benefit at the Dutch Social Security Agency and are sick-listed between two and fourteen weeks due to mental health problems.The primary outcome measure is the duration until first sustainable return to work in a competitive job. Outcomes are measured at baseline and after three, six, nine and twelve months. If the participatory supportive return to work program proves to be cost-effective, the social security system, the sick-listed worker and society as a whole will benefit. A cost-effective return to work program will lead to a reduction of costs related to sickness absence. For the sick-listed worker a cost-effective program results in earlier sustainable return to work, which can be associated with both social and health benefits. The trial registration number and date is NTR3563, August 7, 2012.
2014-01-01
Background Workers without a permanent employment contract represent a vulnerable group within the working population. Mental disorders are a major cause of sickness absence within this group. Common mental disorders are stress-related, depressive and anxiety disorders. To date, little attention has been paid to effective return to work interventions for this type of sick-listed workers. Therefore, a participatory supportive return to work program has been developed. It combines elements of a participatory return to work program, integrated care and direct placement in a competitive job. The objective of this paper is to describe the design of a randomised controlled trial to evaluate the cost-effectiveness of this program compared to care as usual. Methods/Design The cost-effectiveness of the participatory supportive return to work program will be examined in a randomised controlled trial with a follow-up of twelve months. The program strongly involves the sick-listed worker in the identification of obstacles for return to work and possible solutions, resulting in a consensus based action plan. This plan will be used as a starting point for the search of suitable competitive employment with support of a rehabilitation agency. During this process the insurance physician of the sick-listed worker contacts other caregivers to promote integrated care. Workers eligible to participate in this study have no permanent employment contract, have applied for a sickness benefit at the Dutch Social Security Agency and are sick-listed between two and fourteen weeks due to mental health problems. The primary outcome measure is the duration until first sustainable return to work in a competitive job. Outcomes are measured at baseline and after three, six, nine and twelve months. Discussion If the participatory supportive return to work program proves to be cost-effective, the social security system, the sick-listed worker and society as a whole will benefit. A cost-effective return to work program will lead to a reduction of costs related to sickness absence. For the sick-listed worker a cost-effective program results in earlier sustainable return to work, which can be associated with both social and health benefits. Trial registration The trial registration number and date is NTR3563, August 7, 2012. PMID:24919561
Shamai, M
1998-01-01
This article describes and analyzes a 2-year supervision process with social workers and family therapists who live and work under conditions of uncertainty on the West Bank. The systemic orientation used in this specific approach to supervision emphasizes the double role of the therapist: one as part of the therapeutic system, and the second as a member of the same community that is living in political uncertainty. The analysis revealed that a long-term supervision process, in which the supervisor encouraged a containing context, was meaningful to the group. As a result of this secure atmosphere, the group was ready to talk about painful issues like loss as the result of war and terrorist attacks, loss as a result of immigration, and loss of ideals. Furthermore, the members of the group were ready to confront the possibility of relocation and their role in such a situation. The techniques used in the process, such as narrative and metaphors, were implemented by the members in their daily professional interventions. The flexibility between working on regular professional issues and issues related to stress and uncertainty seemed useful to the supervision, as well as the political dialogue that was created between the supervisor and the group.
Profiles of Irish survivors of institutional abuse with different adult attachment styles.
Carr, Alan; Flanagan, Edel; Dooley, Barbara; Fitzpatrick, Mark; Flanagan-Howard, Roisín; Shevlin, Mark; Tierney, Kevin; White, Megan; Daly, Margaret; Egan, Jonathan
2009-03-01
Two hundred and forty seven survivors of institutional abuse in Ireland were classified with the Experiences in Close Relationships Inventory as having fearful (44%), preoccupied (13%), dismissive (27%), or secure (17%) adult attachment styles. The group with the secure adult attachment style had the most positive profile, while the most negative profile occurred for the fearful group in terms of DSM IV diagnoses and scores on the Trauma Symptom Inventory, the Global Assessment of Functioning Scale, the World Health Organization Quality of Life 100 scale, and the Kansas Marital Satisfaction Scale. The profile of the preoccupied group was more similar to that of the fearful group. The profile of the dismissive group was more similar to that of the secure group.
Fusion of footsteps and face biometrics on an unsupervised and uncontrolled environment
NASA Astrophysics Data System (ADS)
Vera-Rodriguez, Ruben; Tome, Pedro; Fierrez, Julian; Ortega-Garcia, Javier
2012-06-01
This paper reports for the first time experiments on the fusion of footsteps and face on an unsupervised and not controlled environment for person authentication. Footstep recognition is a relatively new biometric based on signals extracted from people walking over floor sensors. The idea of the fusion between footsteps and face starts from the premise that in an area where footstep sensors are installed it is very simple to place a camera to capture also the face of the person that walks over the sensors. This setup may find application in scenarios like ambient assisted living, smart homes, eldercare, or security access. The paper reports a comparative assessment of both biometrics using the same database and experimental protocols. In the experimental work we consider two different applications: smart homes (small group of users with a large set of training data) and security access (larger group of users with a small set of training data) obtaining results of 0.9% and 5.8% EER respectively for the fusion of both modalities. This is a significant performance improvement compared with the results obtained by the individual systems.
Adshead, Gwen; Pyszora, Natalie; Wilson, Claire; Gopie, Ramesh; Thomas, Deryk; Smith, Julia; Glorney, Emily; Moore, Estelle; Tapp, James
2017-04-01
Moving on from high secure psychiatric care can be a complex and potentially stressful experience, which may hinder progression. A leavers' group in a UK high secure hospital is offered to support patients with this transition. The aims of this study are to investigate characteristics of patients referred for the leavers' group and compare outcomes for leavers' group graduates with those for patients who never attended a leavers' group for any reason. A retrospective quasi-experimental design was applied to data extracted from various records sources - within and outside the high security hospital. About one-fifth of patients who left the hospital on trial leave during the study were referred to the leavers' group (N = 109). Referred patients were significantly more likely to have either been admitted from another high-security hospital or transferred from prison for treatment and have a diagnosis of paranoid schizophrenia. Patients not referred had a significantly higher rate of previously refusing to participate in groups. There was a tendency for rate of return from trial leave for group graduates to be lower than that of patients who did not attend the leavers' group, but this just failed to reach statistical significance (rate ratio [RR] = 1.04; CI 0.97-1.11). A leavers' group appeared to be a valued therapy option for people who had spent a long time in high secure psychiatric care, or those who continued to require hospital treatment beyond prison tariffs. There was a low return rate from trial leave, which made the evaluation of this outcome difficult. A detailed study into both the reasons for return from trial leave and successes would provide further information on ideal preparation for moving on. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.
Information Sharing for IT Security Professionals
ERIC Educational Resources Information Center
Petersen, Rodney J.
2008-01-01
Information sharing is a core value for information technology (IT) security professionals. It is also a familiar concept for those who work at institutions of higher education because of their long history of collaboration and openness. Information sharing has become part of the national fabric as IT security professionals attempt to secure cyber…
Exploring Physicians' Dissatisfaction and Work-Related Stress: Development of the PhyDis Scale.
Pedrazza, Monica; Berlanda, Sabrina; Trifiletti, Elena; Bressan, Franco
2016-01-01
Research, all over the world, is starting to recognize the potential impact of physicians' dissatisfaction and burnout on their productivity, that is, on their intent to leave the job, on their work ability, on the amount of sick leave days, on their intent to continue practicing, and last but not least, on the quality of the services provided, which is an essential part of the general medical care system. It was interest of the provincial medical board's ethical committee to acquire information about physician's work-related stress and dissatisfaction. The research group was committed to define the indicators of dissatisfaction and work-related stressors. Focus groups were carried out, 21 stressful experience's indicators were identified; we developed an online questionnaire to assess the amount of perceived stress relating to each indicator at work (3070 physicians were contacted by e-mail); quantitative and qualitative data analysis were carried out. The grounded theory perspective was applied in order to assure the most reliable procedure to investigate the concepts' structure of "work-related stress." We tested the five dimensions' model of the stressful experience with a confirmatory factor analysis: Personal Costs; Decline in Public Image and Role Uncertainty; Physician's Responsibility toward hopelessly ill Patients; Relationship with Staff and Colleagues; Bureaucracy. We split the sample according to attachment style (secure and insecure -anxious and avoidant-). Results show the complex representation of physicians' dissatisfaction at work also with references to the variable of individual difference of attachment security/insecurity. The discriminant validity of the scale was tested. The original contribution of this paper lies on the one hand in the qualitative in depth inductive analysis of physicians' dissatisfaction starting from physicians' perception, on the other hand, it represents the first attempt to analyze the physicians' dissatisfaction with reference to attachment styles, which is recognized as being a central variable of individual difference supporting caregiving practices. This study represents an original and innovative attempt to address physicians' dissatisfaction and job satisfaction. The PhyDis scale has been developed and, in line with international findings, our results indicate that role uncertainty and loss of social esteem are the most dissatisfying factors.
Exploring Physicians' Dissatisfaction and Work-Related Stress: Development of the PhyDis Scale
Pedrazza, Monica; Berlanda, Sabrina; Trifiletti, Elena; Bressan, Franco
2016-01-01
Research, all over the world, is starting to recognize the potential impact of physicians' dissatisfaction and burnout on their productivity, that is, on their intent to leave the job, on their work ability, on the amount of sick leave days, on their intent to continue practicing, and last but not least, on the quality of the services provided, which is an essential part of the general medical care system. It was interest of the provincial medical board's ethical committee to acquire information about physician's work-related stress and dissatisfaction. The research group was committed to define the indicators of dissatisfaction and work-related stressors. Focus groups were carried out, 21 stressful experience's indicators were identified; we developed an online questionnaire to assess the amount of perceived stress relating to each indicator at work (3070 physicians were contacted by e-mail); quantitative and qualitative data analysis were carried out. The grounded theory perspective was applied in order to assure the most reliable procedure to investigate the concepts' structure of “work-related stress.” We tested the five dimensions' model of the stressful experience with a confirmatory factor analysis: Personal Costs; Decline in Public Image and Role Uncertainty; Physician's Responsibility toward hopelessly ill Patients; Relationship with Staff and Colleagues; Bureaucracy. We split the sample according to attachment style (secure and insecure -anxious and avoidant-). Results show the complex representation of physicians' dissatisfaction at work also with references to the variable of individual difference of attachment security/insecurity. The discriminant validity of the scale was tested. The original contribution of this paper lies on the one hand in the qualitative in depth inductive analysis of physicians' dissatisfaction starting from physicians' perception, on the other hand, it represents the first attempt to analyze the physicians' dissatisfaction with reference to attachment styles, which is recognized as being a central variable of individual difference supporting caregiving practices. This study represents an original and innovative attempt to address physicians' dissatisfaction and job satisfaction. The PhyDis scale has been developed and, in line with international findings, our results indicate that role uncertainty and loss of social esteem are the most dissatisfying factors. PMID:27588013
Yassi, Annalee; Nophale, Letshego E; Dybka, Lyndsay; Bryce, Elizabeth; Kruger, Willem; Spiegel, Jerry
2009-01-01
Healthcare workers face difficult working conditions, particularly where HIV and tuberculosis add to understaffing. Questionnaires, workplace assessments, and discussion groups were conducted at a regional hospital in South Africa to obtain baseline data and input from the workforce in designing interventions. Findings highlighted weaknesses in knowledge, for example regarding the use of N95 respirators and safe handling of sharps, and suggested the need for improved training. Access to supplies and personal protective equipment was the major reported reason for failure to follow proper procedures; this was confirmed by workplace assessments. Discussion groups highlighted the important role for worker Health and Safety Committees (HSC), including in combating stigma and encouraging reporting. Interest in data to support decision-making resulted in development of the Occupational Health and Safety Information System (OHASIS); further training of HSCs is still needed. Multi-stakeholder international collaboration aimed at building HSC capacity is well-received.
Good work - how is it recognised by the nurse?
Christiansen, Bjørg
2008-06-01
The aim of this paper is to shed light on how nurses describe situations that reflect achievement and provide confirmation that they have done good work. Nurses' recognition of good work does not seem to have been the object of direct investigation, but is indirectly reflected in studies focusing on nurses' perceptions on work environments and the multifaceted nature of nursing. However, acknowledging high-quality performance in professional nurses can facilitate nurses in maintaining and strengthening the goals and values of the profession. This in turn can help nurses shoulder the multifaceted responsibilities they have to patients and next of kin. This paper is part of the Professional Learning in a Changing Society project, Institute of Educational Research, University of Oslo, funded by the Research Council of Norway. The project involves four professional groups. This paper, however, focuses on a group of 10 nurses, nine of whom work in hospitals and one in an outpatient clinic. A qualitative approach was chosen to gain insight into how nurses, as well as the other professional groups in the project, engage in processes of knowledge production and quality assurance work. Data presented in this paper derive from semi-structured in-depth interviews conducted during spring 2005 and focuses on the recognition of good work. The following themes were identified as essential in confirming that one did good work: securing fundamental needs of patients and next of kin; managing the flow of responsibilities; positive feedback. CONCLUSIONS. Good work seems to be related to specific situations and a sense of achievement by the respondents. Recognition of good work is not only rewarding and enjoyable; it may also serve as a source of consciousness raising for professional and ethical guidelines in the work place.
Vocational rehabilitation for adults with psychotic disorders in a Scandinavian welfare society.
Falkum, Erik; Klungsøyr, Ole; Lystad, June Ullevoldsæter; Bull, Helen Christine; Evensen, Stig; Martinsen, Egil W; Friis, Svein; Ueland, Torill
2017-01-17
This study examined the outcomes of a vocational rehabilitation program (The Job Management Program, JUMP) for persons with psychotic disorders based on close collaboration between health and welfare services. Participants (N = 148) with broad schizophrenia spectrum disorders (age 18-65) were recruited from six counties in Norway. Three counties were randomized to vocational rehabilitation augmented with cognitive behaviour therapy (CBT), while the remaining three counties were randomized to vocational rehabilitation augmented with cognitive remediation (CR). This paper compares the vocational activity of the total group of JUMP participants with a treatment as usual group (N = 341), and further examines differences between the two JUMP interventions. Employment status (working/not working) was registered at the time of inclusion and at the end of the intervention period. The total number of JUMP participants in any kind of vocational activity increased from 17 to 77% during the intervention. Of these, 8% had competitive employment, 36% had work placements in ordinary workplaces with social security benefits as their income, and 33% had sheltered work. The total number of working participants in the TAU group increased from 15.5 to 18.2%. The JUMP group showed significant improvements of positive (t = -2.33, p = 0.02) and general (t = -2.75, p = 0.007) symptoms of psychosis. Significant differences between the CBT and CR interventions were not demonstrated. The study supports existing evidence that the majority of persons with broad schizophrenia spectrum disorders can cope with some kind of work, given that internal and external barriers are reduced. Those who wish to work should be offered vocational rehabilitation. ClinicalTrials.gov Identifier: NCT01139502 . Registered on 6 February 2010.
C-C1-04: Building a Health Services Information Technology Research Environment
Gehrum, David W; Jones, JB; Romania, Gregory J; Young, David L; Lerch, Virginia R; Bruce, Christa A; Donkochik, Diane; Stewart, Walter F
2010-01-01
Background: The electronic health record (EHR) has opened a new era for health services research (HSR) where information technology (IT) is used to re-engineer care processes. While the EHR provides one means of advancing novel solutions, a promising strategy is to develop tools (e.g., online questionnaires, visual display tools, decision support) distinct from, but which interact with, the EHR. Development of such software tools outside the EHR offers an advantage in flexibility, sophistication, and ultimately in portability to other settings. However, institutional IT departments have an imperative to protect patient data and to standardize IT processes to ensure system-level security and support traditional business needs. Such imperatives usually present formidable process barriers to testing novel software solutions. We describe how, in collaboration with our IT department, we are creating an environment and a process that allows for routine and rapid testing of novel software solutions. Methods: We convened a working group consisting of IT and research personnel with expertise in information security, database design/management, web design, EHR programming, and health services research. The working group was tasked with developing a research IT environment to accomplish two objectives: maintain network/ data security and regulatory compliance; allow researchers working with external vendors to rapidly prototype and, in a clinical setting, test web-based tools. Results: Two parallel solutions, one focused on hardware, the second on oversight and management, were developed. First, we concluded that three separate, staged development environments were required to allow external vendor access for testing software and for transitioning software to be used in a clinic. In parallel, the extant oversight process for approving/managing access to internal/external personnel had to be altered to reflect the scope and scale of discrete research projects, as opposed to an enterpriselevel approach to IT management. Conclusions: Innovation in health services software development requires a flexible, scalable IT environment adapted to the unique objectives of a HSR software development model. In our experience, implementing the hardware solution is less challenging than the cultural change required to implement such a model and the modifications to administrative and oversight processes to sustain an environment for rapid product development and testing.
Smart Grid Information Clearinghouse (SGIC)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rahman, Saifur
Since the Energy Independence and Security Act of 2007 was enacted, there has been a large number of websites that discusses smart grid and relevant information, including those from government, academia, industry, private sector and regulatory. These websites collect information independently. Therefore, smart grid information was quite scattered and dispersed. The objective of this work was to develop, populate, manage and maintain the public Smart Grid Information Clearinghouse (SGIC) web portal. The information in the SGIC website is comprehensive that includes smart grid information, research & development, demonstration projects, technical standards, costs & benefit analyses, business cases, legislation, policy &more » regulation, and other information on lesson learned and best practices. The content in the SGIC website is logically grouped to allow easily browse, search and sort. In addition to providing the browse and search feature, the SGIC web portal also allow users to share their smart grid information with others though our online content submission platform. The Clearinghouse web portal, therefore, serves as the first stop shop for smart grid information that collects smart grid information in a non-bias, non-promotional manner and can provide a missing link from information sources to end users and better serve users’ needs. The web portal is available at www.sgiclearinghouse.org. This report summarizes the work performed during the course of the project (September 2009 – August 2014). Section 2.0 lists SGIC Advisory Committee and User Group members. Section 3.0 discusses SGIC information architecture and web-based database application functionalities. Section 4.0 summarizes SGIC features and functionalities, including its search, browse and sort capabilities, web portal social networking, online content submission platform and security measures implemented. Section 5.0 discusses SGIC web portal contents, including smart grid 101, smart grid projects, deployment experience (i.e., use cases, lessons learned, cost-benefit analyses and business cases), in-depth information (i.e., standards, technology, cyber security, legislation, education and training and demand response), as well as international information. Section 6.0 summarizes SGIC statistics from the launch of the portal on July 07, 2010 to August 31, 2014. Section 7.0 summarizes publicly available information as a result of this work.« less
Okeke, Sunday O.
2017-01-01
Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of... of current and accurate information concerning the securities of Data Fortress Systems Group Ltd...
Risholm Mothander, Pia; Furmark, Catarina; Neander, Kerstin
2018-06-01
This study presents effects of adding Circle of Security-Parenting (COS-P) to an already established comprehensive therapeutic model for early parent-child intervention in three Swedish infant mental health (IMH) clinics. Parents' internal representations and quality of parent-infant interaction were studied in a clinical sample comprised of 52 parent-infant dyads randomly allocated to two comparable groups. One group consisted of 28 dyads receiving treatment as usual (TAU) supplemented with COS-P in a small group format, and another group of 24 dyads receiving TAU only. Assessments were made at baseline (T1), 6 months after inclusion (T2) and 12 months after inclusion (T3). Changes over time were explored in 42 dyads. In the COS-P group, the proportion of balanced representations, as assessed with Working Model of the Child Interview (WMCI), significantly increased between T1 and T3. Further, the proportion of emotionally available interactions, as assessed with Emotional Availability scales (EA), significantly increased over time in the COS-P group. Improvements in the TAU-group were close to significant. Limitations of the study are mainly related to the small sample size. Strength is the real world character of the study, where COS-P was implemented in a clinical context not otherwise adapted to research. We conclude by discussing the value of supplementing TAU with COS-P in IMH treatment. © 2017 The Authors. Scandinavian Journal of Psychology published by Scandinavian Psychological Associations and John Wiley & Sons Ltd.
Corporate Lessons for the DoD - Secretary of Defense Corporate Fellows’ Perspective
2009-05-01
this could not be further from the truth . ―When you go through security at an airport, there is a group of people that check your carry-on luggage...their workforce. Johnson & Johnson’s hard -hitting motto Caring for the world…one person at a time™ is certainly a widely-held belief across the company...k)s, regardless of whether the employee contributes. 38 Working Mother cited the firm’s flextime, child care, and telecommuting options in naming
2008-01-01
such organizational configurations are high so are the consequences for failure. From decades of research on teams and team or group problem solving...TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Office of Naval Research ,One Liberty Center,875 North Randolph...Naval Postgraduate School Ross Pigeau (CAN), Defence Research and Development Canada (DRDC) Mink Spaans (NED), TNO Defence, Security and Safety About
2007-01-01
strategies (Lemack, 2006a). 9/11 Families for a Secure America (9/11 FSA), for instance, specifically seeks to make U.S. immigration policies more...while promoting the election of public office holders who support strict immigration policies. 9/11 FSA has also worked toward pushing for legisla...Victims of Terrorism a supporter of 9/11 FSA’s efforts, organized a Washington press conference for the group to dis- cuss illegal- immigration
1983-01-01
changes. Concurrently, CIA formed and AD HOC esting to step back and look at the U.S. security Intelligence Community Working Group to re...administrative error; to prevent embarrassment to expected damage will be. If you foresee the dam- a person, organization, or agency; to restrain com- age...the decision will be to classify the informa- petition; or to pTevent or delay the public release of tion. But note that in this thought process, you
A Theory of Conflict and Operational Art,
1988-05-09
4NXLFE 1 9 MAY 06 F/O 1516 ML I Ehhhflhflhhflflhhf llmommmmo son7 of h- % 400 .z % o I ~ iH~i cv) 4N 00 00< A Theory of Conflict and Operational Art byI...PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) A Theory of Conflict and Operational Art 12...SUB-GROUP conflict ideas linkage operational art theory levels of war low intensity conflict actions short of war 19. ABSTRACT (Continue on reverse
Resource Conservation and a Sustainable Las Vegas
DOE Office of Scientific and Technical Information (OSTI.GOV)
Piechota, Thomas C.
2014-05-15
This research project developed educational, research, and outreach activities that addressed the challenges of Las Vegas as related to a secure energy supply through conservation, clean and adequate water supply, economic growth and diversification, air quality, and the best use of land, and usable public places. This was part of the UNLV Urban Sustainability Initiative (USI) that responded to a community and state need where a unifying vision of sustainability was developed in a cost-effective manner that promoted formal working partnerships between government, community groups, and industry.
2008-03-01
and virtual elimination of vehicular emissions of pollutants and greenhouse gases. Low- cost, high-volume manufacturing processes and development...intended to help achieve energy security and virtually eliminate vehicular emissions of pollutants and greenhouse gases. This goal is being pursued...the coolant system, for example, and the humidification system must be integrated with the air blower. Construction of the power plant is usually
E PLURIBUS UNUM Homeland Security versus Homeland Defense Who Does What and to Whom
2010-04-01
112 APPENDIX IV: SWOT ANALYSIS ............................................................................. 113 APPENDIX V...violent extremism taking root here in the United States. We don‘t have the luxury of focusing our efforts on one group ; we must protect the country from... group that engages in an activity referred to in subparagraph (A). 12 The National Security Act of 1947 created the National Security Council
2011-05-05
groups emerge sporadic.ally. In patticular, the JMJB is widely perceived by the security and intelligent officials in Bangladesh to be the youth wing...organizations and protect others. According to National Security Intelligence sources, there are 20 to 33 Islamist ten·orist groups active in Bangladesh.29 Only...Additional Direction, National Security Intelligence , Bangladesh, broke down how the influx of charitable money is being used and misused in Bangladesh
Security Assessment Simulation Toolkit (SAST) Final Report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.
2009-11-15
The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSDmore » NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.« less
Who helps the leaders? Difficulties experienced by cancer support group leaders.
Kirsten, Laura; Butow, Phyllis; Price, Melanie; Hobbs, Kim; Sunquist, Kendra
2006-07-01
Cancer support groups are an important source of support for cancer patients, yet little is known about the challenges and training needs of both professionally trained and untrained leaders. The aim of this study was to discover the difficulties experienced and training desired by cancer support group leaders. Twenty-seven leaders of 34 cancer support groups participated in focus groups or individual interviews. Groups were purposively selected as representative of 173 support groups identified in New South Wales which were for adults with cancer and/or their adult carers and were not therapeutic or education-only groups. Difficulties identified included dealing with people's different communication styles and needs; dealing with recurrence, metastases and death; practical issues, including resources, setting the programme and funding security; maintaining personal balance and preventing burn out; establishing group credibility; dealing with group cycles; and leading groups in rural areas. Leaders also identified benefits and rewards from group leadership such as contributing to others' well-being, self-development and insight into others' lives. Non-professionally trained leaders experienced more difficulties, particularly in dealing with group process and practical issues. Difficulties identified were related both to working with a cancer population specifically and to working with groups in general. While some issues were common to both health professionals and non-health professionals, non-health professionals reported greater supportive needs. Clear guidelines, targeted training and development of better methods of support to reduce the stress and burn out experienced by group leaders are needed.
Yu, Rui-Feng; Yang, Lin-Dong; Wu, Xin
2017-05-01
This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue using structural equation modelling approach. Two hundred and five X-ray security screeners participated in a questionnaire survey. The result showed that satisfaction with the VDT's physical features and the work environment conditions were negatively correlated with the intensity of visual fatigue, whereas job stress and job burnout had direct positive influences. The path coefficient between the image quality of VDT and visual fatigue was not significant. The total effects of job burnout, job stress, the VDT's physical features and the work environment conditions on visual fatigue were 0.471, 0.469, -0.268 and -0.251 respectively. These findings indicated that both extrinsic factors relating to VDT and workplace environment and psychological factors including job burnout and job stress should be considered in the workplace design and work organisation of security screening tasks to reduce screeners' visual fatigue. Practitioner Summary: This study identified the risk factors influencing visual fatigue in baggage X-ray security screeners and estimated the strength of correlations between those factors and visual fatigue. The findings were of great importance to the workplace design and the work organisation of security screening tasks to reduce screeners' visual fatigue.
Securely implementing remote access within health information management.
Carroll, E T; Wright, S; Zakoworotny, C
1998-03-01
As technology changes, our definition of the workplace expands, and we no longer are limited to working at our desk in an office. The authors describe technologies that enable us to work from home or on the road and examine security regulations and precautions.
48 CFR 3036.570 - Special precautions for work at operating airports.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Special precautions for work at operating airports. 3036.570 Section 3036.570 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY ACQUISITION REGULATION (HSAR) SPECIAL CATEGORIES OF...
Personal Epistemologies and Older Workers
ERIC Educational Resources Information Center
Billett, Stephen; van Woerkom, Marianne
2008-01-01
This paper evaluates the need and prospects for older workers to develop and deploy effective and critical personal epistemologies in order to maintain workplace competence, successfully negotiate work transitions and secure ontological security in their working life. Furthermore, it addresses different ways of reflecting by workers, which types…
Baeriswyl, Sophie; Krause, Andreas; Schwaninger, Adrian
2016-01-01
The growing threat of terrorism has increased the importance of aviation security and the work of airport security officers (screeners). Nonetheless, airport security research has yet to focus on emotional exhaustion and job satisfaction as major determinants of screeners' job performance. The present study bridges this research gap by applying the job demands-resources (JD-R) model and using work-family conflict (WFC) as an intervening variable to study relationships between work characteristics (workload and supervisor support), emotional exhaustion, and job satisfaction in 1,127 screeners at a European airport. Results of structural equation modeling revealed that (a) supervisor support as a major job resource predicted job satisfaction among screeners; (b) workload as a major job demand predicted their emotional exhaustion; and (c) WFC proved to be a promising extension to the JD-R model that partially mediated the impact of supervisor support and workload on job satisfaction and emotional exhaustion. Theoretical and practical implications are discussed.
Blanquer, Ignacio; Hernandez, Vicente; Segrelles, Damià; Torres, Erik
2007-01-01
Today most European healthcare centers use the digital format for their databases of images. TRENCADIS is a software architecture comprising a set of services as a solution for interconnecting, managing and sharing selected parts of medical DICOM data for the development of training and decision support tools. The organization of the distributed information in virtual repositories is based on semantic criteria. Different groups of researchers could organize themselves to propose a Virtual Organization (VO). These VOs will be interested in specific target areas, and will share information concerning each area. Although the private part of the information to be shared will be removed, special considerations will be taken into account to avoid the access by non-authorized users. This paper describes the security model implemented as part of TRENCADIS. The paper is organized as follows. First introduces the problem and presents our motivations. Section 1 defines the objectives. Section 2 presents an overview of the existing proposals per objective. Section 3 outlines the overall architecture. Section 4 describes how TRENCADIS is architected to realize the security goals discussed in the previous sections. The different security services and components of the infrastructure are briefly explained, as well as the exposed interfaces. Finally, Section 5 concludes and gives some remarks on our future work.
ERIC Educational Resources Information Center
Comp, David J.
2013-01-01
The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…
A Secure Multicast Framework in Large and High-Mobility Network Groups
NASA Astrophysics Data System (ADS)
Lee, Jung-San; Chang, Chin-Chen
With the widespread use of Internet applications such as Teleconference, Pay-TV, Collaborate tasks, and Message services, how to construct and distribute the group session key to all group members securely is becoming and more important. Instead of adopting the point-to-point packet delivery, these emerging applications are based upon the mechanism of multicast communication, which allows the group member to communicate with multi-party efficiently. There are two main issues in the mechanism of multicast communication: Key Distribution and Scalability. The first issue is how to distribute the group session key to all group members securely. The second one is how to maintain the high performance in large network groups. Group members in conventional multicast systems have to keep numerous secret keys in databases, which makes it very inconvenient for them. Furthermore, in case that a member joins or leaves the communication group, many involved participants have to change their own secret keys to preserve the forward secrecy and the backward secrecy. We consequently propose a novel version for providing secure multicast communication in large network groups. Our proposed framework not only preserves the forward secrecy and the backward secrecy but also possesses better performance than existing alternatives. Specifically, simulation results demonstrate that our scheme is suitable for high-mobility environments.
Guidelines for Working with Law Enforcement Agencies
ERIC Educational Resources Information Center
Corn, Michael
2007-01-01
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Code of Federal Regulations, 2011 CFR
2011-04-01
... registrations and offerings, net change in corporate securities outstanding, working capital of U.S... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Appendix C-Rules and... Securities Exchanges SECURITIES AND EXCHANGE COMMISSION ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND...
Securing medical research: a cybersecurity point of view.
Schneier, Bruce
2012-06-22
The problem of securing biological research data is a difficult and complicated one. Our ability to secure data on computers is not robust enough to ensure the security of existing data sets. Lessons from cryptography illustrate that neither secrecy measures, such as deleting technical details, nor national solutions, such as export controls, will work.
Farrimond, Hannah; Boyd, Katharine; Fleischer, Dreolin
2018-06-01
In a culture of preloading and late-night licenses, alcohol-related violence remains a persistent problem for police and public health. Understood as a ritualized 'micro-social' interaction (Collins 2009a, 2009b), entry into bars and clubs is a particular flashpoint for violence between bouncers/door staff and customers. A police-led initiative to deter excessive drunkenness and preloading using hand-held breathalysers (the #RU2Drunk scheme) was investigated from the perspective of security and bar staff using the devices. Interviews (n = 18 + 12), a focus group with security staff (n = 22) and a focus group with a security company (n = 3) were conducted in two seaside towns in the South-West of England, UK. A qualitative thematic analysis was conducted. Door staff emphasised the normality of 'determined drunkenness' and associated violence in their working lives. Breathalyser use appeared to disrupt the 'ritual' of the violent encounter by reconfiguring it into an interaction between customer and technology. This depersonalized the judgement about who was 'too drunk' to enter the venue, with the more discretionary nature of who to breathalyse hidden from customers. Other door staff found it less useful and saw it as a challenge to their authority and expertise. At a managerial level there was concern about the transfer of responsibility for policing the night time economy (NTE). There is potential to reconfigure the violent encounter for door staff using breathalyser devices. However, this is more likely to succeed where other structural limits (e.g. restrictions on late licenses) are in place, and as part of wider policy initiatives to reconfigure the alcohol-saturated NTE leisure scene. Copyright © 2018 Elsevier B.V. All rights reserved.
Delavande, Adeline; Rohwedder, Susann
2017-12-01
We investigate how individuals in the U.S. expect to adjust their labor force participation and savings if Social Security benefits were cut by 30 percent. Respondents were asked directly what they would do under this scenario. Using the resulting stated choice data we find that respondents would on average reduce spending by 18.2 percent before retirement and 20.4 percent after retirement. About 34.1% of respondents state they would definitely work longer and they would postpone claiming Social Security by 1.1 years. We investigate how working longer and claiming Social Security later would compensate partially for the loss in benefits among the individuals who are currently working, under the assumption that individuals retire and claim at the same time. Individuals would increase their Social Security benefits from the post-reform level due to additional earnings entering the benefit calculation and a smaller early claiming penalty (or higher delayed claiming credit). As a result, the Social Security benefit people would receive would drop on average by 21 rather than 30 percent. Still, the net financial loss, even after accounting for additional earnings, is sizeable for individuals in the lowest wealth tertile.
Cheating in OSCEs: The Impact of Simulated Security Breaches on OSCE Performance.
Gotzmann, Andrea; De Champlain, André; Homayra, Fahmida; Fotheringham, Alexa; de Vries, Ingrid; Forgie, Melissa; Pugh, Debra
2017-01-01
Construct: Valid score interpretation is important for constructs in performance assessments such as objective structured clinical examinations (OSCEs). An OSCE is a type of performance assessment in which a series of standardized patients interact with the student or candidate who is scored by either the standardized patient or a physician examiner. In high-stakes examinations, test security is an important issue. Students accessing unauthorized test materials can create an unfair advantage and lead to examination scores that do not reflect students' true ability level. The purpose of this study was to assess the impact of various simulated security breaches on OSCE scores. Seventy-six 3rd-year medical students participated in an 8-station OSCE and were randomized to either a control group or to 1 of 2 experimental conditions simulating test security breaches: station topic (i.e., providing a list of station topics prior to the examination) or egregious security breach (i.e., providing detailed content information prior to the examination). Overall total scores were compared for the 3 groups using both a one-way between-subjects analysis of variance and a repeated measure analysis of variance to compare the checklist, rating scales, and oral question subscores across the three conditions. Overall total scores were highest for the egregious security breach condition (81.8%), followed by the station topic condition (73.6%), and they were lowest for the control group (67.4%). This trend was also found with checklist subscores only (79.1%, 64.9%, and 60.3%, respectively for the security breach, station topic, and control conditions). Rating scale subscores were higher for both the station topic and egregious security breach conditions compared to the control group (82.6%, 83.1%, and 77.6%, respectively). Oral question subscores were significantly higher for the egregious security breach condition (88.8%) followed by the station topic condition (64.3%), and they were the lowest for the control group (48.6%). This simulation of different OSCE security breaches demonstrated that student performance is greatly advantaged by having prior access to test materials. This has important implications for medical educators as they develop policies and procedures regarding the safeguarding and reuse of test content.
Attachment, self-worth, and peer-group functioning in middle childhood.
Booth-Laforce, Cathryn; Oh, Wonjung; Kim, Angel Hayoung; Rubin, Kenneth H; Rose-Krasnor, Linda; Burgess, Kim
2006-12-01
We evaluated links between peer-group functioning and indicators of attachment security in relation to both mother and father in middle childhood, among 73 10-year-olds (37 girls). Children's perceptions of security with both parents, coping styles with mother, and self-worth were assessed. Classmates, teachers, and mothers evaluated the participants' peer-related behavioral characteristics. Children's perceptions of security to both parents were related to others' appraisals of their social competence; perceptions of security to father were related to lower aggression. We did not find child gender effects, but children had higher security scores in relation to mother than to father. Self-worth perceptions mediated the relation between attachment and social competence.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Dialpoint Communications Corp., Pacel Corp., Quantum Group, Inc. (The), and Tradequest International, Inc.; Order of Suspension of Trading September 8... securities of Quantum Group, Inc. (The) because it has not filed any periodic reports since the period ended...
Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte
2013-01-01
Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS.
Brännström, M; Festbaum, G; Frille, D
1981-01-01
Demographic and social-economic trends are tightly linked together, the social-economic being the determinates of this trend. For that aim the direct pecuniary living conditions are analyzed more thoroughly than usual by means of a special demographic group. Now as before the mode of action and the accuracy of aim of social-politic measures are unclear. The downward trend of the degree of pensioner's employment is discussed in connection to concretly existing material living conditions with regard to better social security payment. Recommendations are given for elderly working people from the side of work hygiene, which will be planned and realized in our process of development.
Authentic leadership, group cohesion and group identification in security and emergency teams.
García-Guiu López, Carlos; Molero Alonso, Fernando; Moya Morales, Miguel; Moriano León, Juan Antonio
2015-01-01
Authentic leadership (AL) is a kind of leadership that inspires and promotes positive psychological capacities, underlining the moral and ethical component of behavior. The proposed investigation studies the relations among AL, cohesion, and group identification in security and emergency teams. A cross-sectional research design was conducted in which participated 221 members from 26 fire departments and operative teams from the local police of three Spanish provinces. The following questionnaires were administered: Authentic Leadership (ALQ), Group Cohesion (GEQ), and Mael and Ashford's Group Identification Questionnaire. A direct and positive relation was found between AL, cohesion, and group identification. An indirect relation was also found between AL and group cohesion through group identification, indicating the existence of partial mediation. The utility of the proposed model based on AL is considered; this model can be employed by those in charge of the fire departments and operative groups in organizations to improve workteams' cohesion. Both AL and group identification help to explain group cohesion in organizations committed to security and emergencies.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
Code of Federal Regulations, 2014 CFR
2014-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
Code of Federal Regulations, 2012 CFR
2012-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
Code of Federal Regulations, 2013 CFR
2013-01-01
... Administrative Personnel DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM (DEPARTMENT OF HOMELAND SECURITY-OFFICE OF PERSONNEL MANAGEMENT) DEPARTMENT OF HOMELAND SECURITY HUMAN RESOURCES MANAGEMENT SYSTEM Classification General § 9701.204 Definitions. In this subpart: Band means a work level or...
Castillo, Encarnación; López-Ramos, Juan A.; Morales, Diego P.
2018-01-01
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature. PMID:29337921
Parrilla, Luis; Castillo, Encarnación; López-Ramos, Juan A; Álvarez-Bermejo, José A; García, Antonio; Morales, Diego P
2018-01-16
Security is a critical challenge for the effective expansion of all new emerging applications in the Internet of Things paradigm. Therefore, it is necessary to define and implement different mechanisms for guaranteeing security and privacy of data interchanged within the multiple wireless sensor networks being part of the Internet of Things. However, in this context, low power and low area are required, limiting the resources available for security and thus hindering the implementation of adequate security protocols. Group keys can save resources and communications bandwidth, but should be combined with public key cryptography to be really secure. In this paper, a compact and unified co-processor for enabling Elliptic Curve Cryptography along to Advanced Encryption Standard with low area requirements and Group-Key support is presented. The designed co-processor allows securing wireless sensor networks with independence of the communications protocols used. With an area occupancy of only 2101 LUTs over Spartan 6 devices from Xilinx, it requires 15% less area while achieving near 490% better performance when compared to cryptoprocessors with similar features in the literature.
Health Of Americans Who Must Work Longer To Reach Social Security Retirement Age.
Choi, HwaJung; Schoeni, Robert F
2017-10-01
To receive full Social Security benefits, Americans born after 1937 must claim those benefits at an older age than earlier birth cohorts. Additionally, proposals to improve the fiscal position of Social Security typically include increasing the age at which workers can receive full benefits. Birth cohorts required to work longer are in worse health at ages 49-60, based on multiple measures of morbidity, than cohorts who could retire earlier. Project HOPE—The People-to-People Health Foundation, Inc.
Esperanza Menchaca, Alicia D. M.; Sami, Areej; Blake, Natalie
2013-01-01
Abstract Background Social media may have the potential to enhance weight management efforts. However, the acceptability of incorporating this entity into pediatrics is unknown. The objective of this project was to explore patients' and parents' perspectives about developing a Facebook group as a component of a pediatric weight management program. Methods Semistructured interviews were performed between September, 2011, and February, 2012, with patients and parents in a multidisciplinary weight management program. Interviews explored participants' perceptions of potential benefits, concerns, and preferences related to a program-specific Facebook group. Transcripts were reviewed and themes identified. The study concluded when thematic saturation was achieved. Results Participants (n=32) were largely enthusiastic about the idea of a program-specific Facebook group for adolescents. Most preferred a secret group, where only participants would know of the group's existence or group members' identity. No parents expressed concern about security or privacy related to a program-specific Facebook group; one parent expressed concern about undesirable advertisements. Participants endorsed a variety of ideas for inclusion on the page, including weight loss tips, live chats with providers, quizzes, and an incentive system where participants could gain points for making healthy choices. Many parents requested a separate parent-focused page, an idea that was supported by the adolescents. Conclusions This study suggests that participants perceive potential benefits from incorporating social media interventions into pediatric weight management efforts. Privacy and security issues do not appear to be major parental concerns. Future work should explore the impact of program-specific social media interventions on outcomes for patients in weight management programs. PMID:23869854
20 CFR 404.1004 - What work is covered as employment?
Code of Federal Regulations, 2010 CFR
2010-04-01
... Section 404.1004 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND... employer is covered as employment under social security if one of the following situations applies: (1) You... resident of the United States working for— (i) An American employer; or (ii) A foreign affiliate of an...
77 FR 26564 - Advisory Committee on Commercial Operations of Customs and Border Protection (COAC)
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
... National Strategy for Global Supply Chain Security. The work of the Trade Facilitation Subcommittee... Strategy for Global Supply Chain Security as it relates to the Committee's effort to solicit, consolidate... chain management project. The Anti-Dumping/Countervailing Duties Subcommittee work on educational...
Social Security, retirement incentives, and retirement behavior: an international perspective.
Gruber, J; Wise, D
1999-05-01
Escalating rates of early retirement are imposing fiscal pressure on retirement systems around the world. In some developed countries, the labor-force participation rates of men ages 60-64 have fallen by 75 percent over the last three decades. One explanation for this striking decline is social security program provisions which create disincentives to continued labor-force participation by older workers. There are substantial differences among developed nations in the labor-force participation of older workers. While two-thirds of 60-year-old American males are working, only one-quarter of men that age are working in Belgium. Over the entire 55-65 age range, 63 percent of American males are working, compared with only 40 percent of French males and 33 percent of Belgians males. There is strong evidence that the early retirement provisions of social security systems in developed countries determine the modal age of retirement. There is a strong relationship between early retirement ages and labor-force withdrawal rates; for example, in France, 60 percent of those working at the early entitlement age of 60 leave the labor force at that age. The core of this analysis is the construction of "implicit tax/subsidy rates" on additional work at older ages through each nation's social security system. These rates measure the change in a worker's retirement wealth entitlement from delaying retirement for one year, relative to the amount that would have been earned over that year. The U.S. Social Security system has an actuarial adjustment for delayed benefits claiming and other features that avoid financial incentives to leave the labor force at age 62 for a married worker, there is a slight disincentive to work for single workers and high wage earners. However, at ages 65 and older there is a stronger incentive to leave the labor force, with implicit tax rates on work of 19 percent for married workers and 33 percent for single workers. By comparison, other nations do not have actuarially fair adjustments, and as a result impose substantial taxes on additional work at older ages. In several countries, implicit tax rates on work at older ages approach or exceed 100 percent. This is because by delaying retirement, workers forgo benefits which often replace close to their full wage, in addition to having to pay the high payroll taxes required to finance generous social security benefits. There is a striking correlation across nations between high implicit tax rates on additional work and low labor-force participation rates among older workers. This suggests that social security program incentives are an important determinant of retirement. These findings have important policy implications for reforming social security programs in the United States and abroad. Policymakers must consider how program reforms will affect incentives for continued work at older ages.
Ways to Improve DoD 8570 IY Security Certification
ERIC Educational Resources Information Center
Bates, Justin D.
2017-01-01
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
Fernando, Sumadhya Deepika; Rodrigo, Chaturaka; de Silva, Nipun; Semege, Saveen; Rajapakse, Senaka; Samaranayake, Nilakashi; Senenayake, Sanath; Premaratne, Risintha Gayan
2014-09-01
The security forces are a high risk group for malaria transmission in Sri Lanka. Interrupting transmission and maintaining surveillance in this group is an important component of elimination efforts. The objective of the study was to develop a prototype educational programme on malaria for security forces serving in endemic areas. An interactive seminar was designed to deliver the required knowledge. The content was on current status, transmission, signs and symptoms and the role of security personnel in identification and prevention of malaria. Each seminar was preceded by a pre-test and followed by a post test to assess the improvement of knowledge. Fifty seminars were held in eight districts over 2 months with 2301 security forces personnel participating. Pre seminar knowledge on malaria was significantly better in the medical corps, those who had completed secondary education and in the Army compared to other security forces (p<0.001). Participation in the seminar resulted in an improvement in all domains tested as shown by test scores in post seminar assessment (p<0.001). Conducting a formal educational programme is an effective strategy to improve awareness on malaria amongst security forces personnel who are a high risk group for re-introduction of malaria into the country. © The Author 2014. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Walk the Talk: Progress in Building a Supply Chain Security Culture
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hund, Gretchen
Pacific Northwest National Laboratory (PNNL) has engaged industry to “go beyond compliance” for over a decade in controlling and securing their supply chains to ensure their goods are not diverted to nuclear weapons programs. This work has focused on dual-use industries that manufacture products that can be used in both commercial applications and in the development of a nuclear weapon. The team encourages industry to self-regulate to reduce proliferation risks. As part of that work, PNNL interviewed numerous companies about their compliance practices to understand their business and to build awareness around best practices to ensure security of goods, technology,more » and information along their supply chains. From conducting this work, PNNL identified indicators that a company can adopt as part of its commitment to nonproliferation ideals with a focus on supply chain security.« less
Agent of opportunity risk mitigation: people, engineering, and security efficacy.
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
2010-12-01
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.
Privacy-Preserving and Secure Sharing of PHR in the Cloud.
Zhang, Leyou; Wu, Qing; Mu, Yi; Zhang, Jingxia
2016-12-01
As a new summarized record of an individual's medical data and information, Personal Health Record (PHR) can be accessible online. The owner can control fully his/her PHR files to be shared with different users such as doctors, clinic agents, and friends. However, in an open network environment like in the Cloud, these sensitive privacy information may be gotten by those unauthorized parties and users. In this paper, we consider how to achieve PHR data confidentiality and provide fine-grained access control of PHR files in the public Cloud based on Attribute Based Encryption(ABE). Differing from previous works, we also consider the privacy preserving of the receivers since the attributes of the receivers relate to their identity or medical information, which would make some sensitive data exposed to third services. Anonymous ABE(AABE) not only enforces the security of PHR of the owners but also preserves the privacy of the receivers. But a normal AABE with a single private key generation(PKG) center may not match a PHR system in the hierarchical architecture. Therefore, we discuss not only the construction of the PHR sharing system base on AABE but also how to construct the PHR sharing system based on the hierarchical AABE. The proposed schemes(especially based on hierarchical AABE) have many advantages over the available such as short public keys, constant-size private keys, which overcome the weaknesses in the existing works. In the standard model, the introduced schemes achieve compact security in the prime order groups.
Women's Marginalization, Economic Flows, and Environmental Flows: A Classroom Approach.
ERIC Educational Resources Information Center
O'Lear, Shannon
1999-01-01
Discusses environmental security, focusing on the meaning of "security." Defines the global economy as a process in which the security of groups is sought, maintained, or threatened. Illustrates connections among environmental security, the global economy, and abuse of women and children in less economically developed places,…
Exploring Factors That Affect Adoption of Computer Security Practices among College Students
ERIC Educational Resources Information Center
Alqarni, Amani
2017-01-01
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Job-related motivational factors among Malaysian employees.
Manshor, Amat Taap; Abdullah, Adilah
2002-12-01
This study identified job-related motivational factors among Malaysian employees in several telecommunication companies. Responses were obtained from 1,179 employees at all levels up to senior managers and six different functional divisions, sales and marketing, human resources, finance, technical, information, technology, and support division. All employees were asked to rate the importance of Kovach's 10 job-motivational factors. These factors were good wages, job security, opportunity for career growth in the organization, good working conditions, interesting work, company loyalty to employees, tactful discipline, full appreciation of work done, sympathetic help with personal problems, and feeling of being involved in the organization. The top five factors employees identified as motivating them in their jobs were good wages, job security, company loyalty to employees, good working conditions, and full appreciation for work done. Findings were in accordance with Kovach for U.S. employees, in which the top motivational factors were good wages and job security.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-15
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] ROK Entertainment Group, Inc., RussOil Corp., Tricell, Inc., Tunex International, Inc. (n/k/a Aone Dental International Group, Inc.), and Wireless Age... there is a lack of current and accurate information concerning the securities of Wireless Age...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-11
... intermodal container loaded with eyes crosswise, grouped in rows, in which the coils are loaded to contact... cargo securement regulations for the transportation of groups of metal coils with eyes crosswise, as... cargo securement regulations (then at 49 CFR 393.100(c)) for the transportation of groups of metal coils...
Analysis of Vehicle-Based Security Operations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carter, Jason M; Paul, Nate R
Vehicle-to-vehicle (V2V) communications promises to increase roadway safety by providing each vehicle with 360 degree situational awareness of other vehicles in proximity, and by complementing onboard sensors such as radar or camera in detecting imminent crash scenarios. In the United States, approximately three hundred million automobiles could participate in a fully deployed V2V system if Dedicated Short-Range Communication (DSRC) device use becomes mandatory. The system s reliance on continuous communication, however, provides a potential means for unscrupulous persons to transmit false data in an attempt to cause crashes, create traffic congestion, or simply render the system useless. V2V communications mustmore » be highly scalable while retaining robust security and privacy preserving features to meet the intra-vehicle and vehicle-to-infrastructure communication requirements for a growing vehicle population. Oakridge National Research Laboratory is investigating a Vehicle-Based Security System (VBSS) to provide security and privacy for a fully deployed V2V and V2I system. In the VBSS an On-board Unit (OBU) generates short-term certificates and signs Basic Safety Messages (BSM) to preserve privacy and enhance security. This work outlines a potential VBSS structure and its operational concepts; it examines how a vehicle-based system might feasibly provide security and privacy, highlights remaining challenges, and explores potential mitigations to address those challenges. Certificate management alternatives that attempt to meet V2V security and privacy requirements have been examined previously by the research community including privacy-preserving group certificates, shared certificates, and functional encryption. Due to real-world operational constraints, adopting one of these approaches for VBSS V2V communication is difficult. Timely misbehavior detection and revocation are still open problems for any V2V system. We explore the alternative approaches that may be applicable to a VBSS, and suggest some additional research directions in order to find a practical solution that appropriately addresses security and privacy.« less
Information Security Pmp Report: August 23, 2013
NASA Astrophysics Data System (ADS)
Wegener, Henning
2014-07-01
I have to start this brief report with a rueful confession: the PMP did not manage over the last months to complete the work program it had ambitiously laid out in its report of last year. Due to unforeseen circumstances, mainly professional reasons of some long-term members, the Group lost a number of them as active participants, and as a consequence failed to maintain the critical mass required for successful work as a group. However, thanks to the vision and generosity of Professor Zichichi, we were given the opportunity to draw in a number of new high-level cybersecurity experts from a number of countries which not only broadened our collective expertise, but also enhanced geographical distribution. Commensurate with the global nature of cyber affairs, we are now ourselves more global. A panel discussion in this year's plenary on topical issues of cybersecurity under the title "Cybersecurity at the Crossroads: Are We Losing the Battle" allowed some of our new members to display their prowess and expertise. At the same time, we have attempted to weld this new revitalized team into an effective work unit...
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1984-04-13
AD-fl143 023 SEMIANNUAL REPORT TO CONGRESS ON THEUEFFECTIVENESS OF i/i THE CIVIL AVIATION SECURITY PROGRAM(U) FEDERAL AVIATION ADMINISTRATION...Semiannual Report to O Congress on the US Deportmnent of TrasEffectiveness ofi of TransportationFedewl Avkffim Avao The Civil Aviation - Security Program... Aviation Security Program 8. Performing OrgniaetioNi RePwt Us. Aviation Security Division 9. Performing Organistion Name and Address 10. Work Unit No
Ferrara, Pietro; Scancarello, Marta; Khazrai, Yeganeh M; Romani, Lorenza; Cutrona, Costanza; DE Gara, Laura; Bona, Gianni
2016-10-12
The nutritional status of foster children, the quality of daily menus in group homes and the Food Security inside these organizations have been poorly studied and this study means to investigate them. A sample of 125 children, ranging in age from 0-17 years, among seven group homes (group A) was compared with 121 children of the general population we (group B). To evaluate nutritional status, BMI percentiles were used. Mean percentiles of both groups were compared through statistical analysis. Both nutritional and caloric daily distributions in each organization were obtained using the 24-hour recall method. A specific questionnaire was administered to evaluate Food Security. From the analysis of mean BMI-for-age (or height-for-length) percentiles, did not observe statistically significant differences between group A and group B. The average daily nutrient and calorie distribution in group homes proves to be nearly optimal with the exception of a slight excess in proteins and a slight deficiency in PUFAs. Moreover, a low intake of iron and calcium was revealed. All organizations obtained a "High Food Security" profile. Nutritional conditions of foster children are no worse than that of children of the general population. Foster care provides the necessary conditions to support their growth.
20 CFR 416.1121 - Types of unearned income.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...
76 FR 81956 - National Infrastructure Advisory Council
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-29
... through the Secretary of Homeland Security with advice on the security of the critical infrastructure... critical infrastructure as directed by the President. At this meeting, the committee will receive work from... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0117] National Infrastructure Advisory...
20 CFR 416.1121 - Types of unearned income.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 416.1121 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED... to prior work or service. It includes, for example, private pensions, social security benefits... capital investments, such as stocks, bonds, or savings accounts. Royalties are compensation paid to the...
Calvo, Vincenzo; Palmieri, Arianna; Marinelli, Sara; Bianco, Francesca; Kleinbub, Johann R
2014-01-01
Security of attachment is described as an inner resource that may also facilitate the adaptation of individuals during critical life adversity, even when facing end-stage illness and death. This study assessed the relation between attachment styles, patient-caregiver reciprocal empathy, and patient-physician working alliance, in the terminal phase of an oncological disease. We hypothesized that the attachment security of patients, as measured by the Relationship Questionnaire (RQ), is related to the reciprocal empathy with the caregiver, as measured by the Perception of Partner Empathy (PPE) questionnaire, and to the working alliance with the physician, as measured by the Working Alliance Inventory-Short Form (WAI-S). Thirty-seven end-stage cancer patients, their caregivers, and physicians participated in the study. The PPE and WAI-S were administered twice: immediately after the hospice recovery and a week later. Results showed a significant improvement in patient-caregiver empathy and in patient-physician alliance after a week at the hospice. Findings indicated that the patients' attachment style influenced their perception of reciprocal empathy with the caregiver and the working alliance with the physician. Patients with a secure attachment had a greater capacity to show empathic closeness with their caregivers and enjoyed a better working alliance with their physicians. Caregivers' attachment security, otherwise, did not show the same influence on empathy and alliance. Findings support the hypothesis that patients' attachment security plays a crucial role in the relation with their own caregiver and with the physician, even at the terminal phase. Theoretical and clinical implications of these findings are explored in the discussion.
"Something good can grow here": chicago urban agriculture food projects.
Hatchett, Lena; Brown, Loretta; Hopkins, Joan; Larsen, Kelly; Fournier, Eliza
2015-01-01
Food security is a challenge facing many African-American low-income communities nationally. Community and university partners have established urban agriculture programs to improve access to high quality affordable fruits and vegetables by growing, distributing, and selling food in urban neighborhoods. While the challenge of food security is within communities of color, few studies have described these urban agriculture programs and documented their impact on the crew members who work in the programs and live in the low-income communities. More information is needed on the program impact for crew and community health promotion. Using a survey and focus group discussion from the crew and staff we describe the program and activities of four Chicago Urban Agriculture programs. We summarized the impact these programs have on crew members' perception of urban agriculture, health habits, community engagement, and community health promotion in low-income African-American neighborhoods.
LLNL/LANS mission committee meeting
DOE Office of Scientific and Technical Information (OSTI.GOV)
Burns, Michael J
2010-12-06
Recent events continue to show the national security imperative of the global security mission: (1) Fighting Proliferation - (a) At Yongbyon, 'a modern, industrial-scale U-enrichment facility w/2000 centrifuges' seen Nov. 2010, (b) In Iran, fueling began at Bushehr while P5+1/lran talks delayed to Dec. 2010; (2) Continuing need to support the warfighter and IC - (a) tensions on the Korean peninsula, (b) primitative IEDs a challenge in Afghanistan, (c) cyber command, (d)another Georgian smuggling event; and (3) Countering terrorisms on US soil - (a) toner cartridge bomb, (b) times square bomb, (c) christmas tree bomb. Joint Technical Operations Team (JTOT)more » and Accident Response Group (ARG) elements deployed to two East Coast locations in November to work a multi-weapon scenario. LANL provided 70% of on-duty field and reconstitution teams for both Marble Challenge 11-01 and JD 11-01. There were a total of 14 deployments in FY10.« less
NASA Technical Reports Server (NTRS)
Fischer, Daniel; Aguilar-Sanchez, Ignacio; Saba, Bruno; Moury, Gilles; Biggerstaff, Craig; Bailey, Brandon; Weiss, Howard; Pilgram, Martin; Richter, Dorothea
2015-01-01
The protection of data transmitted over the space-link is an issue of growing importance also for civilian space missions. Through the Consultative Committee for Space Data Systems (CCSDS), space agencies have reacted to this need by specifying the Space Data-Link Layer Security (SDLS) protocol which provides confidentiality and integrity services for the CCSDS Telemetry (TM), Telecommand (TC) and Advanced Orbiting Services (AOS) space data-link protocols. This paper describes the approach of the CCSDS SDLS working group to specify and execute the necessary interoperability tests. It first details the individual SDLS implementations that have been produced by ESA, NASA, and CNES and then the overall architecture that allows the interoperability tests between them. The paper reports on the results of the interoperability tests and identifies relevant aspects for the evolution of the test environment.
Analyzing Cases of Resilience Success and Failure - A Research Study
2012-12-01
controls [NIST 2012, NIST 2008] ISO 27002 and ISO 27004 Guidelines for initiating, implementing, maintaining, and improving information security...Commission ( ISO /IEC). Information technology—Security techniques—Code of practice for information security management ( ISO /IEC 27002 :2005). ISO /IEC, 2005...security management system and controls or groups of controls [ ISO /IEC 2005, ISO /IEC 2009] CIS Security Metrics Outcome and practice metrics measuring
ERIC Educational Resources Information Center
Edwards, Keith
2015-01-01
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the…
Local Area Network (LAN) Compatibility Issues
1991-09-01
September, 1991 Thesis Advisor: Dr. Norman Schneidewind Approved for public release; distribution is unlimited 92 303s246 Unclassified SECURITY ...CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION 1 b. RESTRICTIVE MARKINGS unclassified 2a. SECURITY CLASSIFICATION...Work UiNt ACCeLUOn Number 11. TITLE (Include Security Classification) LOCAL AREA NETWORK (LAN) COMPATIBILITY ISSUES 12. PERSONAL AUTHOR(S) Rita V
Glossary: Defense Acquisition Acronyms and Terms. Revision 2
1987-07-01
Approved REPORT DOCUMENTATION PAGE OMBNo. 070-O 18 la. REPORT SECURITY CLASSIFICATION lb. RESTRICTIVE MARKINGS % unclassified 2a. SECURITY CLASSIFICATION ...WORK UNIT Fort Belvoir, VA 22060-5426 ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification ) Glossary Defense Acquisition...DISTRIBUTION/AVAILABILITY OF ABSTRACT 21 ABSTRACT SECURITY CLASSIFICATION [RUNCLASSIFIED/UNLIMITED 0 SAME AS RPT 0 DTIC USERS unclassified 22a. NAME OF
Code of Federal Regulations, 2010 CFR
2010-04-01
...' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950... was exempt from Social Security tax was also excluded. Certain other work for the United States or an... the Agriculture Marketing Service and the Commodity Stabilization Service, formerly the Production and...
20 CFR 411.120 - What is a ticket under the Ticket to Work program?
Code of Federal Regulations, 2010 CFR
2010-04-01
... program? 411.120 Section 411.120 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND... employment services, vocational rehabilitation services, and other support services to the beneficiary. (b... social security number, the letters “TW,” and a number (1, 2, etc.) in the last position signifying that...
Sandia National Laboratories: About Sandia: Leadership
Working With Sandia Working With Sandia Prospective Suppliers What Sandia Looks For In Our Suppliers What provides leadership and management direction for the safe, secure execution of all Sandia missions. View implement the Labs Director's strategic vision for safe, secure operations at Sandia. View full biography
ERIC Educational Resources Information Center
Ayers, David F.; Miller-Dyce, Cherrel; Carlone, David
2008-01-01
Researchers asked 17 participants in a job-training program to describe their personal struggles following an economic restructuring. Examined through a critical theoretical lens, findings indicate that the learners enrolled in the program to reclaim security, dignity, meaningful work, and caring relationships. Program planners at community…
Digital security technology simplified.
Scaglione, Bernard J
2007-01-01
Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.
Radioactive source security: the cultural challenges.
Englefield, Chris
2015-04-01
Radioactive source security is an essential part of radiation protection. Sources can be abandoned, lost or stolen. If they are stolen, they could be used to cause deliberate harm and the risks are varied and significant. There is a need for a global security protection system and enhanced capability to achieve this. The establishment of radioactive source security requires 'cultural exchanges'. These exchanges include collaboration between: radiation protection specialists and security specialists; the nuclear industry and users of radioactive sources; training providers and regulators/users. This collaboration will facilitate knowledge and experience exchange for the various stakeholder groups, beyond those already provided. This will promote best practice in both physical and information security and heighten security awareness generally. Only if all groups involved are prepared to open their minds to listen to and learn from, each other will a suitable global level of control be achieved. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.
A form of relapse prevention for men in a high security hospital.
Newton, Liam; Coles, Dawn; Quayle, Marie
2005-01-01
Marlatt and Gordon's relapse prevention model has evolved, and been applied to many repetitive problem behaviours, including drug use, gambling and sexual offending. High security hospital patients often present with a number of such behaviours. To evaluate a relapse prevention group in one high security hospital. Nine patients were selected on clinical need for the group. In a naturalistic study design, each completed several self-report questionnaires pre- and post-group. Analysis of group results demonstrated a significant increase in guilt and acceptance of responsibility for offences (GBAI ratings), and reduced endorsement of pro-offending thinking styles (PICTS). Movement towards increased empathy, and decreased impulsivity and venturesomeness, did not reach significance. All participants showed some changes in desired directions but effects were small. Both relapse prevention and its evaluation are limited in high security hospitals by the restricted opportunities for testing out new skills. The feasibility of delivering an RP programme and evaluating it in high security has nevertheless been established. The small effects found may be promising, and suggest both justification and need for a randomized controlled trial of this approach in that setting. Copyright (c) 2005 John Wiley & Sons, Ltd.
Alavi, Seyyed Salman; Alaghemandan, Hamed; Jannatifard, Fereshte
2013-01-01
Introduction: Medical universities are of those organizations that serve many individuals. As a result, the employees who work at medical universities should have adequate job qualifications and requisite conditions for work. Job security is one of these needed conditions. The current study aims to determine the main components of job security among the employees of Isfahan University of Medical Sciences (IUMS). Method and materials: The study had a cross-sectional design. The sample included 300 employees which were selected from the faculties of IUMS. The sample was recruited using quota sampling. First, demographic and Job security questionnaires were completed by each employee. Then, data was analyzed by descriptive methods and ANOVA in SPSS16. Results: The study results showed that there was no significant difference among five subscales of Job security questionnaire and as a result, job security among the employees of IUMS but there was a significant difference in job security among male and female employees and a significant difference in job security based on type of job contract. Discussion: Lower rate of job security among female employees with temporary job contracts has professional and psychological implication for both females and IUMS which should be considered in designing professional programs of IUMS. PMID:23687464
Mother-Child Attachment From Infancy to the Preschool Years: Predicting Security and Stability.
Meins, Elizabeth; Bureau, Jean-François; Fernyhough, Charles
2018-05-01
Relations between maternal mind-mindedness (appropriate and nonattuned mind-related comments), children's age-2 perspective-taking abilities, and attachment security at 44 (n = 165) and 51 (n = 128) months were investigated. Nonattuned comments predicted insecure preschool attachment, via insecure 15-month attachment security (44-month attachment) and poorer age-2 perspective-taking abilities (51-month attachment). With regard to attachment stability, higher perspective-taking abilities distinguished the stable secure groups from (a) the stable insecure groups and (b) children who changed from secure to insecure (at trend level). These effects were independent of child gender, stressful life events, and socioeconomic status (SES). The contribution of these findings to our understanding of stability and change in attachment security from infancy to the preschool years is discussed. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2013 CFR
2013-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2014 CFR
2014-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2011 CFR
2011-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2012 CFR
2012-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
20 CFR 416.966 - Work which exists in the national economy.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... 416.966 Section 416.966 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... unskilled, sedentary, light, and medium jobs exist in the national economy (in significant numbers either in... of the Census; (4) Occupational Analyses prepared for the Social Security Administration by various...
Barr, W; Brown, A; Quinn, B; McFarlane, J; McCabe, R; Whittington, R
2013-02-01
In the past decade UK government policy has been to develop alternative care for women detained in secure psychiatric hospital. This study evaluated the relative benefits of community-based step-down housing. Comparisons were made between female patients in community step-down housing and a control group in secure hospital who were on the waiting list for the houses. For each woman in the sample, a range of assessments was conducted on three separate occasions over a 12-month period. We noted a gradual improvement over time in women in both settings. However, by the final assessment psychological well-being and security needs were significantly better in the community group (P < 0.05). Although risks for violence and social functioning were also somewhat better in this group throughout the study, no statistically significant differences between the groups were found in these areas at any assessment time. This study has generated evidence in support of the further development of high-support step-down community housing for women in secure psychiatric care. This initiative may provide greater personal freedom and enhanced relational security for the women concerned while also facilitating improvements in their psychological well-being, with no increased risk to the women themselves or to the wider community. © 2012 Blackwell Publishing.
Isenhardt, Anna; Hostettler, Ueli
2016-12-01
Violence in the workplace has serious consequences for employees and organizations. Based on a survey in early 2012 among employees from all work areas of 89 of the total 112 correctional facilities in Switzerland resulting in a sample of 2,045 employees (response rate 48.5%), this study (a) analyzed whether victimization has an impact on correctional staff burnout, (b) tested the hypothetical mediating role of sense of security in the relationship between victimization and burnout, and (c) included gender and job characteristics because work experiences and exposure to violence of staff differ strongly with gender and work tasks. Two different forms of violence were considered: (a) experienced violence (inmates-on-staff) and (b) observed violence (inmate-on-inmate). Analysis was carried out using structural equation modeling. Results show that victimization and witnessing violence between inmates negatively affect the personal sense of security and increase correctional staff burnout. In addition, the sense of security mediated the effect from experienced and observed violence on burnout. Gender and job characteristics also proved to be important. This is especially true for staff working as correctional officers and for employees working with young inmates and with inmates awaiting trial who reported a greater exposure to violence and a lower sense of security. The study adds to the knowledge on violence and its outcomes in corrections and contributes to the literature on the consequences of workplace violence in general and, specifically, in social service occupations.
Reviewing and reforming policy in health enterprise information security
NASA Astrophysics Data System (ADS)
Sostrom, Kristen; Collmann, Jeff R.
2001-08-01
Health information management policies usually address the use of paper records with little or no mention of electronic health records. Information Technology (IT) policies often ignore the health care business needs and operational use of the information stored in its systems. Representatives from the Telemedicine & Advanced Technology Research Center, TRICARE and Offices of the Surgeon General of each Military Service, collectively referred to as the Policies, Procedures and Practices Work Group (P3WG), examined military policies and regulations relating to computer-based information systems and medical records management. Using a system of templates and matrices created for the purpose, P3WG identified gaps and discrepancies in DoD and service compliance with the proposed Health Insurance Portability and Accountability Act (HIPAA) Security Standard. P3WG represents an unprecedented attempt to coordinate policy review and revision across all military health services and the Office of Health Affairs. This method of policy reform can identify where changes need to be made to integrate health management policy and IT policy in to an organizational policy that will enable compliance with HIPAA standards. The process models how large enterprises may coordinate policy revision and reform across broad organizational and work domains.
Preserving Nuclear Grade Knowledge
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lange, Bob
2008-02-05
When people think of the government they think of the President, or Congress, or the Internal Revenue Service (IRS), but there are thousands of people in government-related jobs doing things most don’t really notice everyday. You can find them everywhere, from the space science folks at NASA, to the Federal Bureau of Investigations (FBI) watching out for the bad guys. There are Rangers, and Social Workers, Nurses and Agricultural Managers. They are people working to keep the many facets of the USA rolling. One very diverse bunch is The Department of Energy (DOE) , a group who is expanding themore » ways we make and save energy to power our cars, homes, and businesses. Tucked away under the DOE is the National Nuclear Security Administration, the NNSA is an agency that maintains the safety, security, and reliability of the U.S. nuclear weapons stockpile. It works to reduce global danger from weapons of mass destruction. It provides the U.S. Navy with safe nuclear propulsion, and it responds to nuclear and radiological emergencies in the United States and abroad, and it supports efforts in science and technology*. (* DOE/NNSA/KCP website info)« less
2018-01-01
BACKGROUND/OBJECTIVES This cross-sectional study assessed household food security status and determined its association with diet quality and weight status among indigenous women from the Mah Meri tribe in Peninsular Malaysia. SUBJECTS/METHODS The Radimer/Cornell Hunger and Food Insecurity Instrument and the Malaysian Healthy Eating Index (HEI) were used to assess household food security status and diet quality, respectively. Information on socio-demographic characteristics and 24-hour dietary recall data were collected through face-to-face interview, and anthropometric measurements including weight, height, and body mass index (BMI) were obtained from 222 women. RESULTS Majority of households (82.9%) experienced different levels of food insecurity: 29.3% household food insecurity, 23.4% individual food insecurity, and 30.2% fell into the child hunger group. The food-secure group had significantly fewer children and smaller household sizes than the food-insecure groups (P < 0.05). The mean household income, income per capita, and food expenditure significantly decreased as food insecurity worsened (P < 0.001). The food-secure group had significantly higher Malaysian HEI scores for grains and cereals (P < 0.01), as well as for meat, poultry, and eggs (P < 0.001), than the food-insecure groups. The child-hunger group had significantly higher fat (P < 0.05) and sodium (P < 0.001) scores than the food-secure and household food-insecure groups. Compared to the individual food-insecure and child-hunger groups, multivariate analysis of covariance showed that the food-secure group was significantly associated with a higher Malaysian HEI score while the household food-insecure group was significantly associated with a higher BMI after controlling for age (P < 0.025). CONCLUSIONS The majority of indigenous households faced food insecurity. Food insecurity at the individual and child levels was associated with lower quality of diet, while food insecurity at the household level was associated with higher body weight. Therefore, a substantial effort by all stakeholders is warranted to improve food insecurity among poorer households. The results suggest a pressing need for nutritional interventions to improve dietary intake among low income households. PMID:29629030
Pei, Chong Su; Appannah, Geeta; Sulaiman, Norhasmah
2018-04-01
This cross-sectional study assessed household food security status and determined its association with diet quality and weight status among indigenous women from the Mah Meri tribe in Peninsular Malaysia. The Radimer/Cornell Hunger and Food Insecurity Instrument and the Malaysian Healthy Eating Index (HEI) were used to assess household food security status and diet quality, respectively. Information on socio-demographic characteristics and 24-hour dietary recall data were collected through face-to-face interview, and anthropometric measurements including weight, height, and body mass index (BMI) were obtained from 222 women. Majority of households (82.9%) experienced different levels of food insecurity: 29.3% household food insecurity, 23.4% individual food insecurity, and 30.2% fell into the child hunger group. The food-secure group had significantly fewer children and smaller household sizes than the food-insecure groups ( P < 0.05). The mean household income, income per capita, and food expenditure significantly decreased as food insecurity worsened ( P < 0.001). The food-secure group had significantly higher Malaysian HEI scores for grains and cereals ( P < 0.01), as well as for meat, poultry, and eggs ( P < 0.001), than the food-insecure groups. The child-hunger group had significantly higher fat ( P < 0.05) and sodium ( P < 0.001) scores than the food-secure and household food-insecure groups. Compared to the individual food-insecure and child-hunger groups, multivariate analysis of covariance showed that the food-secure group was significantly associated with a higher Malaysian HEI score while the household food-insecure group was significantly associated with a higher BMI after controlling for age ( P < 0.025). The majority of indigenous households faced food insecurity. Food insecurity at the individual and child levels was associated with lower quality of diet, while food insecurity at the household level was associated with higher body weight. Therefore, a substantial effort by all stakeholders is warranted to improve food insecurity among poorer households. The results suggest a pressing need for nutritional interventions to improve dietary intake among low income households.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-21
... SECURITIES AND EXCHANGE COMMISSION In the Matter of Cape Systems Group, Inc., Caribbean Cigar...., File No. 500-1; Order of Suspension of Trading October 19, 2010. It appears to the Securities and... Cape Systems Group, Inc. because it has not filed any periodic reports since the period ended December...
Bode, Ingvild
2017-01-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted. PMID:29782586
Bode, Ingvild
2018-06-01
The United Nations Security Council passed its first resolution on children in armed conflict in 1999, making it one of the oldest examples of Security Council engagement with a thematic mandate and leading to the creation of a dedicated working group in 2005. Existing theoretical accounts of the Security Council cannot account for the developing substance of the children and armed conflict agenda as they are macro-oriented and focus exclusively on states. I argue that Security Council decision-making on thematic mandates is a productive process whose outcomes are created by and through practices of actors across the three United Nations: member states (the first United Nations), United Nations officials (the second United Nations) and non-governmental organizations (the third United Nations). In presenting a practice-based, micro-oriented analysis of the children and armed conflict agenda, the article aims to deliver on the empirical promise of practice theories in International Relations. I make two contributions to practice-based understandings: first, I argue that actors across the three United Nations engage in reflective practices of a strategic or tactical nature to manage, arrange or create space in Security Council decision-making. Portraying practices as reflective rather than as only based on tacit knowledge highlights how actors may creatively adapt their practices to social situations. Second, I argue that particular individuals from the three United Nations are more likely to become recognized as competent performers of practices because of their personality, understood as plural socialization experiences. This adds varied individual agency to practice theories that, despite their micro-level interests, have focused on how agency is relationally constituted.
1992-04-03
10. SOURCE OF FUNDING NUMBERS PROGRAM PROJECT TASK WORK UNIT ELEMENT NO. NO. NO. ACCESSION NO. 11. TITLE (Include Security Classification) ASEAN...region is a consequence of the stability, coordination and team work of ASEAN. With a reduction of U.S. forces presence in the area, the key to securing...fastest-growing regions in the world today. The stability in the region is a consequence of the stability, coordination and team work of ASEAN. With a
Secure electronic commerce communication system based on CA
NASA Astrophysics Data System (ADS)
Chen, Deyun; Zhang, Junfeng; Pei, Shujun
2001-07-01
In this paper, we introduce the situation of electronic commercial security, then we analyze the working process and security for SSL protocol. At last, we propose a secure electronic commerce communication system based on CA. The system provide secure services such as encryption, integer, peer authentication and non-repudiation for application layer communication software of browser clients' and web server. The system can implement automatic allocation and united management of key through setting up the CA in the network.
2007-09-11
clerics Abu Bakar Baasyir and Abdullah Sungkar, began demanding the establishment of sharia law in Indonesia. The two considered themselves the...the violent Abu Sayyaf Group. It has also launched a Regional Maritime Security Initiative to enhance security in the Straits of Malacca, increase...15 The Abu Sayyaf Group
Ross, Sue; Tang, Selphee; Schulz, Jane; Murphy, Magnus; Goncalves, Jose; Kaye, Stephen; Dederer, Lorel; Robert, Magali
2014-12-22
In 2006, Ethicon Inc. introduced a new minimally invasive single incision sling device for the surgical treatment of stress urinary incontinence, the Gynecare TVT Secur®. For device licensing, no new evidence of TVT Secur efficacy and safety was needed: rather evidence was provided of the long-term follow-up of patients who had a procedure using a predecate retropubic tension-free vaginal tape device. Before adopting TVT Secur into our routine clinical practice, we decided to evaluate it. The objective of our Canadian multi-centre pragmatic randomized controlled trial was to compare the effectiveness of the new single-incision device, TVT Secur, to the established TVT device, in terms of objective cure of stress urinary incontinence (SUI) at 12 months postoperatively. Other outcomes included: complications, symptoms, and incontinence-related quality of life. The sample size estimate for our trial was 300, but the trial stopped early because of poor recruitment. 74 women participated (40 allocated to TVT Secur, 34 to TVT). At 12 months postoperatively, 27/33(82%) of TVT Secur group were cured, compared with 25/28(89%) of the TVT group (relative risk 0.92, 95% confidence interval 0.75 to 1.13, p=0.49). Most women reported little or no SUI symptoms (35/37(95%) vs 29/30(97%), >0.999). Quality of life improved significantly from baseline for both groups (IIQ-7 mean change -25 for both groups) but did not differ between groups (p=0.880). Our small randomized trial did not find statistically significant differences in outcomes between women allocated to the TVT Secur device versus those allocated to the TVT device for stress urinary incontinence. Despite the discontinuation of TVT Secur in March 2013 for commercial reasons, the importance of our study lies in making evidence available for the many women who had a TVT Secur device implanted and their physicians who may be considering alternative treatments. Our experience illustrates the difficulty of undertaking research on new licensed devices in a rapidly changing surgical specialty, and further highlights the need for research before licensing if surgeons and their patients are to be confident in the effectiveness and safety of new surgical devices. ClinicalTrials.gov NCT00685217, 22 May 2008.
NASA Astrophysics Data System (ADS)
Abbasi, Milad; Monnazzam, Mohammad Reza; Zakerian, Sayedabbolfazl; Yousefzadeh, Arsalan
2015-04-01
Noise from wind turbines is one of the most important factors affecting the health, welfare, and human sleep. This research was carried out to study the effect of wind turbine noise on workers' sleep disorder. For this, Manjil Wind Farm, because of the greater number of staff and turbines than other wind farms in Iran, was chosen as case study. A total number of 53 participants took part in this survey. They were classified into three groups of mechanics, security, and official. In this study, daytime sleepiness data of workers were gathered using Epworth Sleepiness Scales (ESS) was used to determine the level of daytime sleepiness among the workers. The 8-h equivalent sound level (LAeq,8h) was measured to determine the individuals' exposure at each occupational group. Finally, the effect of sound, age, and workers' experience on individuals' sleep disorder was analyzed through multiple regression analysis in the R software. The results showed that there was a positive and significant relationship between age, workers' experience, equivalent sound level, and the level of sleep disorder. When age is constant, sleep disorder will increase by 26% as per each 1 dB increase in equivalent sound level. In situations where equivalent sound level is constant, an increase of 17% in sleep disorder is occurred as per each year of work experience. Because of the difference in sound exposure in different occupational groups. The effect of noise in repairing group was about 6.5 times of official group and also 3.4 times of the security group. Sleep disorder effect caused by wind turbine noise in the security group is almost two times more than the official group. Unlike most studies on wind turbine noise that address the sleep disorder among inhabitants nearby wind farms, this study, for the first time in the world, examines the impact of wind turbine noise on sleep disorder of workers who are more closer to wind turbines and exposed to higher levels of noise. So despite all the good benefits of wind turbines, it can be stated that this technology has health risks for all those exposed to its sound. However, further research is needed to confirm the results of this study.
Secure vendor environment (SVE) for PACS
NASA Astrophysics Data System (ADS)
Honeyman-Buck, Janice; Frost, Meryll
2005-04-01
A Secure Vendor Environment (SVE) was created to protect radiology modalities from network intrusion, worms, viruses, and other forms of damaging attacks. Many vendors do not attempt any form of network security and if an institution demands a non-standard and secure installation, a future system upgrade could and frequently does eliminate any security measures installed during the initial installation. The SVE isolates the vendor equipment behind a virtual firewall on a private network that is invisible to the outside world. All interactions must go though a device containing two network interface cards called an Application Processor that acts as a store-and forward router, performs DICOM repair, proxies modality worklist, and isolates the vendor modalities. A small VPN appliance can open the device temporarily for remote access by vendor engineers. Prior to the routine installation of the SVE, vendor equipment was often attacked by hostile network intruders and viruses or worms, sometimes rendering the equipment unusable until the vendor could reload the system. The resulted in considerable clinical downtime and loss of revenue. Since the relatively low cost SVE solution has routinely been installed with all new equipment, no intrusions have occurred, although our network sniffers and intrusion detectors indicate that we are constantly being scanned for vulnerability. Purpose: To provide a secure network for vendor equipment in a PACS environment while allowing vendor access for upgrades and system repairs. Method: The network administrators at our university believe that network security should be implemented at the machine level rather than relying on a firewall. A firewall solution could conceivably block unwanted intrusion from outside the university network, but would still allow literally thousands of potential network users to get through to the PACS network. All the PACS archive, display and routing systems are individually protected from intrusion, but vendors of image producing modalities such as CT, MRI, and CR typically do not protect their equipment from network intrusion. Most vendors use the same user-ids and passwords for their service and administrative accounts which makes it easy for them to get to their systems for remote repairs and upgrades, but also makes it easy for hackers and other unwelcome intruders to gain access. We use a device with two network interface cards to isolate the vendor network from the main PACS / university / hospital network. This device is a store and forward PACS routing device, a DICOM repair device, a modality worklist proxy device, and a de-facto firewall. This device is named an Application Processor (AP). In addition, a small virtual private network (VPN) device is placed on the system that can be controlled only by the PACS administration. If a vendor engineer needs remote access to upgrade or service the equipment, a temporary connection is enabled for only the computer the engineer is using at the time, then is closed when he/she has completed their work. Results: The secure vendor environment (SVE) consists of a computer and a VPN appliance and costs approximately 2,000 USD to build. With software, the total system costs approximately 2800 - $3500. The SVE is typically deployed as part of every equipment installation. Since the SVE has been used, we have had no intrusion and no downtime due to hackers, viruses, worms, etc. This is now a part of every project plan for equipment that will become part of the PACS. New work: The SVE is a unique and new work by our group, developed as a solution totally within our group. Conclusions: Our results have convinced our administration that this small cost to protect vendor equipment is well worth the investment. Prior to developing this solution, there were numerous occasions where intruders invaded our equipment and rendered it unusable until the software could be reloaded, sometimes resulting in the loss of a day or more of clinical use.
Narrative and attachment in the process of recovery from substance misuse.
Waters, Kathryn; Holttum, Sue; Perrin, Ines
2014-06-01
The aim of this study was to illustrate the individual accounts of a small group of substance misusers who had found psychological therapy helpful in their recovery from substance misuse. The study also aimed to highlight the roles that the psychologists played within these narratives. Narrative analysis, a qualitative design, was used to capture the unique recovery narratives of substance users who had received psychological therapy. Seven participants (three males and four females, age range 40-54 years, six White British, one White European) were recruited via clinical psychologists from an addictions psychology department and participated in 60-90 min interviews. Analysis of the recovery narratives resulted in an overarching theme; role of the psychologists as a secure attachment figure leading to the development of surrogate internal working models, and the following subthemes which developed and maintained the attachments: closeness and proximity leading to positive expectations about the relationship, safe haven leading to increasing capacities for affect regulation, secure base leading to the experience of being able to mentalize regarding ones mental states and associated actions, and separation distress leading to internalizing the psychologists. The study analysed the personal accounts of seven substance misusers regarding their use of psychological therapy in their recovery. The relationship between the therapists and the clients developed as a result of the psychologists serving as secure attachment figures, and providing closeness and proximity, a safe haven and a secure base to the clients. Clients' separation distress also led to the internalizing of the psychologists. Future studies are needed to tease out which substance user clients would most be suited to the above approach. Measures of newer more adaptive internal working models could then be applied to relationships outside of therapy to see in what way the newer, more flexible, and transferable IWMs were truly internalized and influential in the recovering minds of substance misusers. Clinical Psychologists can play a vital role in the recovery of substance misusers who are ready to work through their psychological recovery. Forming a positive therapeutic relationship is dependent on the psychologists fulfilling the role of positive attachment figures for the clients. © 2013 The British Psychological Society.
Jiménez Calvo, J; Hualde Alfaro, A; Raigoso Ortega, O; Cebrian Lostal, J L; Alvarez Bandres, S; Jiménez Parra, J; Montesino Semper, M; Santiago Gonzalez de Garibay, A
2008-01-01
The purpose of this publication is to describe the surgical technique, assess complications and short-term results of TVT secur and MiniArc tapes. From October 2006 to August 2007 it was carried out the surgical correction with TVT Secur,Women's Health & Urology, Ethicon, Johnson & Johnson, placing the tape as a hammock, to 51 patients, 38 of them with pure stress incontinence and 13 with mixed incontinence and with an average age of 57 years. From September 2007 to February 2008 41 patients, 33 of them with pure stress incontinence and 8 with mixed incontinence, with an average of age of 58 years were operated with AMS Miniarc swing system tape, posted on hammock. All procedures were performed with sedoanalgesia and Ambulatory Surgery regime. Patients were monitored in outpatient visits one month, 3 months and one year after surgical procedure. Medical history and questionnaire and ICIQ-SF, to which we added a question to quantify the degree of satisfaction, as well as physical examination, were done. We compared the results of both technical procedures and statistical survey was conducted by Student test. [Analysis with SPSS software (V14.0)]. The median follow-up in TVT secur group was 328 days (range 163-522 days) and 101 days (range 41-209 days) inthe MiniArc group. We only had one (TVT secur group) surgical complication in all the series (92 patients) being a bladder perforation. Taking into account that we read a negative test effort as an objective cure in the TVT secur group, 80.4% patients are cured and 90.2% inthe MiniArc group without significant difference between both groups (p 0095). To assess the subjective healing we utilized the ICIQ-SF test and the satisfaction extra-question and we noted that there is no significant difference between the first and third month controls. (90% of patients satisfied). 80% of patients were completely satisfied in the first year control that was only performed to TVT secur group. These new tapes show fewer complications that the TVT-O and TOT tapes and allow the possibility of placement with local anesthesia but further studies are needed.
Practice environment as perceived by nurses in acute care hospitals in Sharjah and North Emirates.
Al-Maaitah, Rowaida; AbuAlRub, Raeda F; Al Blooshi, Sumaya
2018-04-01
To explore nurses' perceptions of their practice environment in acute care hospitals in Sharjah and North Emirates in the United Arab Emirates (UAE). The health of the environment in which registered nurses' work is critical to nursing outcomes. The interest to examine the practice environment extended to the Gulf area which has a complex healthcare system including the UAE. The study used an exploratory descriptive design with a qualitative part using two focus group interviews. The sample size was 450 nurses selected through a random sampling method. A self-administered questionnaire including the Practice Environment Scale of Nursing Work Index (PES-NWI) was used. In addition, semi-structured interviews for two focus groups were done. The results showed that UAE practicing nurses reported favorable perceptions of most aspects of their practice environment. Unfavorable perceptions were only reported for Staffing and Resource Adequacy. The analysis of focus group discussions resulted in different emerged themes such as Lack of Recognition and Career Promotion, and Nurses' Workload due to Paper and Administrative Work. The findings of this study suggest that strategic interventions are needed to secure adequate staff and resources and implement an effective system for evaluation of performance. © 2018 Wiley Periodicals, Inc.
Holmgren, K; Rosstorp, F; Rohdén, H
2016-09-27
From a public health perspective among the working population, it is very important that confidence in the welfare system is high, ensuring the citizens economic security and protecting them from economic stress when falling ill. The aim of this study was to explore how people with experience of health insurance perceive their confidence in the Swedish Social Insurance Agency (SSIA). Eight focus groups (n = 41) were conducted and each group met on one occasion. The participants described a systemic change in the work of the SSIA where the rule-of-law was disregarded, with arbitrary assessment, and no transparency. The reception by the SSIA shaped the image of the SSIA. The participants described vulnerability in relation to the SSIA. They felt mistrusted, which left a feeling of impotence that worsened their health. Experiencing vulnerability left a strong impression and affected the participants' confidence negatively. The following has to be acknowledged to prevent clients from experiencing impaired health, promote return-to-work possibilities, and to push public confidence in the institution in a more positive direction: Politicians and public administrators need to clarify the regulations. The decision-making process needs to be transparent and just. The entire procedure, including continuity as well as a personal, nice reception, has to be ensured.
The Defender's Role in Cyber Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
The embodiment of this work is a table top game to explore cyber security and network defense concepts and cost. The game structure is such that it provides players an immersive environment to play a given role in cyber security to investigate the result of infrastructure and response decisions.
20 CFR 416.975 - Evaluation guides if you are self-employed.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... 416.975 Section 416.975 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY... capital investment and profit-sharing agreements. We will generally consider work that you were forced to... given social security earnings credits because you materially participated in the activities of the farm...
33 CFR 104.260 - Security systems and equipment maintenance.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and inspected, tested, calibrated and maintained according to the manufacturer's recommendation. (b) The results...