49 CFR 1580.105 - Reporting significant security concerns.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.105... Hazardous Materials Receivers, and Private Cars § 1580.105 Reporting significant security concerns. (a... threats and significant security concerns to DHS by telephoning the Freedom Center at 1-866-615-5150. (c...
49 CFR 1580.203 - Reporting significant security concerns.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Reporting significant security concerns. 1580.203... concerns. (a) Applicability. This section applies to: (1) Each passenger railroad carrier, including each... potential threats and significant security concerns to DHS by telephoning the Freedom Center at 1-866-615...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-01
... Significant Impact Concerning a Proposal To Award a Contract to House Federal, Low- Security, Criminal Aliens... aliens within one or more existing contractor-owned and operated correctional facilities. Background... Federal, low-security, adult male, non-U.S. citizen, criminal aliens within one or more existing...
Effectiveness of the Civil Aviation Security Program.
1980-05-22
SECURITY. - CONTINUED TRAINING OF LAW ENFORCEMENT OFFICERS SUPPORTING AIRPORT SECURITY ACTIVITIES. - SECURITY PROGRAMS IMPLEMENTED BY AIR FREIGHT...cooperation by all concerned. (See Exhibit 14) Airport Security - Ongoing activities which contributed significantly to airport security included full...implementation of the revised Federal Aviation Regulations (FAR) Part 107 governing airport security , training of law enforcement officers supporting
Public attitudes toward health information exchange: perceived benefits and concerns.
Dimitropoulos, Linda; Patel, Vaishali; Scheffler, Scott A; Posnack, Steve
2011-12-01
To characterize consumers' attitudes regarding the perceived benefits of electronic health information exchange (HIE), potential HIE privacy and security concerns, and to analyze the intersection of these concerns with perceived benefits. A cross-sectional study. A random-digit-dial telephone survey of English-speaking adults was conducted in 2010. Multivariate logistic regression models examined the association between consumer characteristics and concerns related to the security of electronic health records (EHRs) and HIE. A majority of the 1847 respondents reported they were either "very" or "somewhat" concerned about privacy of HIE (70%), security of HIE (75%), or security of EHRs (82%). Concerns were significantly higher (P <.05) among employed individuals 40 to 64 years old and minorities. Many believed that HIE would confer benefits such as improved coordination of care (89%). Overall, 75% agreed that the benefits of EHRs outweighed risks to privacy and security, and 60% would permit HIE for treatment purposes even if the physician might not be able to protect their privacy all of the time. Over half (52%) wanted to choose which providers access and share their data. Greater participation by consumers in determining how HIE takes place could engender a higher degree of trust among all demographic groups, regardless of their varying levels of privacy and security concerns. Addressing the specific privacy and security concerns of minorities, individuals 40 to 64 years old, and employed individuals will be critical to ensuring widespread consumer participation in HIE.
Marketing and reputation aspects of neonatal safeguards and hospital-security systems.
Smith, Alan D
2009-01-01
Technological advancements have migrated from personal-use electronics into the healthcare setting for security enhancements. Within maternity wards and nurseries, technology was seen as one of best way to protect newborns from abduction. The present study is a focus on what systems and methods are used in neonatal security, the security arrangements, staff training, and impacts outside the control of the hospital, customer satisfaction and customer relations management. Through hypothesis-testing and exploratory analysis, gender biases and extremely high levels of security were found within a web-enabled and professional sample of 200 respondents. The factor-based constructs were found to be, in order of the greatest explained variance: security concerns, personal technology usage, work technology applications, and demographic maturity concerns, resulting in four factor-based scores with significant combined variance of 61.5%. It was found that through a better understanding on the importance and vital need for hospitals to continue to improve on their technology-based security policies significantly enhanced their reputation in the highly competitive local healthcare industry.
Do You Take Credit Cards? Security and Compliance for the Credit Card Payment Industry
ERIC Educational Resources Information Center
Willey, Lorrie; White, Barbara Jo
2013-01-01
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W
2015-01-01
Background Providers’ adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals’ perceptions regarding the privacy and security of their medical information. Objective The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Methods Using a nationally representative 2011-2012 survey, we reported on adults’ perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Results Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults’ confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater confidence in the privacy and security of medical records and less concern about sharing of health information by both fax and electronic means. Individuals’ perceptions of whether their providers use an EHR was not associated with any privacy or security outcomes. Conclusions Although most adults are confident in the privacy and security of their medical records, many express concerns regarding sharing of information between providers; a minority report withholding information from their providers due to privacy and security concerns. Whether individuals thought their provider was using an EHR was not associated with negative privacy/security perceptions or withholding, suggesting the transition to EHRs is not associated with negative perceptions regarding the privacy and security of medical information. However, monitoring to see how this evolves will be important. Given that positive health care experiences and higher information efficacy were associated with more favorable perceptions of privacy and security, efforts should continue to encourage providers to secure medical records, provide patients with a “meaningful choice” in how their data are shared, and enable individuals to access information they need to manage their care. PMID:25843686
Patel, Vaishali; Beckjord, Ellen; Moser, Richard P; Hughes, Penelope; Hesse, Bradford W
2015-04-02
Providers' adoption of electronic health records (EHRs) is increasing and consumers have expressed concerns about the potential effects of EHRs on privacy and security. Yet, we lack a comprehensive understanding regarding factors that affect individuals' perceptions regarding the privacy and security of their medical information. The aim of this study was to describe national perceptions regarding the privacy and security of medical records and identify a comprehensive set of factors associated with these perceptions. Using a nationally representative 2011-2012 survey, we reported on adults' perceptions regarding privacy and security of medical records and sharing of health information between providers, and whether adults withheld information from a health care provider due to privacy or security concerns. We used multivariable models to examine the association between these outcomes and sociodemographic characteristics, health and health care experience, information efficacy, and technology-related variables. Approximately one-quarter of American adults (weighted n=235,217,323; unweighted n=3959) indicated they were very confident (n=989) and approximately half indicated they were somewhat confident (n=1597) in the privacy of their medical records; we found similar results regarding adults' confidence in the security of medical records (very confident: n=828; somewhat confident: n=1742). In all, 12.33% (520/3904) withheld information from a health care provider and 59.06% (2100/3459) expressed concerns about the security of both faxed and electronic health information. Adjusting for other characteristics, adults who reported higher quality of care had significantly greater confidence in the privacy and security of their medical records and were less likely to withhold information from their health care provider due to privacy or security concerns. Adults with higher information efficacy had significantly greater confidence in the privacy and security of medical records and less concern about sharing of health information by both fax and electronic means. Individuals' perceptions of whether their providers use an EHR was not associated with any privacy or security outcomes. Although most adults are confident in the privacy and security of their medical records, many express concerns regarding sharing of information between providers; a minority report withholding information from their providers due to privacy and security concerns. Whether individuals thought their provider was using an EHR was not associated with negative privacy/security perceptions or withholding, suggesting the transition to EHRs is not associated with negative perceptions regarding the privacy and security of medical information. However, monitoring to see how this evolves will be important. Given that positive health care experiences and higher information efficacy were associated with more favorable perceptions of privacy and security, efforts should continue to encourage providers to secure medical records, provide patients with a "meaningful choice" in how their data are shared, and enable individuals to access information they need to manage their care.
ERIC Educational Resources Information Center
Bracy, Nicole L.
2009-01-01
Public schools have transformed significantly over the past several decades in response to broad concerns about rising school violence. Today's public schools are high security environments employing tactics commonly found in jails and prisons such as police officers, security cameras, identification systems, and secure building strategies.…
Student Perceptions of High-Security School Environments
ERIC Educational Resources Information Center
Bracy, Nicole L.
2011-01-01
Public schools have transformed significantly over the past several decades in response to concerns about rising school violence. Today, most public schools are high-security environments employing police officers, security cameras, and metal detectors, as well as strict discipline policies to keep students in line and maintain safe campuses.…
A Predictive Validity Study of Creative and Effective Managerial Performance.
ERIC Educational Resources Information Center
Moffie, D. J.; Goodner, Susan
This study tests the following hypotheses concerning the job creativity of managers: (1) There is a significant relationship between psychological test scores secured on subjects 15 to 20 years ago and creative performance on the job today, (2) there is a significant relationship between biographical information secured from subjects at the time…
NASA Astrophysics Data System (ADS)
Gunda, T.; Hornberger, G. M.
2017-12-01
Concerns over water resources have evolved over time, from physical availability to economic access and recently, to a more comprehensive study of "water security," which is inherently interdisciplinary because a secure water system is influenced by and affects both physical and social components. The concept of water security carries connotations of both an adequate supply of water as well as water that meets certain quality standards. Although the term "water security" has many interpretations in the literature, the research field has not yet developed a synthetic analysis of water security as both a quantity (availability) and quality (contamination) issue. Using qualitative comparative and multi-regression analyses, we evaluate the primary physical and social factors influencing U.S. states' water security from a quantity perspective and from a quality perspective. Water system characteristics are collated from academic and government sources and include access/use, governance, and sociodemographic, and ecosystem metrics. Our analysis indicates differences in variables driving availability and contamination concerns; for example, climate is a more significant determinant in water quantity-based security analyses than in water quality-based security analyses. We will also discuss coevolution of system traits and the merits of constructing a robust water security index based on the relative importance of metrics from our analyses. These insights will improve understanding of the complex interactions between quantity and quality aspects and thus, overall security of water systems.
Improved child behavioural and emotional functioning after Circle of Security 20-week intervention.
Huber, Anna; McMahon, Catherine; Sweller, Naomi
2015-01-01
This study examined the efficacy of the attachment-based Circle of Security 20-week intervention in improving child behavioural and emotional functioning. Participants were 83 parents of children (1-7 years) referred to a clinical service with concerns about their young children's behaviour. Parents (and teachers, when available) completed questionnaires assessing child protective factors, behavioural concerns, internalizing and externalizing problems, prior to and immediately after the intervention. The following were considered as potential moderators: child gender and age, parent representations, reflective functioning, child attachment indices and severity of presenting problems, prior to treatment. Results showed significant improvement for parent ratings of child protective factors, behavioural concerns, internalizing and externalizing symptoms, all ps < .05, and children with more severe problems showed most improvement. Teachers also reported improvements, but change was significant only for externalizing problems (p = .030). Findings suggest Circle of Security is effective in improving child behavioural and emotional functioning in clinically referred children aged 1-7 years.
The Challenges of Balancing Safety and Security in Implantable Medical Devices.
Katzis, Konstantinos; Jones, Richard W; Despotou, George
2016-01-01
Modern Implantable Medical Devices (IMDs), implement capabilities that have contributed significantly to patient outcomes, as well as quality of life. The ever increasing connectivity of IMD's does raise security concerns though there are instances where implemented security measures might impact on patient safety. The paper discusses challenges of addressing both of these attributes in parallel.
Pereira, Stacey; Robinson, Jill Oliver; Gutierrez, Amanda M.; Majumder, Mary A.; McGuire, Amy L.; Rothstein, Mark A.
2017-01-01
Background The importance of health privacy protections in the era of the “Facebook Generation” has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents’ views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Methods Using Amazon’s Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. Results 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). Limitations This study is limited by the non-representativeness of our sample. Conclusions Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously. PMID:28926626
Pereira, Stacey; Robinson, Jill Oliver; Peoples, Hayley A; Gutierrez, Amanda M; Majumder, Mary A; McGuire, Amy L; Rothstein, Mark A
2017-01-01
The importance of health privacy protections in the era of the "Facebook Generation" has been called into question. The ease with which younger people share personal information about themselves has led to the assumption that they are less concerned than older generations about the privacy of their information, including health information. We explored whether survey respondents' views toward health privacy suggest that efforts to strengthen privacy protections as health information is moved online are unnecessary. Using Amazon's Mechanical Turk (MTurk), which is well-known for recruitment for survey research, we distributed a 45-item survey to individuals in the U.S. to assess their perspectives toward privacy and security of online and health information, social media behaviors, use of health and fitness devices, and demographic information. 1310 participants (mean age: 36 years, 50% female, 78% non-Hispanic white, 54% college graduates or higher) were categorized by generations: Millennials, Generation X, and Baby Boomers. In multivariate regression models, we found that generational cohort was an independent predictor of level of concern about privacy and security of both online and health information. Younger generations were significantly less likely to be concerned than older generations (all P < 0.05). Time spent online and social media use were not predictors of level of concern about privacy or security of online or health information (all P > 0.05). This study is limited by the non-representativeness of our sample. Though Millennials reported lower levels of concern about privacy and security, this was not related to internet or social media behaviors, and majorities within all generations reported concern about both the privacy and security of their health information. Thus, there is no intergenerational imperative to relax privacy and security standards, and it would be advisable to take privacy and security of health information more seriously.
Cook, John T; Frank, Deborah A; Casey, Patrick H; Rose-Jacobs, Ruth; Black, Maureen M; Chilton, Mariana; Ettinger de Cuba, Stephanie; Appugliese, Danielle; Coleman, Sharon; Heeren, Timothy; Berkowitz, Carol; Cutts, Diana B
2008-10-01
Household energy security has not been measured empirically or related to child health and development but is an emerging concern for clinicians and researchers as energy costs increase. The objectives of this study were to develop a clinical indicator of household energy security and assess associations with food security, health, and developmental risk in children <36 months of age. A cross-sectional study that used household survey and surveillance data was conducted. Caregivers were interviewed in emergency departments and primary care clinics form January 2001 through December 2006 on demographics, public assistance, food security, experience with heating/cooling and utilities, Parents Evaluation of Developmental Status, and child health. The household energy security indicator includes energy-secure, no energy problems; moderate energy insecurity, utility shutoff threatened in past year; and severe energy insecurity, heated with cooking stove, utility shutoff, or >or=1 day without heat/cooling in past year. The main outcome measures were household and child food security, child reported health status, Parents Evaluation of Developmental Status concerns, and hospitalizations. Of 9721 children, 11% (n = 1043) and 23% (n = 2293) experienced moderate and severe energy insecurity, respectively. Versus children with energy security, children with moderate energy insecurity had greater odds of household food insecurity, child food insecurity, hospitalization since birth, and caregiver report of child fair/poor health, adjusted for research site and mother, child, and household characteristics. Children with severe energy insecurity had greater adjusted odds of household food insecurity, child food insecurity, caregivers reporting significant developmental concerns on the Parents Evaluation of Developmental Status scale, and report of child fair/poor health. No significant association was found between energy security and child weight for age or weight for length. As household energy insecurity increases, infants and toddlers experienced increased odds of household and child food insecurity and of reported poor health, hospitalizations, and developmental risks.
DOT National Transportation Integrated Search
2003-09-09
After the events of September 11, 2001, concerns were raised over the security of U.S. ports and waterways. In response to the concerns over port security, Congress passed the Maritime Transportation Security Act in November 2002. The act created a b...
2004-06-01
Viewpoint Component Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business...security concern, when applied to the different viewpoints, addresses both stakeholders, and is described as a business security model or component...Viewpoint View Architecture Description of Enterprise or Infostructure View Security Concern Business Security Model Business Stakeholder IT Architect
Atienza, Audie A; Zarcadoolas, Christina; Vaughon, Wendy; Hughes, Penelope; Patel, Vaishali; Chou, Wen-Ying Sylvia; Pritts, Joy
2015-01-01
This study examined consumers' attitudes and perceptions regarding mobile health (mHealth) technology use in health care. Twenty-four focus groups with 256 participants were conducted in 5 geographically diverse locations. Participants were also diverse in age, education, race/ethnicity, gender, and rural versus urban settings. Several key themes emerged from the focus groups. Findings suggest that consumer attitudes regarding mHealth privacy/security are highly contextualized, with concerns depending on the type of information being communicated, where and when the information is being accessed, who is accessing or seeing the information, and for what reasons. Consumers frequently considered the tradeoffs between the privacy/security of using mHealth technologies and the potential benefits. Having control over mHealth privacy/security features and trust in providers were important issues for consumers. Overall, this study found significant diversity in attitudes regarding mHealth privacy/security both within and between traditional demographic groups. Thus, to address consumers' concerns regarding mHealth privacy and security, a one-size-fits-all approach may not be adequate. Health care providers and technology developers should consider tailoring mHealth technology according to how various types of information are communicated in the health care setting, as well as according to the comfort, skills, and concerns individuals may have with mHealth technology.
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2011 CFR
2011-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2012 CFR
2012-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2013 CFR
2013-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2014 CFR
2014-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
38 CFR 1.521 - Special restrictions concerning social security records.
Code of Federal Regulations, 2010 CFR
2010-07-01
... concerning social security records. 1.521 Section 1.521 Pensions, Bonuses, and Veterans' Relief DEPARTMENT OF... Records § 1.521 Special restrictions concerning social security records. Information received from the Social Security Administration may be filed in the veteran's claims folder without special provisions...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-02
... receivers of certain hazardous materials; and passenger railroad carriers, including each carrier operating light rail or heavy rail transit service on track that is part of the general railroad system of transportation and rail transit systems. Also, these persons are required to report significant security concerns...
ERIC Educational Resources Information Center
Stalker, Joshua Dylan
2012-01-01
The protection of proprietary information that users print from their information systems is a significant and relevant concern in the field of information security to both researchers and practitioners. Information security researchers have repeatedly indicated that human behaviors and perception are important factors influencing the information…
Chile Informed Question Paper - Military
2003-01-01
superior military strength and regional economic integration. Internally, Chile also faces little threat; however, militants from the Mapuche ...considered a significant threat.11 The most significant internal security concern is the ongoing campaign by Mapuche indigenous community militants to
Cyber Security Threats to Safety-Critical, Space-Based Infrastructures
NASA Astrophysics Data System (ADS)
Johnson, C. W.; Atencia Yepez, A.
2012-01-01
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.
ERIC Educational Resources Information Center
Francois, Michael T.
2016-01-01
Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…
Jacquez, Geoffrey M; Essex, Aleksander; Curtis, Andrew; Kohler, Betsy; Sherman, Recinda; Emam, Khaled El; Shi, Chen; Kaufmann, Andy; Beale, Linda; Cusick, Thomas; Goldberg, Daniel; Goovaerts, Pierre
2017-07-01
As the volume, accuracy and precision of digital geographic information have increased, concerns regarding individual privacy and confidentiality have come to the forefront. Not only do these challenge a basic tenet underlying the advancement of science by posing substantial obstacles to the sharing of data to validate research results, but they are obstacles to conducting certain research projects in the first place. Geospatial cryptography involves the specification, design, implementation and application of cryptographic techniques to address privacy, confidentiality and security concerns for geographically referenced data. This article defines geospatial cryptography and demonstrates its application in cancer control and surveillance. Four use cases are considered: (1) national-level de-duplication among state or province-based cancer registries; (2) sharing of confidential data across cancer registries to support case aggregation across administrative geographies; (3) secure data linkage; and (4) cancer cluster investigation and surveillance. A secure multi-party system for geospatial cryptography is developed. Solutions under geospatial cryptography are presented and computation time is calculated. As services provided by cancer registries to the research community, de-duplication, case aggregation across administrative geographies and secure data linkage are often time-consuming and in some instances precluded by confidentiality and security concerns. Geospatial cryptography provides secure solutions that hold significant promise for addressing these concerns and for accelerating the pace of research with human subjects data residing in our nation's cancer registries. Pursuit of the research directions posed herein conceivably would lead to a geospatially encrypted geographic information system (GEGIS) designed specifically to promote the sharing and spatial analysis of confidential data. Geospatial cryptography holds substantial promise for accelerating the pace of research with spatially referenced human subjects data.
ERIC Educational Resources Information Center
James, Melissa; Warner, Sam
2005-01-01
Deliberate self-harm represents a significant, yet it can be argued, a poorly theorized area of concern with respect to women who have learning disabilities particularly in the context of secure service provision. Utilizing ideas from social constructionism we explore how some ways of understanding dominate the professional literature and,…
A Hierarchical Security Architecture for Cyber-Physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Quanyan Zhu; Tamer Basar
2011-08-01
Security of control systems is becoming a pivotal concern in critical national infrastructures such as the power grid and nuclear plants. In this paper, we adopt a hierarchical viewpoint to these security issues, addressing security concerns at each level and emphasizing a holistic cross-layer philosophy for developing security solutions. We propose a bottom-up framework that establishes a model from the physical and control levels to the supervisory level, incorporating concerns from network and communication levels. We show that the game-theoretical approach can yield cross-layer security strategy solutions to the cyber-physical systems.
SPAR: a security- and power-aware routing protocol for wireless ad hoc and sensor networks
NASA Astrophysics Data System (ADS)
Oberoi, Vikram; Chigan, Chunxiao
2005-05-01
Wireless Ad Hoc and Sensor Networks (WAHSNs) are vulnerable to extensive attacks as well as severe resource constraints. To fulfill the security needs, many security enhancements have been proposed. Like wise, from resource constraint perspective, many power aware schemes have been proposed to save the battery power. However, we observe that for the severely resource limited and extremely vulnerable WAHSNs, taking security or power (or any other resource) alone into consideration for protocol design is rather inadequate toward the truly "secure-and-useful" WAHSNs. For example, from resource constraint perspective, we identify one of the potential problems, the Security-Capable-Congestion (SCC) behavior, for the WAHSNs routing protocols where only the security are concerned. On the other hand, the design approach where only scarce resource is concerned, such as many power-aware WAHSNs protocols, leaves security unconsidered and is undesirable to many WAHSNs application scenarios. Motivated by these observations, we propose a co-design approach, where both the high security and effective resource consumption are targeted for WAHSNs protocol design. Specifically, we propose a novel routing protocol, Security- and Power- Aware Routing (SPAR) protocol based on this co-design approach. In SPAR, the routing decisions are made based on both security and power as routing criteria. The idea of the SPAR mechanism is routing protocol independent and therefore can be broadly integrated into any of the existing WAHSNs routing protocols. The simulation results show that SPAR outperforms the WAHSNs routing protocols where security or power alone is considered, significantly. This research finding demonstrates the proposed security- and resource- aware co-design approach is promising towards the truly "secure-and-useful" WAHSNs.
Will you accept the government's friend request? Social networks and privacy concerns.
Siegel, David A
2013-01-01
Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim.
Will You Accept the Government's Friend Request? Social Networks and Privacy Concerns
Siegel, David A.
2013-01-01
Participating in social network websites entails voluntarily sharing private information, and the explosive growth of social network websites over the last decade suggests shifting views on privacy. Concurrently, new anti-terrorism laws, such as the USA Patriot Act, ask citizens to surrender substantial claim to privacy in the name of greater security. I address two important questions regarding individuals' views on privacy raised by these trends. First, how does prompting individuals to consider security concerns affect their views on government actions that jeopardize privacy? Second, does the use of social network websites alter the effect of prompted security concerns? I posit that prompting individuals to consider security concerns does lead to an increased willingness to accept government actions that jeopardize privacy, but that frequent users of websites like Facebook are less likely to be swayed by prompted security concerns. An embedded survey experiment provides support for both parts of my claim. PMID:24312236
INTERNATIONAL COOPERATION ON RADIOLOGICAL THREAT REDUCTION PROGRAMS IN RUSSIA
DOE Office of Scientific and Technical Information (OSTI.GOV)
Landers, Christopher C.; Tatyrek, Aaron P.
Since its inception in 2004, the United States Department of Energy’s Global Threat Reduction Initiative (GTRI) has provided the Russian Federation with significant financial and technical assistance to secure its highly vulnerable and dangerous radiological material. The three program areas of this assistance are the removal of radioisotope thermoelectric generators (RTG), the physical protection of vulnerable in-use radiological material of concern, and the recovery of disused or abandoned radiological material of concern. Despite the many successes of the GTRI program in Russia, however, there is still a need for increased international cooperation in these efforts. Furthermore, concerns exist over howmore » the Russian government will ensure that the security of its radiological materials provided through GTRI will be sustained. This paper addresses these issues and highlights the successes of GTRI efforts and ongoing activities.« less
Okeke, Sunday O.
2017-01-01
Background For optimum delivery of service, an establishment needs to ensure a safe and secure environment. In 2011, the South African government promulgated the National Core Standards for Health Establishments for safety and security for all employees in all establishments. Little is known about whether these standards are being complied to. Aim and setting: To assess the perceptions of health care professionals (HCPs) on safety and security at Odi District Hospital. Methodology A sample of 181 out of a total of 341 HCPs was drawn through a systematic sampling method from each HCP category. Data were collected through a self-administered questionnaire. The SPSS® statistical software version 22 was used for data analysis. The level of statistical significance was set at < 0.05. Results There were more female respondents than male respondents (136; 75.10%). The dominant age group was 28–47 years (114; 57.46%). Perceptions on security personnel, their efficiency and the security system were significantly affirmed (p = 0.0001). The hospital infrastructure, surroundings and plan in emergencies were perceived to be safe (p < 0.0001). The hospital lighting system was perceived as inadequate (p = 0.0041). Only 36 (20.2%) HCPs perceived that hospital authorities were concerned about employees’ safety (p < 0.0001). Conclusion HCPs had positive perceptions regarding the hospital’s security system. Except for the negative perceptions of the lighting system and the perceived lack of hospital authorities’ concern for staff safety, perceptions of the HCPs on the hospital working environment were positive. The hospital authorities need to establish the basis of negative perceptions and enforce remedial measures to redress them. PMID:29113444
State-of-the-art research on electromagnetic information security
NASA Astrophysics Data System (ADS)
Hayashi, Yu-ichi
2016-07-01
As information security is becoming increasingly significant, security at the hardware level is as important as in networks and applications. In recent years, instrumentation has become cheaper and more precise, computation has become faster, and capacities have increased. With these advancements, the threat of advanced attacks that were considerably difficult to carry out previously has increased not only in military and diplomatic fields but also in general-purpose manufactured devices. This paper focuses on the problem of the security limitations concerning electromagnetic waves (electromagnetic information security) that has rendered attack detection particularly difficult at the hardware level. In addition to reviewing the mechanisms of these information leaks and countermeasures, this paper also presents the latest research trends and standards.
ERIC Educational Resources Information Center
National Crime Prevention Centre, Ottawa (Ontario).
This document presents a policy framework for improving the personal security of women and girls. The document includes: (1) "Introduction"; (2) "Policy Background" (the concept of personal security, the societal context of women's personal security, consequences of violence for women and girls, long-term policy concern, and…
Persson, Eva K; Dykes, Anna-Karin
2009-08-01
to evaluate dimensions of both parents' postnatal sense of security the first week after childbirth, and to determine associations between the PPSS instrument and different sociodemographic and situational background variables. evaluative, cross-sectional design. 113 mothers and 99 fathers with children live born at term, from five hospitals in southern Sweden. mothers and fathers had similar feelings concerning postnatal sense of security. Of the dimensions in the PPSS instrument, a sense of midwives'/nurses' empowering behaviour, a sense of one's own general well-being and a sense of the mother's well-being as experienced by the father were the most important dimensions for parents' experienced security. A sense of affinity within the family (for both parents) and a sense of manageable breast feeding (for mothers) were not significantly associated with their experienced security. A sense of participation during pregnancy and general anxiety were significantly associated background variables for postnatal sense of security for both parents. For the mothers, parity and a sense that the father was participating during pregnancy were also significantly associated. more focus on parents' participation during pregnancy as well as midwives'/nurses' empowering behaviour during the postnatal period will be beneficial for both parents' postnatal sense of security.
The security concern on internet banking adoption among Malaysian banking customers.
Sudha, Raju; Thiagarajan, A S; Seetharaman, A
2007-01-01
The existing literatures highlights that the security is the primary factor which determines the adoption of Internet banking technology. The secondary information on Internet banking development in Malaysia shows a very slow growth rate. Hence, this study aims to study the banking customers perception towards security concern and Internet banking adoption through the information collected from 150 sample respondents. The data analysis reveals that the customers have much concern about security and privacy issue in adoption of Internet banking, whether the customers are adopted Internet banking or not. Hence, it infers that to popularize Internet banking system there is a need for improvement in security and privacy issue among the banking customers.
Owen, Phillips; Mostafa, Javed; Lamm, Brent; Wang, Xiaoshu; Schmitt, Charles P.; Ahalt, Stanley C.
2013-01-01
Abstract Clinical data have tremendous value for translational research, but only if security and privacy concerns can be addressed satisfactorily. A collaboration of clinical and informatics teams, including RENCI, NC TraCS, UNC's School of Information and Library Science, Information Technology Service's Research Computing and other partners at the University of North Carolina at Chapel Hill have developed a system called the Secure Medical Research Workspace (SMRW) that enables researchers to use clinical data securely for research. SMRW significantly minimizes the risk presented when using identified clinical data, thereby protecting patients, researchers, and institutions associated with the data. The SMRW is built on a novel combination of virtualization and data leakage protection and can be combined with other protection methodologies and scaled to production levels. PMID:23751029
mHealth data security: the need for HIPAA-compliant standardization.
Luxton, David D; Kayl, Robert A; Mishkind, Matthew C
2012-05-01
The rise in the use of mobile devices, such as smartphones, tablet personal computers, and wireless medical devices, as well as the wireless networks that enable their use, has raised new concerns for data security and integrity. Standardized Health Insurance Portability and Accountability Act of 1996 (HIPAA)-compliant electronic data security that will allow ubiquitous use of mobile health technologies is needed. The lack of standardized data security to assure privacy, to allow interoperability, and to maximize the full capabilities of mobile devices presents a significant barrier to care. The purpose of this article is to provide an overview of the issue and to encourage discussion of this important topic. Current security needs, standards, limitations, and recommendations for how to address this barrier to care are discussed.
Securing services in the cloud: an investigation of the threats and the mitigations
NASA Astrophysics Data System (ADS)
Farroha, Bassam S.; Farroha, Deborah L.
2012-05-01
The stakeholder's security concerns over data in the clouds (Voice, Video and Text) are a real concern to DoD, the IC and private sector. This is primarily due to the lack of physical isolation of data when migrating to shared infrastructure platforms. The security concerns are related to privacy and regulatory compliance required in many industries (healthcare, financial, law enforcement, DoD, etc) and the corporate knowledge databases. The new paradigm depends on the service provider to ensure that the customer's information is continuously monitored and is kept available, secure, access controlled and isolated from potential adversaries.
Agent of opportunity risk mitigation: people, engineering, and security efficacy.
Graham, Margaret E; Tunik, Michael G; Farmer, Brenna M; Bendzans, Carly; McCrillis, Aileen M; Nelson, Lewis S; Portelli, Ian; Smith, Silas; Goldberg, Judith D; Zhang, Meng; Rosenberg, Sheldon D; Goldfrank, Lewis R
2010-12-01
Agents of opportunity (AO) are potentially harmful biological, chemical, radiological, and pharmaceutical substances commonly used for health care delivery and research. AOs are present in all academic medical centers (AMC), creating vulnerability in the health care sector; AO attributes and dissemination methods likely predict risk; and AMCs are inadequately secured against a purposeful AO dissemination, with limited budgets and competing priorities. We explored health care workers' perceptions of AMC security and the impact of those perceptions on AO risk. Qualitative methods (survey, interviews, and workshops) were used to collect opinions from staff working in a medical school and 4 AMC-affiliated hospitals concerning AOs and the risk to hospital infrastructure associated with their uncontrolled presence. Secondary to this goal, staff perception concerning security, or opinions about security behaviors of others, were extracted, analyzed, and grouped into themes. We provide a framework for depicting the interaction of staff behavior and access control engineering, including the tendency of staff to "defeat" inconvenient access controls. In addition, 8 security themes emerged: staff security behavior is a significant source of AO risk; the wide range of opinions about "open" front-door policies among AMC staff illustrates a disparity of perceptions about the need for security; interviewees expressed profound skepticism concerning the effectiveness of front-door access controls; an AO risk assessment requires reconsideration of the security levels historically assigned to areas such as the loading dock and central distribution sites, where many AOs are delivered and may remain unattended for substantial periods of time; researchers' view of AMC security is influenced by the ongoing debate within the scientific community about the wisdom of engaging in bioterrorism research; there was no agreement about which areas of the AMC should be subject to stronger access controls; security personnel play dual roles of security and customer service, creating the negative perception that neither role is done well; and budget was described as an important factor in explaining the state of security controls. We determined that AMCs seeking to reduce AO risk should assess their institutionally unique AO risks, understand staff security perceptions, and install access controls that are responsive to the staff's tendency to defeat them. The development of AO attribute fact sheets is desirable for AO risk assessment; new funding and administrative or legislative tools to improve AMC security are required; and security practices and methods that are convenient and effective should be engineered.
32 CFR 147.14 - Guideline L-Outside activities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Adjudication § 147.14 Guideline L—Outside activities. (a) The concern. Involvement in certain types of outside employment or activities is of security concern if it poses a conflict with an individual's security... outside employment or activity indicates that it does not pose a conflict with an individual's security...
Protecting genomic data analytics in the cloud: state of the art and opportunities.
Tang, Haixu; Jiang, Xiaoqian; Wang, Xiaofeng; Wang, Shuang; Sofia, Heidi; Fox, Dov; Lauter, Kristin; Malin, Bradley; Telenti, Amalio; Xiong, Li; Ohno-Machado, Lucila
2016-10-13
The outsourcing of genomic data into public cloud computing settings raises concerns over privacy and security. Significant advancements in secure computation methods have emerged over the past several years, but such techniques need to be rigorously evaluated for their ability to support the analysis of human genomic data in an efficient and cost-effective manner. With respect to public cloud environments, there are concerns about the inadvertent exposure of human genomic data to unauthorized users. In analyses involving multiple institutions, there is additional concern about data being used beyond agreed research scope and being prcoessed in untrused computational environments, which may not satisfy institutional policies. To systematically investigate these issues, the NIH-funded National Center for Biomedical Computing iDASH (integrating Data for Analysis, 'anonymization' and SHaring) hosted the second Critical Assessment of Data Privacy and Protection competition to assess the capacity of cryptographic technologies for protecting computation over human genomes in the cloud and promoting cross-institutional collaboration. Data scientists were challenged to design and engineer practical algorithms for secure outsourcing of genome computation tasks in working software, whereby analyses are performed only on encrypted data. They were also challenged to develop approaches to enable secure collaboration on data from genomic studies generated by multiple organizations (e.g., medical centers) to jointly compute aggregate statistics without sharing individual-level records. The results of the competition indicated that secure computation techniques can enable comparative analysis of human genomes, but greater efficiency (in terms of compute time and memory utilization) are needed before they are sufficiently practical for real world environments.
Bialas, Andrzej
2011-01-01
Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains. PMID:22164064
Bialas, Andrzej
2011-01-01
Intelligent sensors experience security problems very similar to those inherent to other kinds of IT products or systems. The assurance for these products or systems creation methodologies, like Common Criteria (ISO/IEC 15408) can be used to improve the robustness of the sensor systems in high risk environments. The paper presents the background and results of the previous research on patterns-based security specifications and introduces a new ontological approach. The elaborated ontology and knowledge base were validated on the IT security development process dealing with the sensor example. The contribution of the paper concerns the application of the knowledge engineering methodology to the previously developed Common Criteria compliant and pattern-based method for intelligent sensor security development. The issue presented in the paper has a broader significance in terms that it can solve information security problems in many application domains.
Interface of Science, Technology and Security: Areas of Most Concern, Now and Ahead
2017-03-28
connectivity is creating new forms of security threats and exploitable instabilities. There is a need to develop secure software to reduce vulnerabilities...implications in the light of global population growth, industrialization and limited fossil fuel supplies. The continued improvement of generation, storage...national strategic concern is when the S&T-security nexus creates opportunities for misunderstanding. These opportunities assume two forms , rooted in
Giguere, Rebecca; Brown, William; Balán, Ivan C; Dolezal, Curtis; Ho, Titcha; Sheinfil, Alan; Ibitoye, Mobolaji; Lama, Javier R; McGowan, Ian; Cranston, Ross D; Carballo-Diéguez, Alex
2018-04-01
During a Phase 2 rectal microbicide trial, men who have sex with men and transgender women (n = 187) in 4 countries (Peru, South Africa, Thailand, United States) reported product use daily via short message service (SMS). To prevent disclosure of study participation, the SMS system program included privacy and security features. We evaluated participants' perceptions of privacy while using the system and acceptability of privacy/security features. To protect privacy, the SMS system: (1) confirmed participant availability before sending the study questions, (2) required a password, and (3) did not reveal product name or study participation. To ensure security, the system reminded participants to lock phone/delete messages. A computer-assisted self-interview (CASI), administered at the final visit, measured burden of privacy and security features and SMS privacy concerns. A subsample of 33 participants underwent an in-depth interview (IDI). Based on CASI, 85% had no privacy concerns; only 5% were very concerned. Most were not bothered by the need for a password (73%) or instructions to delete messages (82%). Based on IDI, reasons for low privacy concerns included sending SMS in private or feeling that texting would not draw attention. A few IDI participants found the password unnecessary and more than half did not delete messages. Most participants were not concerned that the SMS system would compromise their confidentiality. SMS privacy and security features were effective and not burdensome. Short ID-related passwords, ambiguous language, and reminders to implement privacy and security-enhancing behaviors are recommended for SMS systems.
Recommendations for the Investigation of Vapor Intrusion
2008-04-01
Abbreviations COC constituent of concern 1,1-dfa 1,1- difluoroethane EPA U.S. Environmental Protection Agency ESTCP Environmental Security...lines. During one sample event, the leak tracer itself caused significant problems. During this sample event, 1,1- difluoroethane (1,1-dfa, the
A survey of visualization systems for network security.
Shiravi, Hadi; Shiravi, Ali; Ghorbani, Ali A
2012-08-01
Security Visualization is a very young term. It expresses the idea that common visualization techniques have been designed for use cases that are not supportive of security-related data, demanding novel techniques fine tuned for the purpose of thorough analysis. Significant amount of work has been published in this area, but little work has been done to study this emerging visualization discipline. We offer a comprehensive review of network security visualization and provide a taxonomy in the form of five use-case classes encompassing nearly all recent works in this area. We outline the incorporated visualization techniques and data sources and provide an informative table to display our findings. From the analysis of these systems, we examine issues and concerns regarding network security visualization and provide guidelines and directions for future researchers and visual system developers.
1987-09-24
Some concerns take on rating (e.g., ’Zl’) that adequately reflects increased significance in the network how well the system provides each service...to how well a M.•.imum, Fair, Good); however, in specific spicific approach may be expected to achieve cases, ratings such as "plesent" or "approved...established thresholds, Supportive policies include idertification and and for detecting the fact that access to a authentication policies as well as
The Terrorist Threat to Inbound U.S. Passenger Flights: Inadequate Government Response
2009-01-01
and several passengers who assisted her in subduing the criminal. It was unfortunate that French airport security had no explosives detector at...foreign airport security authorities. It is true that a few nations have, on their own, begun to use trace detectors on outgoing flights, at least...airports to inform passengers bound for Haiti and Indonesia of security concerns there. Similar concerns over airport security – which could have led
Employees' views on outsourcing and its impact on employee turnover: A phenomenological study
NASA Astrophysics Data System (ADS)
Przybelinski, Steven A.
Increasing use of outsourcing gives employees concern about personal job security. Using a modified van Kaam approach, this qualitative phenomenological study examined perceptions and experiences of 12 employees' on the influence outsourcing had on employee turnover. Five themes describing employee perceptions emerged: (a) preparation---education gives job security, (b) plausibility---all believed job loss plausible, (c) emotional influence---feelings of stress, threat, betrayal, and not being valued, (d) environment---value of communication and interaction with leaders, and (e) confidence---gained from increased education, skills, and knowledge protected from outsourcing. Significance of this study to leadership is the identification of employee perceptions of outsourcing and motivating factors influencing employee turnover during times of outsourcing. Findings might present new information and assist leaders with employee retention concerns for future outsourcing activities.
The nature of international health security.
Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N
2009-01-01
Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.
The effects of malicious nodes on performance of mobile ad hoc networks
NASA Astrophysics Data System (ADS)
Li, Fanzhi; Shi, Xiyu; Jassim, Sabah; Adams, Christopher
2006-05-01
Wireless ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Unlike their wired counterpart, infrastructureless ad hoc networks do not have a clear line of defense, their topology is dynamically changing, and every mobile node can receive messages from its neighbors and can be contacted by all other nodes in its neighborhood. This poses a great danger to network security if some nodes behave in a malicious manner. The immediate concern about the security in this type of networks is how to protect the network and the individual mobile nodes against malicious act of rogue nodes from within the network. This paper is concerned with security aspects of wireless ad hoc networks. We shall present results of simulation experiments on ad hoc network's performance in the presence of malicious nodes. We shall investigate two types of attacks and the consequences will be simulated and quantified in terms of loss of packets and other factors. The results show that network performance, in terms of successful packet delivery ratios, significantly deteriorates when malicious nodes act according to the defined misbehaving characteristics.
Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rogers,E.; deBoer,G.; Crawford, C.
2009-10-19
The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the riskmore » of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.« less
Zarei, Javad; Sadoughi, Farahnaz
2016-01-01
In recent years, hospitals in Iran - similar to those in other countries - have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts' opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Information security risk management is not followed by Iran's hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran's Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran.
The Influence of Attachment Security on Preschool Children's Empathic Concern
ERIC Educational Resources Information Center
Murphy, Tia Panfile; Laible, Deborah J.
2013-01-01
The current study examined the direction of the association between children's attachment security and empathic responding. At 42 and 48 months of age, 69 children's empathic concern was observed, and mothers reported the children's attachment. Results indicated that attachment at 42 months predicted empathic concern at 48 months even after…
Park, YoHan; Park, YoungHo
2016-12-14
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.
Park, YoHan; Park, YoungHo
2016-01-01
Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment. PMID:27983616
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
Third-year medical students' knowledge of privacy and security issues concerning mobile devices.
Whipple, Elizabeth C; Allgood, Kacy L; Larue, Elizabeth M
2012-01-01
The use of mobile devices are ubiquitous in medical-care professional settings, but information on privacy and security concerns of mobile devices for medical students is scarce. To gain baseline information about third-year medical students' mobile device use and knowledge of privacy and security issues concerning mobile devices. We surveyed 67 third-year medical students at a Midwestern university on their use of mobile devices and knowledge of how to protect information available through mobile devices. Students were also presented with clinical scenarios to rate their level of concern in regards to privacy and security of information. The most used features of mobile devices were: voice-to-voice (100%), text messaging (SMS) (94%), Internet (76.9%), and email (69.3%). For locking of one's personal mobile phone, 54.1% never physically lock their phone, and 58% never electronically lock their personal PDA. Scenarios considering definitely privacy concerns include emailing patient information intact (66.7%), and posting de-identified information on YouTube (45.2%) or Facebook (42.2%). As the ease of sharing data increases with the use of mobile devices, students need more education and training on possible privacy and security risks posed with mobile devices.
Seven layers of security to help protect biomedical research facilities.
Mortell, Norman
2010-04-01
In addition to risks such as theft and fire that can confront any type of business, the biomedical research community often faces additional concerns over animal rights extremists, infiltrations, data security and intellectual property rights. Given these concerns, it is not surprising that the industry gives a high priority to security. This article identifies security threats faced by biomedical research companies and shows how these threats are ranked in importance by industry stakeholders. The author then goes on to discuss seven key 'layers' of security, from the external environment to the research facility itself, and how these layers all contribute to the creation of a successfully secured facility.
Code of Federal Regulations, 2010 CFR
2010-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Code of Federal Regulations, 2011 CFR
2011-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Code of Federal Regulations, 2014 CFR
2014-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Code of Federal Regulations, 2012 CFR
2012-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Code of Federal Regulations, 2013 CFR
2013-04-01
... Securities and Exchange Commission concerning subpoenas to members of the news media. 202.10 Section 202.10... media. Freedom of the press is of vital importance to the mission of the Securities and Exchange... the issuance of subpoenas to members of the media that might impair the news gathering and reporting...
Olupot-Olupot, Peter; Katawera, Andrew; Cooper, Curtis; Small, Will; Anema, Aranka; Mills, Edward
2008-09-12
We aimed to determine patient and health worker concerns regarding antiretroviral adherence in a conflict-affected population using focus groups (n = 40) and semi-structured interviews (n = 11). Patient concerns include security attending clinics, food security, distance to health centers and access to health providers. During periods of famine and flooding, the lack of food security and only single daily meals makes taking multiple doses impossible. Possible facilitating strategies included mobile teams, increased security and regularity of drug stocks.
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension.
Chen, Feng; Wang, Chenghong; Dai, Wenrui; Jiang, Xiaoqian; Mohammed, Noman; Al Aziz, Md Momin; Sadat, Md Nazmus; Sahinalp, Cenk; Lauter, Kristin; Wang, Shuang
2017-07-26
Advances in DNA sequencing technologies have prompted a wide range of genomic applications to improve healthcare and facilitate biomedical research. However, privacy and security concerns have emerged as a challenge for utilizing cloud computing to handle sensitive genomic data. We present one of the first implementations of Software Guard Extension (SGX) based securely outsourced genetic testing framework, which leverages multiple cryptographic protocols and minimal perfect hash scheme to enable efficient and secure data storage and computation outsourcing. We compared the performance of the proposed PRESAGE framework with the state-of-the-art homomorphic encryption scheme, as well as the plaintext implementation. The experimental results demonstrated significant performance over the homomorphic encryption methods and a small computational overhead in comparison to plaintext implementation. The proposed PRESAGE provides an alternative solution for secure and efficient genomic data outsourcing in an untrusted cloud by using a hybrid framework that combines secure hardware and multiple crypto protocols.
49 CFR 1580.203 - Reporting significant security concerns.
Code of Federal Regulations, 2012 CFR
2012-10-01
... heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular, and... or transit vehicle crew. (2) Bomb threats, specific and non-specific. (3) Reports or discovery of... a train or transit vehicle or inside the facility of a passenger railroad carrier or rail transit...
49 CFR 1580.203 - Reporting significant security concerns.
Code of Federal Regulations, 2011 CFR
2011-10-01
... heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular, and... or transit vehicle crew. (2) Bomb threats, specific and non-specific. (3) Reports or discovery of... a train or transit vehicle or inside the facility of a passenger railroad carrier or rail transit...
49 CFR 1580.203 - Reporting significant security concerns.
Code of Federal Regulations, 2013 CFR
2013-10-01
... heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular, and... or transit vehicle crew. (2) Bomb threats, specific and non-specific. (3) Reports or discovery of... a train or transit vehicle or inside the facility of a passenger railroad carrier or rail transit...
49 CFR 1580.203 - Reporting significant security concerns.
Code of Federal Regulations, 2014 CFR
2014-10-01
... heavy rail transit, light rail transit, automated guideway, cable car, inclined plane, funicular, and... or transit vehicle crew. (2) Bomb threats, specific and non-specific. (3) Reports or discovery of... a train or transit vehicle or inside the facility of a passenger railroad carrier or rail transit...
Privacy and Security: A Bibliography.
ERIC Educational Resources Information Center
Computer and Business Equipment Manufacturers Association, Washington, DC.
Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…
FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption
2015-01-01
Background The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. Methods We presented a novel framework (FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption) to fully outsource GWAS (i.e., chi-square statistic computation) using homomorphic encryption. The proposed framework enables secure divisions over encrypted data. We introduced two division protocols (i.e., secure errorless division and secure approximation division) with a trade-off between complexity and accuracy in computing chi-square statistics. Results The proposed framework was evaluated for the task of chi-square statistic computation with two case-control datasets from the 2015 iDASH genome privacy protection challenge. Experimental results show that the performance of FORESEE can be significantly improved through algorithmic optimization and parallel computation. Remarkably, the secure approximation division provides significant performance gain, but without missing any significance SNPs in the chi-square association test using the aforementioned datasets. Conclusions Unlike many existing HME based studies, in which final results need to be computed by the data owner due to the lack of the secure division operation, the proposed FORESEE framework support complete outsourcing to the cloud and output the final encrypted chi-square statistics. PMID:26733391
FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption.
Zhang, Yuchen; Dai, Wenrui; Jiang, Xiaoqian; Xiong, Hongkai; Wang, Shuang
2015-01-01
The increasing availability of genome data motivates massive research studies in personalized treatment and precision medicine. Public cloud services provide a flexible way to mitigate the storage and computation burden in conducting genome-wide association studies (GWAS). However, data privacy has been widely concerned when sharing the sensitive information in a cloud environment. We presented a novel framework (FORESEE: Fully Outsourced secuRe gEnome Study basEd on homomorphic Encryption) to fully outsource GWAS (i.e., chi-square statistic computation) using homomorphic encryption. The proposed framework enables secure divisions over encrypted data. We introduced two division protocols (i.e., secure errorless division and secure approximation division) with a trade-off between complexity and accuracy in computing chi-square statistics. The proposed framework was evaluated for the task of chi-square statistic computation with two case-control datasets from the 2015 iDASH genome privacy protection challenge. Experimental results show that the performance of FORESEE can be significantly improved through algorithmic optimization and parallel computation. Remarkably, the secure approximation division provides significant performance gain, but without missing any significance SNPs in the chi-square association test using the aforementioned datasets. Unlike many existing HME based studies, in which final results need to be computed by the data owner due to the lack of the secure division operation, the proposed FORESEE framework support complete outsourcing to the cloud and output the final encrypted chi-square statistics.
Igarashi, Ayumi; Miyashita, Mitsunori; Morita, Tatsuya; Akizuki, Nobuya; Akiyama, Miki; Shirahige, Yutaka; Eguchi, Kenji
2012-02-01
Having a sense of security about the availability of care is important for cancer patients and their families. To develop a scale for the general population to evaluate feelings of support and security regarding cancer care, and to identify factors associated with a sense of security. A cross-sectional anonymous questionnaire was administered to 8000 subjects in four areas of Japan. Sense of security was measured using five statements and using a seven-point Likert scale: "If I get cancer 1) I would feel secure in receiving cancer treatment, 2) my pain would be well relieved, 3) medical staff will adequately respond to my concerns and pain, 4) I would feel secure as a variety of medical care services are available, and 5) I would feel secure in receiving care at home." We performed an exploratory factor analysis as well as uni- and multivariate analyses to examine factors associated with such a sense of security. The five items regarding sense of security were aggregated into one factor, and Cronbach's α was 0.91. In the Yamagata area where palliative care services were not available, the sense of security was significantly lower than in the other three regions. Female gender (P=0.035), older age (P<0.001), and having cancer (P<0.001) were significantly associated with a strong sense of security. A new scale that evaluates sense of security with regard to cancer care was developed. Future studies should examine whether establishing a regional health care system that provides quality palliative care could improve the sense of security of the general population. Copyright © 2012 U.S. Cancer Pain Relief Committee. Published by Elsevier Inc. All rights reserved.
Computing Game-Theoretic Solutions for Security in the Medium Term
This project concerns the design of algorithms for computing game- theoretic solutions . (Game theory concerns how to act in a strategically optimal...way in environments with other agents who also seek to act optimally but have different , and possibly opposite, interests .) Such algorithms have...recently found application in a number of real-world security applications, including among others airport security, scheduling Federal Air Marshals, and
Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program
DOE Office of Scientific and Technical Information (OSTI.GOV)
Crawford, Cary E.; de Boer, Gloria; De Castro, Kara
2010-10-01
The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the “human factor.” Gen. Eugene Habiger, a former “Assistant Secretary for Safeguards and Security” at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that “good security is 20% equipment and 80% people.”1 Although eliminating the “human factor” is not possible, accounting for and mitigating the riskmore » of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.« less
Code of Federal Regulations, 2010 CFR
2010-04-01
..., in the case of a violation involving a business organization, by notifying members of management not... enforcement actions can contribute significantly to the success of the agency's mission. Cooperation can enhance the Commission's ability to detect violations of the federal securities laws, increase the...
Code of Federal Regulations, 2011 CFR
2011-04-01
..., in the case of a violation involving a business organization, by notifying members of management not... enforcement actions can contribute significantly to the success of the agency's mission. Cooperation can enhance the Commission's ability to detect violations of the federal securities laws, increase the...
78 FR 40131 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-03
... Concerning Peaceful Uses of Nuclear Energy and the Agreement Between the Government of the United States of America and Australia Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...
Pavone, Vincenzo; Esposti, Sara Degli
2012-07-01
As surveillance-oriented security technologies (SOSTs) are considered security enhancing but also privacy infringing, citizens are expected to trade part of their privacy for higher security. Drawing from the PRISE project, this study casts some light on how citizens actually assess SOSTs through a combined analysis of focus groups and survey data. First, the outcomes suggest that people did not assess SOSTs in abstract terms but in relation to the specific institutional and social context of implementation. Second, from this embedded viewpoint, citizens either expressed concern about government's surveillance intentions and considered SOSTs mainly as privacy infringing, or trusted political institutions and believed that SOSTs effectively enhanced their security. None of them, however, seemed to trade privacy for security because concerned citizens saw their privacy being infringed without having their security enhanced, whilst trusting citizens saw their security being increased without their privacy being affected.
Zarei, Javad; Sadoughi, Farahnaz
2016-01-01
Background In recent years, hospitals in Iran – similar to those in other countries – have experienced growing use of computerized health information systems (CHISs), which play a significant role in the operations of hospitals. But, the major challenge of CHIS use is information security. This study attempts to evaluate CHIS information security risk management at hospitals of Iran. Materials and methods This applied study is a descriptive and cross-sectional research that has been conducted in 2015. The data were collected from 551 hospitals of Iran. Based on literature review, experts’ opinion, and observations at five hospitals, our intensive questionnaire was designed to assess security risk management for CHISs at the concerned hospitals, which was then sent to all hospitals in Iran by the Ministry of Health. Results Sixty-nine percent of the studied hospitals pursue information security policies and procedures in conformity with Iran Hospitals Accreditation Standards. At some hospitals, risk identification, risk evaluation, and risk estimation, as well as risk treatment, are unstructured without any specified approach or methodology. There is no significant structured approach to risk management at the studied hospitals. Conclusion Information security risk management is not followed by Iran’s hospitals and their information security policies. This problem can cause a large number of challenges for their CHIS security in future. Therefore, Iran’s Ministry of Health should develop practical policies to improve information security risk management in the hospitals of Iran. PMID:27313481
Beyond a series of security nets: Applying STAMP & STPA to port security
Williams, Adam D.
2015-11-17
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
Beyond a series of security nets: Applying STAMP & STPA to port security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Williams, Adam D.
Port security is an increasing concern considering the significant role of ports in global commerce and today’s increasingly complex threat environment. Current approaches to port security mirror traditional models of accident causality -- ‘a series of security nets’ based on component reliability and probabilistic assumptions. Traditional port security frameworks result in isolated and inconsistent improvement strategies. Recent work in engineered safety combines the ideas of hierarchy, emergence, control and communication into a new paradigm for understanding port security as an emergent complex system property. The ‘System-Theoretic Accident Model and Process (STAMP)’ is a new model of causality based on systemsmore » and control theory. The associated analysis process -- System Theoretic Process Analysis (STPA) -- identifies specific technical or procedural security requirements designed to work in coordination with (and be traceable to) overall port objectives. This process yields port security design specifications that can mitigate (if not eliminate) port security vulnerabilities related to an emphasis on component reliability, lack of coordination between port security stakeholders or economic pressures endemic in the maritime industry. As a result, this article aims to demonstrate how STAMP’s broader view of causality and complexity can better address the dynamic and interactive behaviors of social, organizational and technical components of port security.« less
[The comparative evaluation of level of security culture in medical organizations].
Roitberg, G E; Kondratova, N V; Galanina, E V
2016-01-01
The study was carried out on the basis of clinic “Medicine” in 2014-2015 concerning security culture. The sampling included 465 filled HSPSC questionnaires. The comparative analysis of received was implemented. The “Zubovskaia district hospital” Having no accreditation according security standards and group of clinics from USA functioning for many years in the system of patient security support were selected as objects for comparison. The evaluation was implemented concerning dynamics of security culture in organization at implementation of strategies of security of patients during 5 years and comparison of obtained results with USA clinics was made. The study results demonstrated that in conditions of absence of implemented standards of security in medical organization total evaluation of security remains extremely low. The study of security culture using HSPSC questionnaire is an effective tool for evaluating implementation of various strategies of security ofpatient. The functioning in the system of international standards of quality, primarily JCI standards, permits during several years to achieve high indices of security culture.
The Challenges of Seeking Security While Respecting Privacy
NASA Astrophysics Data System (ADS)
Kantor, Paul B.; Lesk, Michael E.
Security is a concern for persons, organizations, and nations. For the individual members of organizations and nations, personal privacy is also a concern. The technologies for monitoring electronic communication are at the same time tools to protect security and threats to personal privacy. Participants in this workshop address the interrelation of personal privacy and national or societal security, from social, technical and legal perspectives. The participants represented industry, the academy and the United States Government. The issues addressed have become, if anything, even more pressing today than they were when the conference was held.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-10
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Order Granting Approval of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons November 3... information concerning associated persons. The proposed rule change was published for comment in the Federal...
78 FR 14400 - Southern USA Resources, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-05
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Southern USA Resources, Inc., Order of... lack of current and accurate information concerning the securities of Southern USA Resources, Inc. (``Southern USA'') because of questions regarding the accuracy of publicly-disseminated information concerning...
Richardson, Joshua E.; Ancker, Jessica S.
2015-01-01
Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician’s electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized. PMID:26958246
Richardson, Joshua E; Ancker, Jessica S
2015-01-01
Given growing interest in mobile phones for health management (mHealth), we surveyed consumer perceptions of mHealth in security, privacy, and healthcare quality using national random-digit-dial telephone surveys in 2013 and 2014. In 2013, 48% thought that using a mobile phone to communicate data with a physician's electronic health record (EHR) would improve the quality of health care. By 2014, the proportion rose to 57% (p < .001). There were no similar changes in privacy concerns yet nearly two-thirds expressed privacy concerns. In 2013 alone, respondents were more likely to express privacy concerns about medical data on mobile phones than they were to endorse similar concerns with EHRs or health information exchange (HIE). Consumers increasingly believe that mHealth improves healthcare quality, but security and privacy concerns need to be addressed for quality improvement to be fully realized.
NASA Technical Reports Server (NTRS)
Marks, V. J.; Benigue, C. E.
1983-01-01
Four programs deal with intruders and resource managment. Package available from COSMIC provides DEC VAX-11/780 with certain "deterent" security features. Although packages is not comprehensive security system, of interest for any VAX installation where security is concern.
77 FR 26023 - President's National Security Telecommunications Advisory Committee; Correction
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-02
... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0016] President's National Security Telecommunications Advisory Committee; Correction AGENCY: National Protection and Programs Directorate, DHS. [[Page... April 25, 2012, concerning the President's National Security Telecommunications Advisory Committee...
The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security
2013-11-12
information. It applies business rules to the data, produces a report that flags issues of potential security concern, and electronically transmits...Form 86 (SF- 86) to check these data sources, verify what has been submitted, and collect more information. It applies business rules to the data...subject information. It applies business rules to analyze the data returned, produces a report that flags issues of potential security concern, and
Coding ethical behaviour: the challenges of biological weapons.
Rappert, Brian
2003-10-01
Since 11 September 2001 and the anthrax attacks that followed in the US, public and policy concerns about the security threats posed by biological weapons have increased significantly. With this has come an expansion of those activities in civil society deemed as potential sites for applying security controls. This paper examines the assumptions and implications of national and international efforts in one such area: how a balance or integration can take place between security and openness in civilian biomedical research through devising professional codes of conduct for scientists. Future attempts to establish such codes must find a way of reconciling or at least addressing dilemmatic and tension-ridden issues about the appropriateness of research; a topic that raises fundamental questions about the position of science within society.
Gonder, Jeffrey; Burton, Evan; Murakami, Elaine
2015-12-29
Despite the significant effort and expense to collect high-resolution Global Positioning System (GPS) data in travel surveys, privacy concerns often lead to its underutilization. This paper describes development of the Transportation Secure Data Center (TSDC) to address this dilemma of providing data access while preserving privacy. Furthermore, the TSDC operating structure was developed in consultation with an advisory committee and includes: a secure enclave with no external access for backing up and processing raw data, a publicly accessible website for downloading cleansed data, and a secure portal environment through which approved users can work with detailed spatial data using amore » variety of tools and reference information.« less
Airport detectors and orthopaedic implants.
van der Wal, Bart C H; Grimm, Bernd; Heyligers, Ide C
2005-08-01
As a result of the rising threats of terrorism, airport security has become a major issue. Patients with orthopaedic implants are concerned that they may activate alarms at airport security gates. A literature overview showed that the activation rate of the alarm by hand-held detectors is higher than for arch detectors (100% versus 56%). Arch detection rate has significantly increased from 0% before 1995 up to 83.3% after 1994. Reported factors which influence detection rates are implant mass, implant combinations, implant volume, transfer speed, side of implant, detector model, sensitivity settings, material and tissue masking. Detection rate has been improved by more sensitive devices and improved filter software. Doctors should be able to objectively inform patients. A form is presented which will easily inform the airport security staff.
Materialism and food security.
Allen, M W; Wilson, M
2005-12-01
The present studies examined if materialists have an elevated concern about food availability, presumably stemming from a general survival security motivation. Study 1 found that materialists set a greater life goal of food security, and reported more food insecurity during their childhood. Materialists reported less present-day food insecurity. Study 2 revealed that materialists stored/hoarded more food at home, and that obese persons endorsed materialism more than low/normal weight persons. Study 3 found that experimentally decreasing participants' feelings of survival security (via a mortality salience manipulation) led to greater endorsement of materialism, food security as goal, and using food for emotional comfort. The results imply that materialists overcame the food insecurity of their childhood by making food security a top life goal, but that materialists' current concerns about food security may not wholly stem from genuine threats to their food supply.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... lack of current and accurate information concerning the securities of Cargo Connection Logistics... Group BDC, Inc., Cargo Connection Logistics Holding, Inc., Diapulse Corporation of America, Globus... current and accurate information concerning the securities of Altus Pharmaceuticals, Inc. because it has...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ballard, James D.; Halstead, Robert J.; Dilger, Fred
2012-07-01
In 1999, the State of Nevada brought its concerns about physical protection of current spent nuclear fuel (SNF) shipments, and future SNF shipments to a federal repository, before the NRC in a 1999 petition for rulemaking (PRM-73-10). In October 2010, the NRC published a rulemaking decision which would significantly strengthen physical protection of SNF in transit. The newest articulation of the rule (10 CFR 73.37) incorporates regulatory clarifications and security enhancements requested in Nevada's 1999 petition for rulemaking, codifies the findings of the Nuclear NRC and DOE consequence analyses into policy guidance documents and brings forward into regulations the agencymore » and licensee experience gained since the terrorist attacks of September 11, 2001. Although at present DOE SNF shipments would continue to be exempt from these NRC regulations, Nevada considers the rule to constitute a largely satisfactory resolution to stakeholder concerns raised in the original petition and in subsequent comments submitted to the NRC. This paper reviews the process of regulatory changes, assesses the specific improvements contained in the new rules and briefly describes the significance of the new rule in the context of a future national nuclear waste management program. Nevada's petition for rulemaking led to a generally satisfactory resolution of the State's concerns. The decade plus timeframe from petition to rulemaking conclusion saw a sea change in many aspects of the relevant issues - perhaps most importantly the attacks on 9/11 led to the recognition by regulatory bodies that a new threat environment exists wherein shipments of SNF and HLW pose a viable target for human initiated events. The State of Nevada has always considered security a critical concern for the transport of these highly radioactive materials. This was one of the primary reasons for the original rulemaking petition and subsequent advocacy by Nevada on related issues. NRC decisions on the majority of the concerns expressed in the petition, additional developments by other regulatory bodies and the change in how the United States sees threats to the homeland - all of these produced a satisfactory resolution through the rulemaking process. While not all of the concerns expressed by Nevada were addressed in the proposed rule and significant challenges face any programmatic shipment campaign in the future, the lesson learned on this occasion is that stakeholder concerns can be resolved through rulemaking. If DOE would engage with stakeholders on its role in transport of SNF and HLW under the NWPA, these concerns would be better addressed. Specifically the attempts by DOE to resist transportation and security regulations now considered necessary by the NRC for the adequate protection of the shipments of highly radioactive materials, these DOE efforts seem ill advised. One clear lesson learned from this successful rulemaking petition process is that the system of stakeholder input can work to better the regulatory environment. (authors)« less
[The concept and measurement of food security].
Kim, Kirang; Kim, Mi Kyung; Shin, Young Jeon
2008-11-01
During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well. Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security. In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty. The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.
Code of Federal Regulations, 2010 CFR
2010-10-01
... information requested by TSA concerning Security Threat Assessments. (viii) A statement acknowledging and ensuring that each individual will successfully complete a Security Threat Assessment under § 1549.111... Security Coordinator for an applicant successfully completes a security threat assessment, TSA will provide...
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
Introduction This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). Methods The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents’ concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Results Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). Conclusions This study underscores the need for enhanced measures to secure patients’ PHI to avoid undermining their trust. PMID:23975624
Agaku, Israel T; Adisa, Akinyele O; Ayo-Yusuf, Olalekan A; Connolly, Gregory N
2014-01-01
This study assessed the perceptions and behaviors of US adults about the security of their protected health information (PHI). The first cycle of the fourth wave of the Health Information National Trends Survey was analyzed to assess respondents' concerns about PHI breaches. Multivariate logistic regression was used to assess the effect of such concerns on disclosure of sensitive medical information to a healthcare professional (p<0.05). Most respondents expressed concerns about data breach when their PHI was being transferred between healthcare professionals by fax (67.0%; 95% CI 64.2% to 69.8%) or electronically (64.5%; 95% CI 61.7% to 67.3%). About 12.3% (95% CI 10.8% to 13.8%) of respondents had ever withheld information from a healthcare provider because of security concerns. The likelihood of information withholding was higher among respondents who perceived they had very little say about how their medical records were used (adjusted OR=1.42; 95% CI 1.03 to 1.96). This study underscores the need for enhanced measures to secure patients' PHI to avoid undermining their trust.
Code of Federal Regulations, 2012 CFR
2012-07-01
... (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.630 Prohibition on correspondent accounts for foreign shell banks; records concerning...
Code of Federal Regulations, 2013 CFR
2013-07-01
... (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.630 Prohibition on correspondent accounts for foreign shell banks; records concerning...
Code of Federal Regulations, 2014 CFR
2014-07-01
... (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.630 Prohibition on correspondent accounts for foreign shell banks; records concerning...
Code of Federal Regulations, 2011 CFR
2011-07-01
... (Continued) FINANCIAL CRIMES ENFORCEMENT NETWORK, DEPARTMENT OF THE TREASURY RULES FOR BROKERS OR DEALERS IN SECURITIES Special Standards of Diligence; Prohibitions; and Special Measures for Brokers or Dealers in Securities § 1023.630 Prohibition on correspondent accounts for foreign shell banks; records concerning...
FAA computer security : concerns remain due to personnel and other continuing weaknesses
DOT National Transportation Integrated Search
2000-08-01
FAA has a history of computer security weaknesses in a number of areas, including its physical security management at facilities that house air traffic control (ATC) systems, systems security for both operational and future systems, management struct...
10 CFR 712.16 - DOE security review.
Code of Federal Regulations, 2010 CFR
2010-01-01
... of the HRP process, the HRP certifying official must be notified and the security concern evaluated... part. (c) Any mental/personality disorder or behavioral issues found in a personnel security file...
Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Figueroa, Norilyz
2017-01-01
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
ERIC Educational Resources Information Center
Imam, Abbas H.
2013-01-01
Complexity of information security has become a major issue for organizations due to incessant threats to information assets. Healthcare organizations are particularly concerned with security owing to the inherent vulnerability of sensitive information assets in health informatics. While the non-technical security management elements have been at…
Code of Federal Regulations, 2010 CFR
2010-10-01
... requested by TSA concerning Security Threat Assessments. (ix) A statement acknowledging and ensuring that each employee and agent will successfully complete a Security Threat Assessment under § 1548.15 before... training and Security Threat Assessments by relevant personnel. (4) Duration of security program. The...
An updated look at document security: from initiation to storage or shredder.
McConnell, Charles R
2014-01-01
In these days of close attention to security of information handled electronically, there is often a tendency to overlook the security of hard-copy documents. Document security can involve many areas of business, but the health care department manager's concerns are primarily for patient records and employee documentation. Document security is closely related to growing concerns for individual privacy; guidelines are furnished for protecting employee privacy by separating retention practices for business information from personal information. Sensitive documentation requires rules and procedures for processing, retaining, accessing, storing, and eventually destroying. Also, documents that are missing or incomplete at times present unique problems for the organization. The department manager is provided with some simple rules for safeguarding employee and patient documentation.
76 FR 20433 - MaxLife Fund Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-12
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] MaxLife Fund Corp.; Order of Suspension of... current and accurate information concerning the securities of MaxLife Fund Corp. (``MaxLife'') because of questions that have arisen concerning representations made by MaxLife, the control of its stock, its market...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-26
... Pharmaceutical Corp., BBV Vietnam SE.A. Acquisition Corp., Cash Technologies, Inc., Conspiracy Entertainment... that there is a lack of current and accurate information concerning the securities of Cash Technologies... concerning the securities of Conspiracy Entertainment Holdings, Inc. because it has not filed any periodic...
From Charity to Security: The Emergence of the National School Lunch Program
ERIC Educational Resources Information Center
Rutledge, Jennifer Geist
2015-01-01
This paper explores the historical formation of the National School Lunch Program (NSLP) in the United States and argues that programme emergence depended on the ability of policy entrepreneurs to link the economic concerns of agricultural production with the ideational concern of national security. Using a historical institutionalist framework…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-01
... Environmental Services, Inc., Dupont Direct Financial Holdings, Inc., New Paradigm Software Corp. (n/k/a Brunton... concerning the securities of Commodore Environmental Services, Inc. because it has not filed any periodic... accurate information concerning the securities of New Paradigm Software Corp. (n/k/a Brunton Vineyards...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-30
... the Standard Review Plan (SRP), concerning the physical security reviews of design certification... NRC staff with the physical security review of applications for design certifications, incorporate... NUCLEAR REGULATORY COMMISSION [NRC-2013-0225] Proposed Revision to Physical Security--Standard...
76 FR 15368 - Minimum Security Devices and Procedures
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-21
... DEPARTMENT OF THE TREASURY Office of Thrift Supervision Minimum Security Devices and Procedures... concerning the following information collection. Title of Proposal: Minimum Security Devices and Procedures... establish a written security program is necessitated by the Bank Protection Act (12 U.S.C. 1881-1884), which...
ERIC Educational Resources Information Center
National Transportation Safety Board (DOT), Washington, DC. Bureau of Surface Transportation Safety.
This accident report illustrates and exemplifies three significant safety issues with which the Board has long been concerned: (1) the use of seatbelts by the drivers of schoolbuses, (2) the location and security of schoolbus fuel tanks, and (3) the mode of opening of schoolbus service doors. (Photographs may reproduce poorly.) (Author)
USDA-ARS?s Scientific Manuscript database
Drought poses significant water and food security concerns in many parts of the world and can lead to negative agricultural, economic, and environmental impacts. The Vegetation Drought Response Index (VegDRI) approach has the flexibility to be adapted for other regions of the world using the climate...
12 CFR 390.254 - How may a subsidiary of a State savings association issue securities?
Code of Federal Regulations, 2012 CFR
2012-01-01
... days that the notice presents supervisory concerns or raises significant issues of law or policy, you... made available to the subsidiary; the percentage that such amount represents of the current book value of your assets on an unconsolidated basis; and the current book value of all such assets of the...
12 CFR 390.254 - How may a subsidiary of a State savings association issue securities?
Code of Federal Regulations, 2013 CFR
2013-01-01
... days that the notice presents supervisory concerns or raises significant issues of law or policy, you... made available to the subsidiary; the percentage that such amount represents of the current book value of your assets on an unconsolidated basis; and the current book value of all such assets of the...
12 CFR 390.254 - How may a subsidiary of a State savings association issue securities?
Code of Federal Regulations, 2014 CFR
2014-01-01
... days that the notice presents supervisory concerns or raises significant issues of law or policy, you... made available to the subsidiary; the percentage that such amount represents of the current book value of your assets on an unconsolidated basis; and the current book value of all such assets of the...
Barr, W; Brown, A; Quinn, B; McFarlane, J; McCabe, R; Whittington, R
2013-02-01
In the past decade UK government policy has been to develop alternative care for women detained in secure psychiatric hospital. This study evaluated the relative benefits of community-based step-down housing. Comparisons were made between female patients in community step-down housing and a control group in secure hospital who were on the waiting list for the houses. For each woman in the sample, a range of assessments was conducted on three separate occasions over a 12-month period. We noted a gradual improvement over time in women in both settings. However, by the final assessment psychological well-being and security needs were significantly better in the community group (P < 0.05). Although risks for violence and social functioning were also somewhat better in this group throughout the study, no statistically significant differences between the groups were found in these areas at any assessment time. This study has generated evidence in support of the further development of high-support step-down community housing for women in secure psychiatric care. This initiative may provide greater personal freedom and enhanced relational security for the women concerned while also facilitating improvements in their psychological well-being, with no increased risk to the women themselves or to the wider community. © 2012 Blackwell Publishing.
Secure Skyline Queries on Cloud Platform.
Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian
2017-04-01
Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions.
Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography.
Dautov, Ruslan; Tsouri, Gill R
2016-01-01
Stringent resource constraints and broadcast transmission in wireless body area network raise serious security concerns when employed in biomedical applications. Protecting data transmission where any minor alteration is potentially harmful is of significant importance in healthcare. Traditional security methods based on public or private key infrastructure require considerable memory and computational resources, and present an implementation obstacle in compact sensor nodes. This paper proposes a lightweight encryption framework augmenting compressed sensing with wireless physical layer security. Augmenting compressed sensing to secure information is based on the use of the measurement matrix as an encryption key, and allows for incorporating security in addition to compression at the time of sampling an analog signal. The proposed approach eliminates the need for a separate encryption algorithm, as well as the predeployment of a key thereby conserving sensor node's limited resources. The proposed framework is evaluated using analysis, simulation, and experimentation applied to a wireless electrocardiogram setup consisting of a sensor node, an access point, and an eavesdropper performing a proximity attack. Results show that legitimate communication is reliable and secure given that the eavesdropper is located at a reasonable distance from the sensor node and the access point.
Vecchione, Michele; Caprara, Gianvittorio; Schoen, Harald; Castro, Josè Luis Gonzàlez; Schwartz, Shalom H
2012-08-01
Using data from Italy, Spain, and Germany (N= 1,569), this study investigated the role of basic values (universalism and security) and basic traits (openness and agreeableness) in predicting perceptions of the consequences of immigration. In line with Schwartz's (1992) theory, we conceptualized security as having two distinct components, one concerned with safety of the self (personal security) and the other with harmony and stability of larger groups and of society (group security). Structural equation modelling revealed that universalism values underlie perceptions that immigration has positive consequences and group security values underlie perceptions that it has negative consequences. Personal security makes no unique, additional contribution. Multi-group analyses revealed that these associations are invariant across the three countries except for a stronger link between universalism and perceptions of the consequences of immigration in Spain. To examine whether values mediate relations of traits to perceptions of immigration, we used the five-factor model. Findings supported a full mediation model. Individuals' traits of openness and agreeableness explained significant variance in security and universalism values. Basic values, in turn, explained perceptions of the consequences of immigration. ©2011 The British Psychological Society.
Karvetski, Christopher W; Lambert, James H; Linkov, Igor
2011-04-01
Military and industrial facilities need secure and reliable power generation. Grid outages can result in cascading infrastructure failures as well as security breaches and should be avoided. Adding redundancy and increasing reliability can require additional environmental, financial, logistical, and other considerations and resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth of regional energy demands, and other concerns result in further complications. Decisions on selecting energy alternatives are made on an ad hoc basis. The present work integrates scenario analysis and multiple criteria decision analysis (MCDA) to identify combinations of impactful emergent conditions and to perform a preliminary benefits analysis of energy and environmental security investments for industrial and military installations. Application of a traditional MCDA approach would require significant stakeholder elicitations under multiple uncertain scenarios. The approach proposed in this study develops and iteratively adjusts a scoring function for investment alternatives to find the scenarios with the most significant impacts on installation security. A robust prioritization of investment alternatives can be achieved by integrating stakeholder preferences and focusing modeling and decision-analytical tools on a few key emergent conditions and scenarios. The approach is described and demonstrated for a campus of several dozen interconnected industrial buildings within a major installation. Copyright © 2010 SETAC.
49 CFR 1549.109 - Security Directives and Information Circulars.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars... SCREENING PROGRAM Operations § 1549.109 Security Directives and Information Circulars. (a) TSA may issue an Information Circular to notify certified cargo screening facilities of security concerns. (b) When TSA...
46 CFR 503.53 - Oversight Committee.
Code of Federal Regulations, 2011 CFR
2011-10-01
... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 13526 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...
46 CFR 503.53 - Oversight Committee.
Code of Federal Regulations, 2010 CFR
2010-10-01
... FEDERAL MARITIME COMMISSION GENERAL AND ADMINISTRATIVE PROVISIONS PUBLIC INFORMATION Information Security... provisions of Executive Order 12958 and directives of the Information Security Oversight Office. The program... and complaints concerning the Commission's information security program; (d) Recommend appropriate...
7 CFR 4290.610 - Required certifications for Loans and Investments.
Code of Federal Regulations, 2010 CFR
2010-01-01
... to a Rural Business Concern or Smaller Enterprise, a certification by the Portfolio Concern stating... by the Portfolio Concern certifying that the concern is a Small Business Concern. For securities... is a Small Business Concern. (c) A certification by the Portfolio Concern that it will not...
Securing the Human: The Journey Toward World Law and Justice. The Whole Earth Papers, No. 14.
ERIC Educational Resources Information Center
Mische, Patricia; And Others
The document contains a variety of papers that examine the linkages between local concerns and global concerns and explore alternative world futures. An introductory article, "Securing the Human," discusses how the world community needs to develop adequate means to deal with crimes against humans. These means include sound analysis, spiritual…
Security Aspects of an Enterprise-Wide Network Architecture.
ERIC Educational Resources Information Center
Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan
1999-01-01
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
Security Management Strategies for Protecting Your Library's Network.
ERIC Educational Resources Information Center
Ives, David J.
1996-01-01
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 32 National Defense 1 2014-07-01 2014-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 1 2010-07-01 2010-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 32 National Defense 1 2013-07-01 2013-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 32 National Defense 1 2011-07-01 2011-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
32 CFR 147.13 - Guideline K-Security violations.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 32 National Defense 1 2012-07-01 2012-07-01 false Guideline K-Security violations. 147.13 Section 147.13 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE PERSONNEL, MILITARY... Adjudication § 147.13 Guideline K—Security violations. (a) The concern. Noncompliance with security regulations...
Developing an Undergraduate Information Systems Security Track
ERIC Educational Resources Information Center
Sharma, Aditya; Murphy, Marianne C.; Rosso, Mark A.; Grant, Donna
2013-01-01
Information Systems Security as a specialized area of study has mostly been taught at the graduate level. This paper highlights the efforts of establishing an Information Systems (IS) Security track at the undergraduate level. As there were many unanswered questions and concerns regarding the Security curriculum, focus areas, the benefit of…
17 CFR 403.7 - Effective dates.
Code of Federal Regulations, 2010 CFR
2010-04-01
... THE SECURITIES EXCHANGE ACT OF 1934 PROTECTION OF CUSTOMER SECURITIES AND BALANCES § 403.7 Effective... referred to in § 403.4 concerning the Securities Investor Protection Act of 1970, and (ii) if applicable... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Effective dates. 403.7 Section...
Security, Extremism and Education: Safeguarding or Surveillance?
ERIC Educational Resources Information Center
Davies, Lynn
2016-01-01
This article analyses how education is positioned in the current concerns about security and extremism. This means firstly examining the different meanings of security (national, human and societal) and who provides security for whom. Initially, a central dilemma is acknowledged: that schooling appears to be simultaneously irrelevant to the huge…
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2013 CFR
2013-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2012 CFR
2012-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
45 CFR 601.3 - Security program.
Code of Federal Regulations, 2011 CFR
2011-10-01
... Welfare Regulations Relating to Public Welfare (Continued) NATIONAL SCIENCE FOUNDATION CLASSIFICATION AND DECLASSIFICATION OF NATIONAL SECURITY INFORMATION § 601.3 Security program. The Director, Division of... employees concerned with classified information or material. (b) Encouraging Foundation personnel to...
14 CFR 1203.901 - Responsibilities.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...
ERIC Educational Resources Information Center
Social and Labour Bulletin, 1983
1983-01-01
This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)
14 CFR 1203.901 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-01-01
... Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program Committee § 1203.901 Responsibilities. (a) The Chairperson reports to the Administrator concerning the management and direction of the NASA Information Security Program as provided for...
Attitudes regarding privacy of genomic information in personalized cancer therapy
Rogith, Deevakar; Yusuf, Rafeek A; Hovick, Shelley R; Peterson, Susan K; Burton-Chase, Allison M; Li, Yisheng; Meric-Bernstam, Funda; Bernstam, Elmer V
2014-01-01
Objective To evaluate attitudes regarding privacy of genomic data in a sample of patients with breast cancer. Methods Female patients with breast cancer (n=100) completed a questionnaire assessing attitudes regarding concerns about privacy of genomic data. Results Most patients (83%) indicated that genomic data should be protected. However, only 13% had significant concerns regarding privacy of such data. Patients expressed more concern about insurance discrimination than employment discrimination (43% vs 28%, p<0.001). They expressed less concern about research institutions protecting the security of their molecular data than government agencies or drug companies (20% vs 38% vs 44%; p<0.001). Most did not express concern regarding the association of their genomic data with their name and personal identity (49% concerned), billing and insurance information (44% concerned), or clinical data (27% concerned). Significantly fewer patients were concerned about the association with clinical data than other data types (p<0.001). In the absence of direct benefit, patients were more willing to consent to sharing of deidentified than identified data with researchers not involved in their care (76% vs 60%; p<0.001). Most (85%) patients were willing to consent to DNA banking. Discussion While patients are opposed to indiscriminate release of genomic data, privacy does not appear to be their primary concern. Furthermore, we did not find any specific predictors of privacy concerns. Conclusions Patients generally expressed low levels of concern regarding privacy of genomic data, and many expressed willingness to consent to sharing their genomic data with researchers. PMID:24737606
The Threat Among Us: Insiders Intensify Aviation Terrorism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Krull, Katie E.
Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway formore » attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-27
...; Submission for OMB Review; Contractors Performing Private Security Functions Outside the United States... new information collection requirement concerning Contractors Performing Private Security Functions... identified by Information Collection 9000- 0184, Contractors Performing Private Security Functions Outside...
A review on microbial lipids as a potential biofuel.
Shields-Menard, Sara A; Amirsadeghi, Marta; French, W Todd; Boopathy, Raj
2018-07-01
Energy security, environmental concerns, and unstable oil prices have been the driving trifecta of demand for alternative fuels in the United States. The United States' dependence on energy resources, often from unstable oil-producing countries has created political insecurities and concerns. As we try to gain energy security, unconventional oil becomes more common, flooding the market, and causing the major downshift of the usual unstable oil prices. Meanwhile, consumption of fossil fuels and the consequent CO 2 emissions have driven disruptions in the Earth's atmosphere and are recognized to be responsible for global climate change. While the significance of each of these three factors may fluctuate with global politics or new technologies, transportation energy will remain the prominent focus of multi-disciplined research. Bioenergy future depends on the price of oil. Current energy policy of the United States heavily favors petroleum industry. In this review, the current trend in microbial lipids as a potential biofuel is discussed. Copyright © 2018 Elsevier Ltd. All rights reserved.
ERIC Educational Resources Information Center
Comp, David J.
2013-01-01
The National Security Education Program, established under the National Security Education Act of 1991, has had a post-funding service requirement in the Federal Government for undergraduate scholarship and graduate fellowship recipients since its inception. The service requirement, along with the concern that the National Security Education…
USign--a security enhanced electronic consent model.
Li, Yanyan; Xie, Mengjun; Bian, Jiang
2014-01-01
Electronic consent becomes increasingly popular in the healthcare sector given the many benefits it provides. However, security concerns, e.g., how to verify the identity of a person who is remotely accessing the electronic consent system in a secure and user-friendly manner, also arise along with the popularity of electronic consent. Unfortunately, existing electronic consent systems do not pay sufficient attention to those issues. They mainly rely on conventional password based authentication to verify the identity of an electronic consent user, which is far from being sufficient given that identity theft threat is real and significant in reality. In this paper, we present a security enhanced electronic consent model called USign. USign enhances the identity protection and authentication for electronic consent systems by leveraging handwritten signatures everyone is familiar with and mobile computing technologies that are becoming ubiquitous. We developed a prototype of USign and conducted preliminary evaluation on accuracy and usability of signature verification. Our experimental results show the feasibility of the proposed model.
Security architecture for health grid using ambient intelligence.
Naqvi, S; Riguidel, M; Demeure, I
2005-01-01
To propose a novel approach of incorporating ambient intelligence in the health grid security architecture. Security concerns are severely impeding the grid community effort in spreading its wings in health applications. In this paper, we have proposed a high level approach to incorporate ambient intelligence for health grid security architecture and have argued that this will significantly improve the current state of the grid security paradigm with an enhanced user-friendly environment. We believe that the time is right to shift the onus of traditional security mechanisms onto the new technologies. The incorporation of ambient intelligence in the security architecture of a grid will not only render a security paradigm robust but also provide an attractive vision for the future of computing by bringing the two worlds together. In this article we propose an evolutionary approach of utilizing smart devices for grid security architecture. We argue that such an infrastructure will impart unique features to the existing grid security paradigms by offering fortified and relentless monitoring. This new security architecture will be comprehensive in nature but will not be cumbersome for the users due to its typical characteristics of not prying into their lives and adapting to their needs. We have identified a new paradigm of the security architecture for a health grid that will not only render a security mechanism robust but will also provide the high levels of user-friendliness. As our approach is a first contribution to this problem, a number of other issues for future research remain open. However, the prospects are fascinating.
Social Security and Part-Time Employment.
ERIC Educational Resources Information Center
Euzeby, Alain
1988-01-01
Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)
76 FR 81359 - National Security Personnel System
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
... contains regulatory documents #0;having general applicability and legal effect, most of which are keyed #0... Security Personnel System AGENCY: Department of Defense; Office of Personnel Management. ACTION: Final rule... concerning the National Security Personnel System (NSPS). Section 1113 of the National Defense Authorization...
The Curious National Security Pendulum: Openness and/or Censorship.
ERIC Educational Resources Information Center
Marwick, Christine M.
1979-01-01
Lawsuits illustrate the increasing concern over national security in regulating the security classification system, and government attitudes toward information have shifted from secrecy to openness to censorship. The Central Intelligence Agency's suppression of unclassified printed information is a case in point. (SW)
Secure Skyline Queries on Cloud Platform
Liu, Jinfei; Yang, Juncheng; Xiong, Li; Pei, Jian
2017-01-01
Outsourcing data and computation to cloud server provides a cost-effective way to support large scale data storage and query processing. However, due to security and privacy concerns, sensitive data (e.g., medical records) need to be protected from the cloud server and other unauthorized users. One approach is to outsource encrypted data to the cloud server and have the cloud server perform query processing on the encrypted data only. It remains a challenging task to support various queries over encrypted data in a secure and efficient way such that the cloud server does not gain any knowledge about the data, query, and query result. In this paper, we study the problem of secure skyline queries over encrypted data. The skyline query is particularly important for multi-criteria decision making but also presents significant challenges due to its complex computations. We propose a fully secure skyline query protocol on data encrypted using semantically-secure encryption. As a key subroutine, we present a new secure dominance protocol, which can be also used as a building block for other queries. Finally, we provide both serial and parallelized implementations and empirically study the protocols in terms of efficiency and scalability under different parameter settings, verifying the feasibility of our proposed solutions. PMID:28883710
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-22
..., Inc., Bonanza Oil & Gas, Inc., and Gulf Coast Oil & Gas, Inc.; Order of Suspension of Trading July 18... Commission that there is a lack of current and accurate information concerning the securities of Bonanza Oil... concerning the securities of Gulf Coast Oil & Gas, Inc. because it has not filed any periodic reports since...
Geospatial Informational Security Risks and Concerns of the U.S. Air Force GeoBase Program
2007-03-01
multiple governmental directives such as the Government Performance and Results Act (GPRA), Paperwork Reduction Act (PRA), and Office of Management and... governments , non- governmental organizations (NGOs), universities, and commercial sector contractors (Lachman, 2006). One command noted that over...Defense, or the United States Government . AFIT/GEM/ENV/07-M1 GEOSPATIAL INFORMATIONAL SECURITY RISKS AND CONCERNS OF THE UNITED STATES
Information Technology Security Professionals' Knowledge and Use Intention Based on UTAUT Model
ERIC Educational Resources Information Center
Kassa, Woldeloul
2016-01-01
Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…
Johnson, Tyler; Ford, Eric W; Huerta, Timothy R
2017-01-01
Background As electronic health records (EHRs) become ubiquitous in the health care industry, privacy breaches are increasing and being made public. These breaches may make consumers wary of the technology, undermining its potential to improve care coordination and research. Objective Given the developing concerns around privacy of personal health information stored in digital format, it is important for providers to understand how views on privacy and security may be associated with patient disclosure of health information. This study aimed to understand how privacy concerns may be shifting patient behavior. Methods Using a pooled cross-section of data from the 2011 and 2014 cycles of the Health Information and National Trends Survey (HINTS), we tested whether privacy and security concerns, as well as quality perceptions, are associated with the likelihood of withholding personal health information from a provider. A fully interacted multivariate model was used to compare associations between the 2 years, and interaction terms were used to evaluate trends in the factors that are associated with withholding behavior. Results No difference was found regarding the effect of privacy and security concerns on withholding behavior between 2011 and 2014. Similarly, whereas perceived high quality of care was found to reduce the likelihood of withholding information from a provider in both 2011 (odds ratio [OR] 0.73, 95% confidence interval [CI] 0.56-0.94) and 2014 (OR 0.61, 95% CI 0.48-0.76), no difference was observed between years. Conclusions These findings suggest that consumers’ beliefs about EHR privacy and security, the relationship between technology use and quality, and intentions to share information with their health care provider have not changed. These findings are counter to the ongoing discussions about the implications of security failures in other domains. Our results suggest that providers could ameliorate privacy and security by focusing on the care quality benefits EHRs provide. PMID:28052843
Security and health research databases: the stakeholders and questions to be addressed.
Stewart, Sara
2006-01-01
Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.
76 FR 28960 - National Security Education Board Members Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act, Title...
77 FR 27739 - National Security Education Board Members Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-11
... DEPARTMENT OF DEFENSE Office of the Secretary National Security Education Board Members Meeting... Education Board. The purpose of the meeting is to review and make recommendations to the Secretary of Defense concerning requirements established by the David L. Boren National Security Education Act, Title...
78 FR 48697 - Agency Information Collection Activities: Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-09
... INFORMATION: FEMA's Homeland Security Grant Program (HSGP) is an important part of the Administration's larger... DEPARTMENT OF HOMELAND SECURITY Federal Emergency Management Agency [Docket ID: FEMA-2013-0034... concerning the collection of information to administer the Homeland Security Grant Program (HSGP). DATES...
NASA Astrophysics Data System (ADS)
Hossain, Kamrul
2016-09-01
The theory of securitization-the so-called Copenhagen school-centers the concept of security on various identified threats. Security based on the collective identity by which a society preserves its essential characteristics has been defined as community security, or societal security. The underlying principle of the Copenhagen school is that state-based, sovereignty-oriented security is ineffective unless the other components of security threats are addressed. The concept of human security, developed nearly simultaneously to that of securitization, identifies threat components at the sub-state level which are not traditionally understood as security concerns. Both schools of security thought are similar as they offer nontraditional approaches to understanding the concept of security. In this article, I explore securitization theory and the concept of human security to elaborate community perspectives in the understanding of security. In a case study, I investigate the security concerns of the indigenous peoples of the Arctic. The transformation of the Arctic by climate change and its impacts has resulted in new challenges and opportunities, so I explore how indigenous peoples in general and the Sámi in particular understand security which promotes their societal security. Although I show that this group of people deserves recognition and the ability to exercise greater authority, I conclude that diverse concepts of security do not by any means undermine the core traditional concept of security. These aspects of security remain subject to scrutiny by states and exist in a vertical structure. The Sámi, therefore, rely on affirmative actions by states to enjoy greater rights to maintain their community security.
Mahat-Shamir, Michal; Hamama-Raz, Yaira; Ben-Ezra, Menachem; Pitcho-Prelorentzos, Shani; Zaken, Adi; David, Udi Y; Bergman, Yoav S
2018-03-01
The current study examined whether emotional concern over one's security situation is connected with death anxiety during an ongoing terror wave, and whether type of exposure (media exposure vs. contact with witnesses) moderates this connection. A total of 345 individuals, aged 18-70, were sampled during an ongoing wave of terror in Israel and filled out scales measuring death anxiety, concern over security situation, and type of exposure. Results indicated that increased concern was connected with enhanced death anxiety. Moreover, this connection was more pronounced among individuals exposed to the events through the media, in comparison with individuals who had first-hand contact with witnesses.
ASIS healthcare security benchmarking study.
2001-01-01
Effective security has aligned itself into the everyday operations of a healthcare organization. This is evident in every regional market segment, regardless of size, location, and provider clinical expertise or organizational growth. This research addresses key security issues from an acute care provider to freestanding facilities, from rural hospitals and community hospitals to large urban teaching hospitals. Security issues and concerns are identified and addressed daily by senior and middle management. As provider campuses become larger and more diverse, the hospitals surveyed have identified critical changes and improvements that are proposed or pending. Mitigating liabilities and improving patient, visitor, and/or employee safety are consequential to the performance and viability of all healthcare providers. Healthcare organizations have identified the requirement to compete for patient volume and revenue. The facility that can deliver high-quality healthcare in a comfortable, safe, secure, and efficient atmosphere will have a significant competitive advantage over a facility where patient or visitor security and safety is deficient. Continuing changes in healthcare organizations' operating structure and healthcare geographic layout mean changes in leadership and direction. These changes have led to higher levels of corporate responsibility. As a result, each organization participating in this benchmark study has added value and will derive value for the overall benefit of the healthcare providers throughout the nation. This study provides a better understanding of how the fundamental security needs of security in healthcare organizations are being addressed and its solutions identified and implemented.
Kwan, Mun Yee; Gordon, Kathryn H; Minnich, Allison M
2018-01-01
Empirical evidence suggests the importance of considering acculturative stress and perceived discrimination in understanding the mental health of ethnic minority groups, including their eating behaviors and associated psychopathology. The current study examined the effect of acculturative stress and perceived discrimination on eating disorder symptoms among ethnic minority undergraduate students. A total of 187 ethnic minority undergraduate students (41.2% men) completed this cross-sectional study by completing self-report questionnaires on a secure online system. Regression analyses revealed a main effect of acculturative stress on eating concern, shape concern, weight concern, drive for thinness, and bulimia but not restraint or body dissatisfaction. Gender moderated the effect of acculturative stress on drive for muscularity, suggesting that this effect was only significant in women, but not men. The main effect of perceived discrimination was significant for restraint, eating concern, shape concern, weight concern, and drive for muscularity but not drive for thinness, bulimia, or body dissatisfaction. Acculturative stress and perceived discrimination are important factors to consider in understanding the development and maintenance of eating disorder symptoms among ethnic minority populations. Targeting these two factors may improve the effectiveness of intervention programs for eating disorder symptoms among ethnic minority undergraduate students. Copyright © 2018 Elsevier Ltd. All rights reserved.
2006-03-01
20 6. Community Concerns........................................................................21 G ...44 viii 6. Community Concerns........................................................................45 G ...
Education, Underdevelopment, Unnecessary War and Human Security in Kosovo/Kosova
ERIC Educational Resources Information Center
Nelles, W.
2005-01-01
This paper examines educational linkages to persistent conflicts and contemporary security challenges in Kosovo. It reviews some historic foundations, debates and socioeconomic contexts concerning education as a security issue. It argues that poverty and underdevelopment coupled with failed diplomacy (particularly surrounding a 1996 ''Education…
77 FR 75223 - Spencer Pharmaceutical Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Spencer Pharmaceutical Inc.; Order of Suspension of Trading December 17, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Spencer Pharmaceutical Inc...
ERIC Educational Resources Information Center
Cianciolo, Patricia K.; Henderson, Tammy L.
2003-01-01
Describes modules on Social Security and Medicare for gerontology policy courses. Discusses collaborative exercises in which students explore Internet resources on Social Security and health care finance, identity major concerns about reforms, and enact scenarios about retirees with varying degrees of income and health care security. (Contains 33…
ERIC Educational Resources Information Center
Brown, David A.
2017-01-01
Information security is a concern for managers implementing protection measures. Implementing information security measures requires communicating both the reason and remediation for the protection measure. Examining how an anti-spyware security communication affects an individual's intention to implement a protection measure could help improve…
European Perceptions of Plan Colombia: A Virtual Contribution to a Virtual War and Peace Plan?
2001-05-01
government for more effective control of the paramilitary forces may help. A greater surge of European activism backed by development assistance funds and...economic, security, and political spillover effects for neighboring countries. Finally and logically, the author reflects the European concern that...economic, security, and political spillover effects for neighboring countries. Finally and logically, Roy reflects the European concern that whatever
ERIC Educational Resources Information Center
Holmes, Ryan Clevis
2014-01-01
Campus safety has been a source of concern since the 1990s. However, in 2007, the tragedy at the Virginia Polytechnic and State University sent a sense of alarm through many institutions of higher education. Immediately following this tragedy, institutions across the country began to evaluate and question their safety and security practices. While…
Pinto, Alexandra; Veríssimo, Manuela; Gatinho, Ana; Santos, António J; Vaughn, Brian E
2015-01-01
The present study aims to test Bowlby's suggestions concerning relations between the child's attachment quality with parents and subsequently constructed models of self-worth during early childhood. In most research on this question, attachment with mothers is considered in relation to self-worth but the child's attachment with fathers is not. Neither has the peer group been studied as an influence on child self-esteem, in the context of attachment research. This study addresses these relatively unstudied influences on child self-esteem. Attachment security to mother and father was measured by the Attachment Behavior Q-Set at two and half years of age. At five years of age social acceptance was measured using two sociometric techniques, and the self-esteem with the California Child Q-Sort. Our analyses indicated that security of the attachment to father and peer acceptance are both unique, significant predictors of the childrens' self-esteem. The security of the attachment to mother was also related to child self-esteem but did not emerge as a uniquely significant predictor. Peer acceptance appeared to moderate of the effect of the security of the attachment to father on the self-esteem of children. Our results extend the relatively sparse literature relating early attachments to self-esteem during early childhood.
16 CFR 602.1 - Effective dates.
Code of Federal Regulations, 2010 CFR
2010-01-01
... security number in a consumer report; (iv) Section 151(a)(1), concerning the summary of rights of identity..., concerning the prevention of repollution of consumer reports; (viii) Section 155, concerning notice by debt... consumers; (x) Section 212(a)-(d), concerning the disclosure of credit scores; (xi) Section 213(c...
76 FR 53164 - Puda Coal, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Puda Coal, Inc.; Order of Suspension of Trading August 19, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Puda Coal, Inc. (``Puda'') because (1) Puda...
75 FR 8156 - Electronic Game Card, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Electronic Game Card, Inc.; Order of Suspension of Trading February 19, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Electronic Game Card, Inc...
76 FR 49836 - Proposed Collection; Comment Request for Form 8846
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-11
... concerning Form 8846, Credit for Employer Social Security and Medicare Taxes Paid on Certain Employee Tips... Social Security and Medicare Taxes Paid on Certain Employee Tips. OMB Number: 1545-1414. Form Number... income tax credit for the amount of social security and Medicare taxes paid (employer's share) on tips...
78 FR 62931 - Pacific Clean Water Technologies, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Pacific Clean Water Technologies, Inc.; Order of Suspension of Trading October 11, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Pacific Clean Water...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-28
... accommodate customer clearing of credit default swaps that reference government securities. Treasury is also... regulations impose obligations concerning financial responsibility, protection of customer securities and... clearance of credit default swaps (CDS)\\8\\ transactions on behalf of customers of ICE Trust clearing members...
75 FR 22168 - Global Medical Products Holdings, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Global Medical Products Holdings, Inc., Order of Suspension of Trading April 23, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Global Medical Products...
75 FR 27847 - China Technology Global Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-05-18
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Technology Global Corp.; Order of Suspension of Trading May 14, 2010. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Technology Global Corp...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-24
... Activities; Proposed Information Collection; Comment Request; Securities Exchange Act Disclosure Rules (12 CFR Part 11) and Securities of Federal Savings Associations (12 CFR Part 194) AGENCY: Office of the... concerning its information collection titled, ``Securities Exchange Act Disclosure Rules (12 CFR part 11) and...
76 FR 6170 - Andresmin Gold Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-03
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Andresmin Gold Corp., Order of Suspension of Trading February 1, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Andresmin Gold Corp. because it has not...
77 FR 58424 - China Mobile Media Technology, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Mobile Media Technology, Inc., Order of Suspension of Trading September 18, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Mobile Media...
78 FR 58376 - Home System Group, Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Home System Group, Order of Suspension of Trading September 19, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Home System Group because Home System Group...
78 FR 71021 - Life Stem Genetics Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Life Stem Genetics Inc.; Order of Suspension of Trading November 25, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Life Stem Genetics Inc. because...
School Security and Student Misbehavior: A Multi-Level Examination
ERIC Educational Resources Information Center
Servoss, Timothy J.
2017-01-01
Despite a nationwide trend to increase security measures in schools, their effectiveness in reducing or preventing student misbehavior remains largely unexamined. In addition, there is concern that increased security may have unintended negative side effects and is applied inequitably across students of disparate racial/ethnic backgrounds. The…
77 FR 76160 - New Generation Biofuels Holdings, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] New Generation Biofuels Holdings, Inc.; Order of Suspension of Trading December 21, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of New Generation Biofuels...
77 FR 26796 - HydroGenetics, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] HydroGenetics, Inc.; Order of Suspension of... and accurate information concerning the securities of HydroGenetics, Inc. (``HydroGenetics'') because... require a suspension of trading in the securities of HydroGenetics. Therefore, it is ordered, pursuant to...
Computer Security Primer: Systems Architecture, Special Ontology and Cloud Virtual Machines
ERIC Educational Resources Information Center
Waguespack, Leslie J.
2014-01-01
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
78 FR 77769 - CompuSonics Video Corporation, Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-24
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] CompuSonics Video Corporation, Order of Suspension of Trading December 20, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of CompuSonics Video Corporation...
78 FR 32696 - Jupiter Enterprises, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Jupiter Enterprises, Inc., Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Jupiter Enterprises, Inc. because it has not...
A secure distributed logistic regression protocol for the detection of rare adverse drug events
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-01-01
Background There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. Objective To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. Methods We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. Results The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. Conclusion The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models. PMID:22871397
A secure distributed logistic regression protocol for the detection of rare adverse drug events.
El Emam, Khaled; Samet, Saeed; Arbuckle, Luk; Tamblyn, Robyn; Earle, Craig; Kantarcioglu, Murat
2013-05-01
There is limited capacity to assess the comparative risks of medications after they enter the market. For rare adverse events, the pooling of data from multiple sources is necessary to have the power and sufficient population heterogeneity to detect differences in safety and effectiveness in genetic, ethnic and clinically defined subpopulations. However, combining datasets from different data custodians or jurisdictions to perform an analysis on the pooled data creates significant privacy concerns that would need to be addressed. Existing protocols for addressing these concerns can result in reduced analysis accuracy and can allow sensitive information to leak. To develop a secure distributed multi-party computation protocol for logistic regression that provides strong privacy guarantees. We developed a secure distributed logistic regression protocol using a single analysis center with multiple sites providing data. A theoretical security analysis demonstrates that the protocol is robust to plausible collusion attacks and does not allow the parties to gain new information from the data that are exchanged among them. The computational performance and accuracy of the protocol were evaluated on simulated datasets. The computational performance scales linearly as the dataset sizes increase. The addition of sites results in an exponential growth in computation time. However, for up to five sites, the time is still short and would not affect practical applications. The model parameters are the same as the results on pooled raw data analyzed in SAS, demonstrating high model accuracy. The proposed protocol and prototype system would allow the development of logistic regression models in a secure manner without requiring the sharing of personal health information. This can alleviate one of the key barriers to the establishment of large-scale post-marketing surveillance programs. We extended the secure protocol to account for correlations among patients within sites through generalized estimating equations, and to accommodate other link functions by extending it to generalized linear models.
Climate Change Effects: Issues for International and US National Security
2009-07-01
impacts such as heat waves, major concerns are significant spreading of conditions for vector-borne diseases, such as dengue fever and malaria, and...U.S. national directives and strategic-level documents, and notable reports on specific climate change impacts or especially vulnerable regions ...add to tensions even in stable world regions . There is greater potential for failed states and political instability. Climate change acts as a
Transformation in the Developing World: An Analysis of Colombia’s Security Transformation
2004-09-01
familiar with this subject also took significant amounts of time from their busy schedules to grant telephone interviews and provide written guidance. For...allocations. Instead, there was a decrease in intelligence operative and analyst positions. Compared to the familiarity of the...the developing nation is not concerned with preparing a diverse global response strategy for an unknown enemy. Rather, it is generally familiar with
10 CFR 95.27 - Protection while in use.
Code of Federal Regulations, 2011 CFR
2011-01-01
... SECURITY INFORMATION AND RESTRICTED DATA Physical Security § 95.27 Protection while in use. While in use... disclosure authorization (see § 95.36 for additional information concerning disclosure authorizations). [64...
Cybercrimes vs. Cyberliberties
NASA Astrophysics Data System (ADS)
Strossen, Nadine
This new Introduction explains how all of the themes and conclusions of the original chapter remain valid despite intervening developments, including the 2001 terrorist attacks. It shows that the major points that the 1999 chapter made about one particular medium, at one particular historical point, concerning particular safety and security issues that were then at the forefront of public concern, apply more universally to other media, during other historical periods, and regarding other safety and security concerns. The Introduction supports this generalization by analyzing two sets of subsequent developments. First, it shows that post-911 surveillance measures that target communications, including Internet communications, violate freedom of speech and privacy without sufficient countervailing security benefits. Second, it shows that the government’s continuing efforts to suppress online sexual expression, in order to protect children from seeing it, continue appropriately to be struck down by the courts as violating free speech rights without sufficient countervailing benefits.
Rosenbaum, Benjamin P
2014-03-01
Radio frequency identification (RFID) technology has been implemented in a wide variety of industries. Health care is no exception. This article explores implementations and limitations of RFID in several health care domains: authentication, medication safety, patient tracking, and blood transfusion medicine. Each domain has seen increasing utilization of unique applications of RFID technology. Given the importance of protecting patient and data privacy, potential privacy and security concerns in each domain are discussed. Such concerns, some of which are inherent to existing RFID hardware and software technology, may limit ubiquitous adoption. In addition, an apparent lack of security standards within the RFID domain and specifically health care may also hinder the growth and utility of RFID within health care for the foreseeable future. Safeguarding the privacy of patient data may be the most important obstacle to overcome to allow the health care industry to take advantage of the numerous benefits RFID technology affords.
Information security : is your information safe?
DOT National Transportation Integrated Search
1999-01-01
This article characterizes the problem of cyber-terrorism, outlines the Federal government's response to several security-related concerns, and describes the Volpe Center's critical support to this response. The possibility of catastrophic terrorist ...
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-01-01
Background and objective While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Materials and methods Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software ‘R’ by effectively combining secret-sharing-based secure computation with original computation. Results Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50 000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. Discussion If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using ‘R’ that works interactively while secure computation protocols generally require a significant amount of processing time. Conclusions We propose a secure statistical analysis system using ‘R’ for medical data that effectively integrates secret-sharing-based secure computation and original computation. PMID:24763677
Chida, Koji; Morohashi, Gembu; Fuji, Hitoshi; Magata, Fumihiko; Fujimura, Akiko; Hamada, Koki; Ikarashi, Dai; Yamamoto, Ryuichi
2014-10-01
While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. Using secure computation, an approach from cryptography, our system can compute various statistics over encrypted medical records without decrypting them. An issue of secure computation is that the amount of processing time required is immense. We implemented a system that securely computes healthcare statistics from the statistical computing software 'R' by effectively combining secret-sharing-based secure computation with original computation. Testing confirmed that our system could correctly complete computation of average and unbiased variance of approximately 50,000 records of dummy insurance claim data in a little over a second. Computation including conditional expressions and/or comparison of values, for example, t test and median, could also be correctly completed in several tens of seconds to a few minutes. If medical records are simply encrypted, the risk of leaks exists because decryption is usually required during statistical analysis. Our system possesses high-level security because medical records remain in encrypted state even during statistical analysis. Also, our system can securely compute some basic statistics with conditional expressions using 'R' that works interactively while secure computation protocols generally require a significant amount of processing time. We propose a secure statistical analysis system using 'R' for medical data that effectively integrates secret-sharing-based secure computation and original computation. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.
Markwick, Nicole; McNeil, Ryan; Small, Will; Kerr, Thomas
2015-12-01
Private security guards occupy an increasingly prominent role in the policing of private and public spaces. There are growing concerns regarding security guards' potential to shape violence, discrimination, and adverse health outcomes among vulnerable populations, including people who use drugs (PWUD). This is relevant in Vancouver, Canada, where private security guards have increasingly been employed by private organizations to manage public and private spaces, including those within urban drug scenes. This qualitative study sought to understand interactions between PWUD and private security guards and explore their impacts on health care access, risks, and harms among PWUD. Semi-structured interviews were conducted with 30 PWUD recruited from two ongoing prospective cohort studies. Interviews were transcribed and analyzed using a coding framework comprised of a priori and emergent categories. Study data indicate that participants experience pervasive, discriminatory profiling and surveillance by security guards, which exacerbates existing social marginalization and structural vulnerability, particularly among PWUD of Aboriginal ancestry. Participants reported that security guards restrict PWUD's access to public and private spaces, including pharmacies and hospitals. PWUD also reported that their interactions with security guards often involved interpersonal violence and aggression, experiences that served to increase their vulnerability to subsequent risks and harms. Our findings highlight that private security forces contribute significantly to the everyday violence experienced by PWUD within drug scenes and elsewhere and do so in a manner very similar to that of traditional police forces. These findings point to the urgent need for greater oversight and training of private security guards in order to protect the health and safety of PWUD.
Vaccine innovation: lessons from World War II.
Hoyt, Kendall
2006-01-01
World War II marked a watershed in the history of vaccine development as the military, in collaboration with academia and industry, achieved unprecedented levels of innovation in response to war-enhanced disease threats such as influenza and pneumococcal pneumonia. In the 1940s alone, wartime programs contributed to the development of new or significantly improved vaccines for 10 of the 28 vaccine-preventable diseases identified in the 20th century. This article examines the historical significance of military organizations and national security concerns for vaccine development in the United States.
FMDP reactor alternative summary report. Volume 1 - existing LWR alternative
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greene, S.R.; Bevard, B.B.
1996-10-07
Significant quantities of weapons-usable fissile materials [primarily plutonium and highly enriched uranium (HEU)] are becoming surplus to national defense needs in both the United States and Russia. These stocks of fissile materials pose significant dangers to national and international security. The dangers exist not only in the potential proliferation of nuclear weapons but also in the potential for environmental, safety, and health (ES&H) consequences if surplus fissile materials are not properly managed. This document summarizes the results of analysis concerned with existing light water reactor plutonium disposition alternatives.
2011-01-01
Background The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Methods Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Results Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. Conclusions These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. PMID:22070906
Ground water security and drought in Africa: linking availability, access, and demand.
Calow, Roger C; Macdonald, Alan M; Nicol, Alan L; Robins, Nick S
2010-01-01
Drought in Africa has been extensively researched, particularly from meteorological, agricultural, and food security perspectives. However, the impact of drought on water security, particularly ground water dependent rural water supplies, has received much less attention. Policy responses have concentrated on food needs, and it has often been difficult to mobilize resources for water interventions, despite evidence that access to safe water is a serious and interrelated concern. Studies carried out in Ghana, Malawi, South Africa, and Ethiopia highlight how rural livelihoods are affected by seasonal stress and longer-term drought. Declining access to food and water is a common and interrelated problem. Although ground water plays a vital role in buffering the effects of rainfall variability, water shortages and difficulties in accessing water that is available can affect domestic and productive water uses, with knock-on effects on food consumption and production. Total depletion of available ground water resources is rarely the main concern. A more common scenario is a spiral of water insecurity as shallow water sources fail, additional demands are put on remaining sources, and mechanical failures increase. These problems can be planned for within normal development programs. Water security mapping can help identify vulnerable areas, and changes to monitoring systems can ensure early detection of problems. Above all, increasing the coverage of ground water-based rural water supplies, and ensuring that the design and siting of water points is informed by an understanding of hydrogeological conditions and user demand, can significantly increase the resilience of rural communities to climate variability.
van Dongen, Diana; Smid, Tjabe; Timmermans, Daniëlle R M
2011-11-09
The amount of exposure to electromagnetic fields (EMF) at work is mainly determined by an individual's occupation and may differ from exposure at home. It is, however, unknown how different occupational groups perceive possible adverse health effects of EMF. Three occupational groups, the general Dutch working population (n = 567), airport security officers who work with metal detectors (n = 106), and MRI radiographers who work with MRI (n = 193), were compared on perceived risk of and positive and negative feelings towards EMF in general and of different EMF sources, and health concerns by using analyses of variances. Data were collected via an internet survey. Overall, MRI radiographers had a lower perceived risk, felt less negative, and more positive towards EMF and different sources of EMF than the general working population and the security officers. For security officers, feeling more positive about EMF was not significantly related to perceived risk of EMF in general or EMF of domestic sources. Feeling positive about a source did not generalize to a lower perceived risk, while negative feelings were stronger related to perceived risk. MRI radiographers had fewer health concerns regarding EMF than the other two groups, although they considered it more likely that EMF could cause physical complaints. These data show that although differences in occupation appear to be reflected in different perceptions of EMF, the level of occupational exposure to EMF as such does not predict the perceived health risk of EMF. © 2011 van Dongen et al; licensee BioMed Central Ltd.
76 FR 16462 - In the Matter of Heli Electronics Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Heli Electronics Corp., Order of Suspension of Trading March 21, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Heli Electronics Corp...
Security basics for long-term care facilities.
Green, Martin
2015-01-01
The need for Long-Term Care (LTC) facilities is growing, the author reports, and along with it the need for programs to address the major security concerns of such facilities. In this article he explains how to apply the IAHSS Healthcare Security Industry Guidelines and the Design Guidelines to achieve a safer LTC facility.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Future Now Group, Inc., and Gammacan International, Inc.; Order of Suspension of Trading June 5, 2012. It appears to the Securities and Exchange... concerning the securities of Gammacan International, Inc. because it has not filed any periodic reports since...
76 FR 6499 - China 9D Construction Group; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China 9D Construction Group; Order of Suspension of Trading February 2, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China 9D Construction Group...
33 CFR 105.405 - Format and content of the Facility Security Plan (FSP).
Code of Federal Regulations, 2010 CFR
2010-07-01
... Vulnerability and Security Measures Summary (Form CG-6025) in appendix A to part 105-Facility Vulnerability and... resubmission of the FSP. (c) The Facility Vulnerability and Security Measures Summary (Form CG-6025) must be completed using information in the FSA concerning identified vulnerabilities and information in the FSP...
78 FR 55134 - China Cablecom Holdings Ltd., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-09
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Cablecom Holdings Ltd., Order of Suspension of Trading September 5, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Cablecom Holdings Ltd. (n/k...
78 FR 50480 - In the Matter of Redfin Network, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Redfin Network, Inc.; Order of Suspension of Trading August 15, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Redfin Network, Inc...
76 FR 28117 - Order of Suspension of Trading; City Network, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; City Network, Inc. May 11, 2011. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of City Network, Inc. because it has not filed...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-07-24
... particular security. Savings associations, regardless of size, should not purchase securities for which they... characteristics to be purchased and held by insured savings associations. Under section 362.11(b), a savings... management's credit risk analysis and its use in examiner decisions concerning investment security risk...
Database Security: What Students Need to Know
ERIC Educational Resources Information Center
Murray, Meg Coffin
2010-01-01
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
78 FR 55769 - North China Horticulture, Inc., File No. 500-1; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-11
... SECURITIES AND EXCHANGE COMMISSION North China Horticulture, Inc., File No. 500-1; Order of Suspension of Trading September 6, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of North China Horticulture, Inc...
An Autonomic Framework for Integrating Security and Quality of Service Support in Databases
ERIC Educational Resources Information Center
Alomari, Firas
2013-01-01
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…
78 FR 21634 - Order of Suspension of Trading; in the Matter of Integrity Bancshares, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-11
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; in the Matter of Integrity Bancshares, Inc. April 9, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Integrity...
78 FR 4481 - Order of Suspension of Trading; in the Matter of Medex, Inc.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; in the Matter of Medex, Inc. January 17, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Medex, Inc. (``Medex'') because...
78 FR 47813 - In the Matter of Bergamo Acquisition Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Bergamo Acquisition Corp.; Order of Suspension of Trading August 2, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Bergamo Acquisition...
77 FR 31682 - In the Matter of Indocan Resources, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Indocan Resources, Inc.; Order of Suspension of Trading May 24, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Indocan Resources, Inc...
Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination
ERIC Educational Resources Information Center
Foltz, C. Bryan; Renwick, Janet S.
2011-01-01
The authors examined the extent to which information systems (IS) security and computer crime are covered in information systems programs. Results suggest that IS faculty believe security coverage should be increased in required, elective, and non-IS courses. However, respondent faculty members are concerned that existing curricula leave little…
Strategies to Minimize the Effects of Information Security Threats on Business Performance
ERIC Educational Resources Information Center
Okoye, Stella Ifeyinwa
2017-01-01
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Channel America Television Network, Inc., EquiMed, Inc., Kore Holdings, Inc., Robotic Vision Systems, Inc. (n/k/a Acuity Cimatrix, Inc.), Security... information concerning the securities of Channel America Television Network, Inc. because it has not filed any...
Hydrocomplexity: Addressing water security and emergent environmental risks
NASA Astrophysics Data System (ADS)
Kumar, Praveen
2015-07-01
Water security and emergent environmental risks are among the most significant societal concerns. They are highly interlinked to other global risks such as those related to climate, human health, food, human migration, biodiversity loss, urban sustainability, etc. Emergent risks result from the confluence of unanticipated interactions from evolving interdependencies between complex systems, such as those embedded in the water cycle. They are associated with the novelty of dynamical possibilities that have significant potential consequences to human and ecological systems, and not with probabilities based on historical precedence. To ensure water security we need to be able to anticipate the likelihood of risk possibilities as they present the prospect of the most impact through cascade of vulnerabilities. They arise due to a confluence of nonstationary drivers that include growing population, climate change, demographic shifts, urban growth, and economic expansion, among others, which create novel interdependencies leading to a potential of cascading network effects. Hydrocomplexity aims to address water security and emergent risks through the development of science, methods, and practices with the potential to foster a "Blue Revolution" akin to the Green revolution for food security. It blends both hard infrastructure based solution with soft knowledge driven solutions to increase the range of planning and design, management, mitigation and adaptation strategies. It provides a conceptual and synthetic framework to enable us to integrate discovery science and engineering, observational and information science, computational and communication systems, and social and institutional approaches to address consequential water and environmental challenges.
The Indian National Food Security Act, 2013: a commentary.
Varadharajan, Kiruba Sankar; Thomas, Tinku; Kurpad, Anura
2014-06-01
The National Food Security Act (NFSA) 2013, passed recently by the Indian Parliament, aims to ensure food security in India, chiefly by providing cereals at subsidized prices through the Targeted Public Distribution System (TPDS) for about two-thirds of households. The predominant line of criticism of the NFSA has been the costs of such an ambitious rights-based approach in the context of decelerating economic growth and growing fiscal deficits. We argue that the food subsidy has been increasing through the last few decades and is set to climb even higher with this act but that the incremental costs, at about 0.2% of gross domestic product, are not as high as claimed. Further, recent evidence of increasing utilization of the TPDS and decreasing corruption add credence to the act's premise that significant income transfers to poor households can be achieved, thereby promoting food security as well as dietary diversity. Several concerns remain to be addressed in the design and implementation of the act, including its proposed coverage, a cereal-centric approach, the identification of beneficiaries, and its adaptability at the state level. If these are resolved effectively, the act can prove to be a significant step forward in India's long-drawn-out battle against undernutrition and food insecurity. Finally, the NFSA also provides a fresh opportunity to reform and strengthen the TPDS, which has been an integral component of India's strategy to achieve food security at the national level.
SecureMA: protecting participant privacy in genetic association meta-analysis.
Xie, Wei; Kantarcioglu, Murat; Bush, William S; Crawford, Dana; Denny, Joshua C; Heatherly, Raymond; Malin, Bradley A
2014-12-01
Sharing genomic data is crucial to support scientific investigation such as genome-wide association studies. However, recent investigations suggest the privacy of the individual participants in these studies can be compromised, leading to serious concerns and consequences, such as overly restricted access to data. We introduce a novel cryptographic strategy to securely perform meta-analysis for genetic association studies in large consortia. Our methodology is useful for supporting joint studies among disparate data sites, where privacy or confidentiality is of concern. We validate our method using three multisite association studies. Our research shows that genetic associations can be analyzed efficiently and accurately across substudy sites, without leaking information on individual participants and site-level association summaries. Our software for secure meta-analysis of genetic association studies, SecureMA, is publicly available at http://github.com/XieConnect/SecureMA. Our customized secure computation framework is also publicly available at http://github.com/XieConnect/CircuitService. © The Author 2014. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2012 CFR
2012-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2014 CFR
2014-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2013 CFR
2013-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
6 CFR 37.15 - Physical security features for the driver's license or identification card.
Code of Federal Regulations, 2011 CFR
2011-01-01
.... (3) Level 3. Inspection by forensic specialists. (d) Document security and integrity. States must... independent laboratory experienced with adversarial analysis of identification documents concerning one or...
Update on security plans to prevent bioterrorism attacks during agricultural bacilli programs
Robert A. Fusco
2003-01-01
In the aftermath of September 11, security in aerial application suppression programs utilizing Bacillus thuringiensis has become a critical concern for State pest control managers and aerial applicators.
Hybrid architecture for building secure sensor networks
NASA Astrophysics Data System (ADS)
Owens, Ken R., Jr.; Watkins, Steve E.
2012-04-01
Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.
Diagnosing water security in the rural North with an environmental security framework.
Penn, Henry J F; Loring, Philip A; Schnabel, William E
2017-09-01
This study explores the nature of water security challenges in rural Alaska, using a framework for environmental security that entails four interrelated concepts: availability, access, utility, and stability of water resources. Many researchers and professionals agree that water insecurity is a problem in rural Alaska, although the scale and nature of the problem is contested. Some academics have argued that the problem is systemic, and rooted in an approach to water security by the state that prioritizes economic concerns over public health concerns. Health practitioners and state agencies, on the other hand, contend that much progress has been made, and that nearly all rural households have access to safe drinking water, though many are still lacking 'modern' in-home water service. Here, we draw on a synthesis of ethnographic research alongside data from state agencies to show that the persistent water insecurity problems in rural Alaska are not a problem of access to or availability of clean water, or a lack of 'modern' infrastructure, but instead are rooted in complex human dimensions of water resources management, including the political legacies of state and federal community development schemes that did not fully account for local needs and challenges. The diagnostic approach we implement here helps to identify solutions to these challenges, which accordingly focus on place-based needs and empowering local actors. The framework likewise proves to be broadly applicable to exploring water security concerns elsewhere in the world. Copyright © 2017 Elsevier Ltd. All rights reserved.
Cyber-Physical System Security of a Power Grid: State-of-the-Art
Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing
2016-07-14
Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less
Cyber-Physical System Security of a Power Grid: State-of-the-Art
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing
Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less
Arms Control and Nonproliferation: A Catalog of Treaties and Agreements
2007-08-09
security and control over nuclear weapons and fissile materials. These projects provided Russia with bullet-proof Kevlar blankets, secure canisters ...U.S. security concerns. The United States and Soviet Union began to sign agreements limiting their strategic offensive nuclear weapons in the early...U.S.-Russian relationship. At the same time, however, the two sides began to cooperate on securing and eliminating Soviet-era nuclear , chemical, and
ERIC Educational Resources Information Center
Zahadat, Nima
2016-01-01
With the rapid increase of smartphones and tablets, security concerns have also been on the rise. Traditionally, Information Technology (IT) departments set up devices, apply security, and monitor them. Such approaches do not apply to today's mobile devices due to a phenomenon called Bring Your Own Device or BYOD. Employees find it desirable to…
Walker, Daniel M; Johnson, Tyler; Ford, Eric W; Huerta, Timothy R
2017-01-04
As electronic health records (EHRs) become ubiquitous in the health care industry, privacy breaches are increasing and being made public. These breaches may make consumers wary of the technology, undermining its potential to improve care coordination and research. Given the developing concerns around privacy of personal health information stored in digital format, it is important for providers to understand how views on privacy and security may be associated with patient disclosure of health information. This study aimed to understand how privacy concerns may be shifting patient behavior. Using a pooled cross-section of data from the 2011 and 2014 cycles of the Health Information and National Trends Survey (HINTS), we tested whether privacy and security concerns, as well as quality perceptions, are associated with the likelihood of withholding personal health information from a provider. A fully interacted multivariate model was used to compare associations between the 2 years, and interaction terms were used to evaluate trends in the factors that are associated with withholding behavior. No difference was found regarding the effect of privacy and security concerns on withholding behavior between 2011 and 2014. Similarly, whereas perceived high quality of care was found to reduce the likelihood of withholding information from a provider in both 2011 (odds ratio [OR] 0.73, 95% confidence interval [CI] 0.56-0.94) and 2014 (OR 0.61, 95% CI 0.48-0.76), no difference was observed between years. These findings suggest that consumers' beliefs about EHR privacy and security, the relationship between technology use and quality, and intentions to share information with their health care provider have not changed. These findings are counter to the ongoing discussions about the implications of security failures in other domains. Our results suggest that providers could ameliorate privacy and security by focusing on the care quality benefits EHRs provide. ©Daniel M Walker, Tyler Johnson, Eric W Ford, Timothy R Huerta. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 04.01.2017.
Resident Use of Text Messaging for Patient Care: Ease of Use or Breach of Privacy?
Prochaska, Micah T; Bird, Amber-Nicole; Chadaga, Amar; Arora, Vineet M
2015-11-26
Short message service (SMS) text messaging is an efficient form of communication and pervasive in health care, but may not securely protect patient information. It is unclear if resident providers are aware of the security concerns of SMS text messaging when communicating about patient care. We sought to compare residents' preferences for SMS text messaging compared with other forms of in-hospital communication when considering security versus ease of use. This study was a cross-sectional multi-institutional survey of internal medicine residents. Residents ranked different communication modalities based on efficiency, ease of use, and security using a Likert scale. Communication options included telephone, email, hospital paging, and SMS text messaging. Respondents also reported whether they had received confidential patient identifiers through any of these modalities. SMS text messaging was preferred by 71.7% (94/131) of respondents because of its efficiency and by 79.8% (103/129) of respondents because of its ease of use. For security, 82.5% (104/126) of respondents preferred the hospital paging system, whereas only 20.6% (26/126) of respondents preferred SMS text messaging for secure communication. In all, 70.9% (93/131) of respondents reported having received patient identifiers (first and/or last name), 81.7% (107/131) reported receiving patient initials, and 50.4% (66/131) reported receiving a patient's medical record number through SMS text messages. Residents prefer in-hospital communication through SMS text messaging because of its ease of use and efficiency. Despite security concerns, the majority of residents reported receiving confidential patient information through SMS text messaging. For providers, it is possible that the benefits of improved in-hospital communication with SMS text messaging and the presumed improvement in the coordination and delivery of patient care outweigh security concerns they may have. The tension between the security and convenience of SMS text messaging may represent an educational opportunity to ensure the compliance of mobile technology in the health care setting.
Code of Federal Regulations, 2010 CFR
2010-01-01
.... Classified official record material will be processed to the Information Systems and Technology, Records.../CSS Directorate for Information Systems Security, Ft. Meade, Maryland 20755. Specifications concerning..., DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of Classified...
Cache Hardware Approaches to Multiple Independent Levels of Security (MILS)
2012-10-01
systems that require that several multicore processors be connected together in a single system. However, no such boards were available on the market ...available concerning each module. However, the availability of modules seems to significantly lag the time when the corresponding hardware hits the market ...version of real mode often referred to as “Unreal mode” can be entered by loading a Local Descriptor Table (LDT) and Global Descriptor Table (GDT
Maritime Law Enforcement: A Critical Capability for the Navy?
2012-03-01
the need for robust maritime security utilizing law enforcement capabilities is in demand. 2. National Concern The significance of nontraditional... utilize their navies for maritime law enforcement.16 So, why does the U.S. Navy not perform law enforcement? The Navy defers on law enforcement...Summer, 2007), 30. 31 Geoffrey Mones and Andrew Webb, “The Coast Guard Needs Help from the . . . Navy and Marine Corps,” Vol. 130: Proceedings 130, no
Smallpox as a Bioweapon: Should We Be Concerned?
2012-03-01
United Nations U.S. United States of America USAMRIID United States Army Medical Research Institute of Infectious Diseases USFK United States Forces...Union or in the United States of America . There the virus would remain secured, yet available to fulfill future scientific needs.2 The only remaining...smallpox or could be able to manufacture the virus in a laboratory, combined with the fact that the United States of America has a significantly
2018-01-01
Background The diffusion of health information technologies (HITs) within the health care sector continues to grow. However, there is no theory explaining how success of HITs influences patient care outcomes. With the increase in data breaches, HITs’ success now hinges on the effectiveness of data protection solutions. Still, empirical research has only addressed privacy concerns, with little regard for other factors of information assurance. Objective The objective of this study was to study the effectiveness of HITs using the DeLone and McLean Information Systems Success Model (DMISSM). We examined the role of information assurance constructs (ie, the role of information security beliefs, privacy concerns, and trust in health information) as measures of HIT effectiveness. We also investigated the relationships between information assurance and three aspects of system success: attitude toward health information exchange (HIE), patient access to health records, and perceived patient care quality. Methods Using structural equation modeling, we analyzed the data from a sample of 3677 cancer patients from a public dataset. We used R software (R Project for Statistical Computing) and the Lavaan package to test the hypothesized relationships. Results Our extension of the DMISSM to health care was supported. We found that increased privacy concerns reduce the frequency of patient access to health records use, positive attitudes toward HIE, and perceptions of patient care quality. Also, belief in the effectiveness of information security increases the frequency of patient access to health records and positive attitude toward HIE. Trust in health information had a positive association with attitudes toward HIE and perceived patient care quality. Trust in health information had no direct effect on patient access to health records; however, it had an indirect relationship through privacy concerns. Conclusions Trust in health information and belief in the effectiveness of information security safeguards increases perceptions of patient care quality. Privacy concerns reduce patients’ frequency of accessing health records, patients’ positive attitudes toward HIE exchange, and overall perceived patient care quality. Health care organizations are encouraged to implement security safeguards to increase trust, the frequency of health record use, and reduce privacy concerns, consequently increasing patient care quality. PMID:29643052
The power of silver: age and identity politics in the 21st century.
Gilleard, Chris; Higgs, Paul
2009-01-01
Pensioner political movements emerged in the interwar years in America and Europe. Documentary and empirical analyses confirm the influential role such movements played in helping shape the postwar social security systems of Western societies. Pensioner movements, qua pensioner movements, have failed to retain their influence, despite that "old age" and its demographic significance have become more salient. We propose three explanations for this: the first concerns the failure of old age to connect with the generational ethos of identity politics; the second reflects the nature of the actors now involved in the governance of old age; and the third concerns the individualization of retirement as a phase of life.
Clinton administration forging population-foreign policy links.
De Sherbinin, A
1994-12-01
In the US, the Clinton administration has renewed the link between global population and national security issues. These so-called "soft security issues" receive attention from the Under-Secretary of State for Global Affairs, Tim Wirth, and the senior director of the Global Environmental Affairs branch of the National Security Council, Eileen Claussen. Wirth and Claussen draft the US response to soft security issues such as environmental security, refugee and migration movements, political instability, and religious and ethnic conflict as well as the other nonmilitary threats of illegal drug trafficking, terrorism, and international organized crime. Population was first considered a foreign policy concern in the 1960s. By 1965, President Johnson decided that the US would provide family planning supplies and technical assistance to any country which asked for help. The initial justification for assuming a leading role in developing innovative population strategies for less developed countries was a humanitarian desire to forward economic development, the self-interest of maintaining access to resources, and concern that rapid growth produced more communists. Today the US remains concerned about resource access and economic development and is also wary of spill-over environmental effects, economic migration, diminished US trade opportunities, political asylum seekers and refugees, and increasing demand for US peacekeepers. It is also believed that rapid population growth leads to political destabilization. Critics of these views blame the development difficulties of less developed countries on poor governing decisions (inadequate institutions, trade barriers, or indifference). Women's reproductive rights advocates fear that using security as a rationale for population assistance could lead to restrictions on women's rights to choose the number and spacing of births. Despite such objections, the belief that population growth is an underlying problem in imploding states like Haiti, Rwanda, and Somalia has turned the attention of US policy-makers to these soft security issues.
78 FR 50135 - Soil Biogenics Ltd., File No. 500-1; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... SECURITIES AND EXCHANGE COMMISSION Soil Biogenics Ltd., File No. 500-1; Order of Suspension of Trading August 14, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Soil Biogenics Ltd. because it has not filed...
78 FR 59738 - Left Behind Games, Inc., File No. 500-1; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-27
... SECURITIES AND EXCHANGE COMMISSION Left Behind Games, Inc., File No. 500-1; Order of Suspension of Trading September 25, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Left Behind Games, Inc. (``Left Behind...
77 FR 16113 - ASP Ventures Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] ASP Ventures Corp., Order of Suspension of Trading March 15, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of ASP Ventures Corp. because it has not filed any periodic reports since the period ended...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-26
... the Securities Exchange Act of 1934 (``Exchange Act'') concerning large trader reporting to assist the... persons are referred to as ``large traders'').\\1\\ \\1\\ See Securities Exchange Act Release No. 64976 (July... person is a large trader: (1) Any transaction that is part of an offering of securities by or on behalf...
77 FR 55248 - eHydrogen Solutions, Inc., and ChromoCure, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] eHydrogen Solutions, Inc., and ChromoCure, Inc.; Order of Suspension of Trading September 5, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of eHydrogen...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-26
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69196] Order Granting a Limited Exemption From... to Regulation M Rule 102(e) March 20, 2013. The Securities and Exchange Commission (``Commission...\\ In connection with the Program, an MQP Company \\2\\ may list an eligible MQP Security \\3\\ on NASDAQ...
78 FR 4907 - In the Matter of AlphaTrade.com; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-01-23
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of AlphaTrade.com ; Order of Suspension of Trading January 18, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of AlphaTrade.com because it has not...
77 FR 5865 - In the Matter of Beicang Iron & Steel, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Beicang Iron & Steel, Inc.; Order of Suspension of Trading February 2, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Beicang Iron...
77 FR 26588 - In the Matter of Recycle Tech, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Recycle Tech, Inc.; Order of Suspension of Trading May 2, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Recycle Tech, Inc. (``Recycle Tech...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Benda Pharmaceutical, Inc. and China Shuangjii Cement Ltd., Order of Suspension of Trading May 15, 2013. It appears to the Securities and Exchange... concerning the securities of China Shuangji Cement Ltd. because it has not filed any periodic reports since...
77 FR 5865 - In the Matter of Blue Earth Refineries, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Blue Earth Refineries, Inc.; Order of Suspension of Trading February 2, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Blue Earth...
78 FR 32696 - China Properties Developments, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Properties Developments, Inc.; Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Properties Developments, Inc. because it has not filed any periodic...
78 FR 32696 - China Environmental Protection, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-31
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Environmental Protection, Inc., Order of Suspension of Trading May 29, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Environmental Protection, Inc. because it has not filed any periodi...
Water security evaluation in Yellow River basin
NASA Astrophysics Data System (ADS)
Jiang, Guiqin; He, Liyuan; Jing, Juan
2018-03-01
Water security is an important basis for making water security protection strategy, which concerns regional economic and social sustainable development. In this paper, watershed water security evaluation index system including 3 levels of 5 criterion layers (water resources security, water ecological security and water environment security, water disasters prevention and control security and social economic security) and 24 indicators were constructed. The entropy weight method was used to determine the weights of the indexes in the system. The water security index of 2000, 2005, 2010 and 2015 in Yellow River basin were calculated by linear weighting method based on the relative data. Results show that the water security conditions continue to improve in Yellow River basin but still in a basic security state. There is still a long way to enhance the water security in Yellow River basin, especially the water prevention and control security, the water ecological security and water environment security need to be promoted vigorously.
Habersaat, Stephanie; Monnier, Maryline; Peter, Camille; Bolomey, Luce; Borghini, Ayala; Despars, Josée; Pierrehumbert, Blaise; Müller-Nix, Carole; Ansermet, François; Hohlfeld, Judith
2013-04-23
Objective : The main objective of this study was to assess mother-child patterns of interaction in relation to later quality of attachment in a group of children with an orofacial cleft compared with children without cleft. Design : Families were contacted when the child was 2 months old for a direct assessment of mother-child interaction and then at 12 months for a direct assessment of the child's attachment. Data concerning socioeconomical information and posttraumatic stress symptoms in mothers were collected at the first appointment. Participants : Forty families of children with a cleft and 45 families of children without cleft were included in the study. Families were recruited at birth in the University Hospital of Lausanne. Results : Results showed that children with a cleft were more difficult and less cooperative during interaction at 2 months of age with their mother compared with children without a cleft. No significant differences were found in mothers or in dyadic interactive styles. Concerning the child's attachment at 12 months old, no differences were found in attachment security. However, secure children with a cleft were significantly more avoidant with their mother during the reunion episodes than secure children without cleft. Conclusion : Despite the facial disfigurement and the stress engendered by treatment during the first months of the infant's life, children with cleft and their mothers are doing as well as families without cleft with regard to the mothers' mental health, mother-child relationships, and later quality of attachment. A potential contribution for this absence of difference may be the pluridisciplinary support that families of children with cleft benefit from in Lausanne.
Habersaat, Stephanie; Monnier, Maryline; Peter, Camille; Bolomey, Luce; Borghini, Ayala; Despars, Josée; Pierrehumbert, Blaise; Müller-Nix, Carole; Ansermet, François; Hohlfeld, Judith
2013-11-01
Objective : The main objective of this study was to assess mother-child patterns of interaction in relation to later quality of attachment in a group of children with an orofacial cleft compared with children without cleft. Design : Families were contacted when the child was 2 months old for a direct assessment of mother-child interaction and then at 12 months for a direct assessment of the child's attachment. Data concerning socioeconomical information and posttraumatic stress symptoms in mothers were collected at the first appointment. Participants : Forty families of children with a cleft and 45 families of children without cleft were included in the study. Families were recruited at birth in the University Hospital of Lausanne. Results : Results showed that children with a cleft were more difficult and less cooperative during interaction at 2 months of age with their mother compared with children without a cleft. No significant differences were found in mothers or in dyadic interactive styles. Concerning the child's attachment at 12 months old, no differences were found in attachment security. However, secure children with a cleft were significantly more avoidant with their mother during the reunion episodes than secure children without cleft. Conclusion : Despite the facial disfigurement and the stress engendered by treatment during the first months of the infant's life, children with cleft and their mothers are doing as well as families without cleft with regard to the mothers' mental health, mother-child relationships, and later quality of attachment. A potential contribution for this absence of difference may be the pluridisciplinary support that families of children with cleft benefit from in Lausanne.
Evaluation of a proximity card authentication system for health care settings.
Fontaine, Jacqueline; Zheng, Kai; Van De Ven, Cosmas; Li, Huiyang; Hiner, James; Mitchell, Kathy; Gendler, Stephen; Hanauer, David A
2016-08-01
Multiple users access computer workstations in busy clinical settings, requiring many logins throughout the day as users switch from one computer to another. This can lead to workflow inefficiencies as well as security concerns resulting from users sharing login sessions to save time. Proximity cards and readers have the potential to improve efficiency and security by allowing users to access clinical workstations simply by bringing the card near the reader, without the need for manual entry of a username and password. To assess the perceived impact of proximity cards and readers for rapid user authentication to clinical workstations in the setting of an existing electronic health record with single sign-on software already installed. Questionnaires were administered to clinical faculty and staff five months before and three months after the installation of proximity card readers in an inpatient birthing center and an outpatient obstetrics clinic. Open-ended feedback was also collected and qualitatively analyzed. There were 71 and 33 responses to the pre- and post-implementation surveys, respectively. There was a significant increase in the perceived speed of login with the proximity cards, and a significant decrease in the self-reported occurrence of shared login sessions between users. Feedback regarding the system was mostly positive, although several caveats were noted, including minimal benefit when used with an obstetric application that did not support single sign-on. Proximity cards and readers, along with single sign-on software, have the potential to enhance workflow efficiency by allowing for faster login times and diminish security concerns by reducing shared logins on clinical workstations. The positive feedback was used by our health system leadership to support the expanded implementation of the proximity card readers throughout the clinical setting. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
TCIA Secure Cyber Critical Infrastructure Modernization.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Keliiaa, Curtis M.
The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.
ERIC Educational Resources Information Center
Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.
2003-01-01
Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…
Ensuring the security and availability of a hospital wireless LAN system.
Hanada, Eisuke; Kudou, Takato; Tsumoto, Shusaku
2013-01-01
Wireless technologies as part of the data communication infrastructure of modern hospitals are being rapidly introduced. Even though there are concerns about problems associated with wireless communication security, the demand is remarkably large. Herein we discuss security countermeasures that must be taken and issues concerning availability that must be considered to ensure safe hospital/business use of wireless LAN systems, referring to the procedures introduced at a university hospital. Security countermeasures differ according to their purpose, such as preventing illegal use or ensuring availability, both of which are discussed. The main focus of the availability discussion is on signal reach, electromagnetic noise elimination, and maintaining power supply to the network apparatus. It is our hope that this information will assist others in their efforts to ensure safe implementation of wireless LAN systems, especially in hospitals where they have the potential to greatly improve information sharing and patient safety.
NASA Astrophysics Data System (ADS)
Blount, P. J.
2017-06-01
Since the very beginning of the space age, security has been the critical, overriding concern at the heart of both international and domestic space law regimes. While these regimes certainly encompass broader interests, such as commercial uses of outer space, they are built on a legal foundation that is largely intended to regularize interactions among space actors to ensure security, safety, and sustainability in the space environment. Space security law, as a result, has central goals of both maintaining peace and providing security as a public good for the benefit of humankind. The idea of security is a technical and political construct. The law is a tool that is used to articulate that construct as concept and operationalize it as a value. As such, space security law is a network of law and regulation that governs a wide variety of space activities. There are four broad categories that typify the various manifestations of space security law: international peace and security; national security; human security; and space safety and sustainability. International peace and security, the first category, is directly concerned with the international law and norms that have been adopted to decrease the risk of conflict between states. National security, category two, consists of domestic law that implements, at the national level, the obligations found in the first category as well as law that promotes other national security goals. Human security, the third category, is the loose set of law and policy directed at the use of space for the protection of human populations, such as disaster response and planetary protection. Finally, the fourth category, space safety and security, represents the emerging body of law and policy that seeks to protect the space environment through measures that address space debris and harmful contamination. Obviously, these categories overlap and laws can serve duplicative purposes, but this compartmentalization reveals much about the legal structures that surround core security projects being pursued in and through space.
46 CFR 170.055 - Definitions concerning a vessel.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 46 Shipping 7 2010-10-01 2010-10-01 false Definitions concerning a vessel. 170.055 Section 170.055 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) SUBDIVISION AND STABILITY STABILITY REQUIREMENTS FOR ALL INSPECTED VESSELS Definitions § 170.055 Definitions concerning a vessel. (a) Auxiliary...
Secure Server Login by Using Third Party and Chaotic System
NASA Astrophysics Data System (ADS)
Abdulatif, Firas A.; zuhiar, Maan
2018-05-01
Server is popular among all companies and it used by most of them but due to the security threat on the server make this companies are concerned when using it so that in this paper we will design a secure system based on one time password and third parity authentication (smart phone). The proposed system make security to the login process of server by using one time password to authenticate person how have permission to login and third parity device (smart phone) as other level of security.
76 FR 30326 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-25
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... United States of America and the Government of Japan Concerning Peaceful Uses of Nuclear Energy. DATES... Energy. Anne M. Harrington, Deputy Administrator, Defense Nuclear Nonproliferation. [FR Doc. 2011-12919...
Water security - Nation state and international security implications
Tindall, James A.; Andrew A. Campbell,
2009-01-01
A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.
2015-12-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Semiannual Report to Congress on the Effectiveness of the Civil Aviation Security Program.
1986-05-30
and airport security measures in effect. Section V of this report provides a smry of firearms which were detected at screening points under suspicious...with the Secretary of State concerning threats, and (3) the inclusion of a sumnmary on foreign airport security in the Semiannual Report to Congress on...International Civil Aviation Organization (ICAO) to embark inediately upon an intensified program aimed at responding to the need for enhanced airport security . As
Case study: adapting the IAHSS curriculum in Thailand.
Goss, Richard J
2009-01-01
In late 2007 Corporate Protective Solutions (CPS), headquartered in Langley, B.C. Canada, an independent security consulting company that specialises in healthcare security, approached the IAHSS concerning the adaptation of the Basic Training Manual and Study Guide for Healthcare Security Officers for one of their clients. In this article, its managing director for Asia Pacific outlines the challenges of this project from which other international healthcare security managers can learn to replicate the process for their own facilities.
Survey of cyber security issues in smart grids
NASA Astrophysics Data System (ADS)
Chen, Thomas M.
2010-04-01
The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.
The East Mediterranean Triangle at Crossroads
2016-03-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
78 FR 54934 - In the Matter of K's Media, File No. 500-1; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-06
... SECURITIES AND EXCHANGE COMMISSION In the Matter of K's Media, File No. 500-1; Order of Suspension... lack of current and accurate information concerning the securities of K's Media because it has not... of the above-listed company. Therefore, it is ordered, pursuant to Section 12(k) of the Securities...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-12
... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69707] Order Granting a Limited Exemption from... Pilot Pursuant to Regulation M Rule 102(e) June 6, 2013. The Securities and Exchange Commission...'s securities would constitute an indirect attempt by the issuer to induce a bid for or a purchase of...
78 FR 70617 - In the Matter of Pure H20 Bio-Technologies, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-26
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Pure H20 Bio-Technologies, Inc.; Order of Suspension of Trading November 22, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of Pure H20 Bio...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of China Ruitai International Holdings Co., Ltd.; Order of Suspension of Trading September 30, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Ruitai International Holdings Co.,...
78 FR 62931 - China Ritar Power Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] China Ritar Power Corp., Order of Suspension of Trading October 4, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of China Ritar Power Corp. because China Ritar Power Corp. has not filed any periodic...
78 FR 23622 - In the Matter of NewTech Brake Corp., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of NewTech Brake Corp., Order of Suspension of Trading April 17, 2013. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of NewTech Brake Corp. because it...
Noonan, Vanessa K; Thorogood, Nancy P; Joshi, Phalgun B; Fehlings, Michael G; Craven, B Catharine; Linassi, Gary; Fourney, Daryl R; Kwon, Brian K; Bailey, Christopher S; Tsai, Eve C; Drew, Brian M; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F
2013-05-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. Copyright © 2013 Longwoods Publishing.
Noonan, Vanessa K.; Thorogood, Nancy P.; Joshi, Phalgun B.; Fehlings, Michael G.; Craven, B. Catharine; Linassi, Gary; Fourney, Daryl R.; Kwon, Brian K.; Bailey, Christopher S.; Tsai, Eve C.; Drew, Brian M.; Ahn, Henry; Tsui, Deborah; Dvorak, Marcel F.
2013-01-01
Privacy legislation addresses concerns regarding the privacy of personal information; however, its interpretation by research ethics boards has resulted in significant challenges to the collection, management, use and disclosure of personal health information for multi-centre research studies. This paper describes the strategy used to develop the national Rick Hansen Spinal Cord Injury Registry (RHSCIR) in accordance with privacy statutes and benchmarked against best practices. An analysis of the regional and national privacy legislation was conducted to determine the requirements for each of the 31 local RHSCIR sites and the national RHSCIR office. A national privacy and security framework was created for RHSCIR that includes a governance structure, standard operating procedures, training processes, physical and technical security and privacy impact assessments. The framework meets a high-water mark in ensuring privacy and security of personal health information nationally and may assist in the development of other national or international research initiatives. PMID:23968640
Climate resilient crops for improving global food security and safety.
Dhankher, Om Parkash; Foyer, Christine H
2018-05-01
Food security and the protection of the environment are urgent issues for global society, particularly with the uncertainties of climate change. Changing climate is predicted to have a wide range of negative impacts on plant physiology metabolism, soil fertility and carbon sequestration, microbial activity and diversity that will limit plant growth and productivity, and ultimately food production. Ensuring global food security and food safety will require an intensive research effort across the food chain, starting with crop production and the nutritional quality of the food products. Much uncertainty remains concerning the resilience of plants, soils, and associated microbes to climate change. Intensive efforts are currently underway to improve crop yields with lower input requirements and enhance the sustainability of yield through improved biotic and abiotic stress tolerance traits. In addition, significant efforts are focused on gaining a better understanding of the root/soil interface and associated microbiomes, as well as enhancing soil properties. © 2018 The Authors Plant, Cell & Environment Published by John Wiley & Sons Ltd.
75 FR 80042 - Information Privacy and Innovation in the Internet Economy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-12-21
... statistics that provide evidence of concern--or comments explaining why concerns are unwarranted--about cloud computing data privacy and security in the commercial context. We also seek data that links any such concerns to decisions to adopt, or refrain from adopting, cloud computing services. (41) The Task Force...
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2011 CFR
2011-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section...(b) concerning information about the sex of an applicant, but only to the extent necessary for...) concerning information about income derived from alimony, child support, or separate maintenance payments; (v...
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2010 CFR
2010-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section...(b) concerning information about the sex of an applicant, but only to the extent necessary for...) concerning information about income derived from alimony, child support, or separate maintenance payments; (v...
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2014 CFR
2014-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section...(b) concerning information about the sex of an applicant, but only to the extent necessary for...) concerning information about income derived from alimony, child support, or separate maintenance payments; (v...
33 CFR 148.300 - What does this subpart concern?
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false What does this subpart concern? 148.300 Section 148.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: GENERAL Licenses § 148.300 What does this subpart concern? This...
33 CFR 148.300 - What does this subpart concern?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false What does this subpart concern? 148.300 Section 148.300 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) DEEPWATER PORTS DEEPWATER PORTS: GENERAL Licenses § 148.300 What does this subpart concern? This...
8 CFR 280.4 - Data concerning cost of transportation.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Data concerning cost of transportation. 280.4 Section 280.4 Aliens and Nationality DEPARTMENT OF HOMELAND SECURITY IMMIGRATION REGULATIONS IMPOSITION AND COLLECTION OF FINES § 280.4 Data concerning cost of transportation. Within five days after...
The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation
DOE Office of Scientific and Technical Information (OSTI.GOV)
Russell, J. W.; Ahumada, A. D.; Blanchard, T. A.
After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilianmore » sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.« less
ICRP Publication 125: Radiological Protection in Security Screening.
Cool, D A; Lazo, E; Tattersall, P; Simeonov, G; Niu, S
2014-07-01
The use of technologies to provide security screening for individuals and objects has been increasing rapidly, in keeping with the significant increase in security concerns worldwide. Within the spectrum of technologies, the use of ionizing radiation to provide backscatter and transmission screening capabilities has also increased. The Commission has previously made a number of statements related to the general topic of deliberate exposures of individuals in non-medical settings. This report provides advice on how the radiological protection principles recommended by the Commission should be applied within the context of security screening. More specifically, the principles of justification, optimisation of protection, and dose limitation for planned exposure situations are directly applicable to the use of ionising radiation in security screening. In addition, several specific topics are considered in this report, including the situation in which individuals may be exposed because they are concealed (‘stowaways’) in a cargo container or conveyance that may be subject to screening. The Commission continues to recommend that careful justification of screening should be considered before decisions are made to employ the technology. If a decision is made that its use is justified, the framework for protection as a planned exposure situation should be employed, including optimization of protection with the use of dose constraints and the appropriate provisions for authorisation and inspection.
5 CFR 1312.5 - Authority to classify.
Code of Federal Regulations, 2011 CFR
2011-01-01
..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Classification and Declassification of National Security Information § 1312.5 Authority to classify. (a) The authority to originally classify information or material under this part shall be limited to those officials concerned with matters...
47 CFR 0.131 - Functions of the Bureau.
Code of Federal Regulations, 2010 CFR
2010-10-01
... growth by promoting efficiency and innovation in the allocation, licensing and use of the electromagnetic.... Coordinates with and assists other Bureaus and Offices, as appropriate, concerning spectrum management..., homeland security, national security, emergency management, disaster management, and related issues. [60 FR...
Identification of port communication equipment needs for safety, security, and interoperability
DOT National Transportation Integrated Search
2007-12-01
Identification of Port Communication Equipment Needs for Safety, Security, and Interoperability is a big concern for current and : future need. The data demonstrates that two-way radios should be the most effective method of communication in both rou...
Code of Federal Regulations, 2010 CFR
2010-07-01
... further foreign policy and national security interests while at the same time taking into consideration important environmental concerns. (b) The Department of Defense acts with care in the global commons because... be through the Assistant Secretary of Defense (International Security Affairs). (e) Executive Order...
77 FR 35366 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2012-06-13
... Uses of Nuclear Energy and the Agreement for Cooperation Between the United States of America and the Republic of Kazakhstan Concerning Peaceful Uses of Nuclear Energy. DATES: This subsequent arrangement will... Nonproliferation and International Security, National Nuclear Security Administration, Department of Energy...
76 FR 37343 - Proposed Subsequent Arrangement
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-27
... International Security, National Nuclear Security Administration, Department of Energy. ACTION: Proposed... arrangement under the Agreement for Cooperation Concerning Civil Uses of Nuclear Energy Between the Government... Peaceful Uses of Nuclear Energy Between the United States of America and the European Atomic Energy...
Leveraging the laboratory response network model for the global health security agenda.
Mangal, Chris N; Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks-natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern.
Leveraging the Laboratory Response Network Model for the Global Health Security Agenda
Maryogo-Robinson, Lucy
2014-01-01
Promoting global health security as an international priority is a challenge; the US Centers for Disease Control and Prevention (CDC) in its Global Health Security Agenda has articulated the importance of accelerating progress toward a world safe and secure from infectious disease threats. The goals are to (1) prevent and reduce the likelihood of outbreaks—natural, accidental, or intentional; (2) detect threats early to save lives; and (3) respond rapidly and effectively using multisectoral, international coordination and communication. Foundational to this agenda is the World Health Organization (WHO) Revised International Health Regulations (IHR) of 2005, which provide the legal framework for countries to strengthen their health systems in order to be able to respond to any public health emergency of international concern. This article proposes leveraging the distributed structure of the US-managed Laboratory Response Network for Biological Threats Preparedness (LRN-B) to develop the core capacity of laboratory testing and to fulfill the laboratory-strengthening component of the Global Health Security Agenda. The LRN model offers an effective mechanism to detect and respond to public health emergencies of international concern. PMID:25254916
Attachment to Mother and Father at Transition to Middle Childhood.
Di Folco, Simona; Messina, Serena; Zavattini, Giulio Cesare; Psouni, Elia
2017-01-01
The present study investigated concordance between representations of attachment to mother and attachment to father, and convergence between two narrative-based methods addressing these representations in middle childhood: the Manchester Child Attachment Story Task (MCAST) and the Secure Base Script Test (SBST). One hundred and twenty 6-year-old children were assessed by separate administrations of the MCAST for mother and father, respectively, and results showed concordance of representations of attachment to mother and attachment to father at age 6.5 years. 75 children were additionally tested about 12 months later, with the SBST, which assesses scripted knowledge of secure base (and safe haven), not differentiating between mother and father attachment relationships. Concerning attachment to father, dichotomous classifications (MCAST) and a continuous dimension capturing scripted secure base knowledge (MCAST) converged with secure base scriptedness (SBST), yet we could not show the same pattern of convergence concerning attachment to mother. Results suggest some convergence between the two narrative methods of assessment of secure base script but also highlight complications when using the MCAST for measuring attachment to father in middle childhood.
Addressing social resistance in emerging security technologies
Mitchener-Nissen, Timothy
2013-01-01
In their efforts to enhance the safety and security of citizens, governments and law enforcement agencies look to scientists and engineers to produce modern methods for preventing, detecting, and prosecuting criminal activities. Whole body scanners, lie detection technologies, biometrics, etc., are all being developed for incorporation into the criminal justice apparatus.1 Yet despite their purported security benefits these technologies often evoke social resistance. Concerns over privacy, ethics, and function-creep appear repeatedly in analyses of these technologies. It is argued here that scientists and engineers continue to pay insufficient attention to this resistance; acknowledging the presence of these social concerns yet failing to meaningfully address them. In so doing they place at risk the very technologies and techniques they are seeking to develop, for socially controversial security technologies face restrictions and in some cases outright banning. By identifying sources of potential social resistance early in the research and design process, scientists can both engage with the public in meaningful debate and modify their security technologies before deployment so as to minimize social resistance and enhance uptake. PMID:23970863
DOE Office of Scientific and Technical Information (OSTI.GOV)
NONE
A video on computer security is described. Lonnie Moore, the Computer Security Manager, CSSM/CPPM at Lawrence Livermore National Laboratory (LLNL) and Gale Warshawsky, the Coordinator for Computer Security Education and Awareness at LLNL, wanted to share topics such as computer ethics, software piracy, privacy issues, and protecting information in a format that would capture and hold an audience`s attention. Four Computer Security Short Subject videos were produced which ranged from 1--3 minutes each. These videos are very effective education and awareness tools that can be used to generate discussions about computer security concerns and good computing practices.
Vogel, Joshua; Brown, Jeffrey S.; Land, Thomas; Platt, Richard
2014-01-01
Electronic health record systems contain clinically detailed data from large populations of patients that could significantly enrich public health surveillance. Clinical practices’ security, privacy, and proprietary concerns, however, have limited their willingness to share these data with public health agencies. We describe a novel distributed network for public health surveillance called MDPHnet. The system allows the Massachusetts Department of Public Health (MDPH) to initiate custom queries against participating practices’ electronic health records while the data remain behind each practice’s firewall. Practices can review proposed queries before execution and approve query results before releasing them to the health department. MDPH is using the system for routine surveillance for priority conditions and to evaluate the impact of public health interventions. PMID:25322301
NASA Technical Reports Server (NTRS)
1985-01-01
The primary purpose of the Aerospace Computer Security Conference was to bring together people and organizations which have a common interest in protecting intellectual property generated in space. Operational concerns are discussed, taking into account security implications of the space station information system, Space Shuttle security policies and programs, potential uses of probabilistic risk assessment techniques for space station development, key considerations in contingency planning for secure space flight ground control centers, a systematic method for evaluating security requirements compliance, and security engineering of secure ground stations. Subjects related to security technologies are also explored, giving attention to processing requirements of secure C3/I and battle management systems and the development of the Gemini trusted multiple microcomputer base, the Restricted Access Processor system as a security guard designed to protect classified information, and observations on local area network security.
Cyber Security Assessment Report: Adventium Labs
DOE Office of Scientific and Technical Information (OSTI.GOV)
None
2007-12-31
Major control system components often have life spans of 15-20 years. Many systems in our Nation's critical infrastructure were installed before the Internet became a reality and security was a concern. Consequently, control systems are generally insecure. Security is now being included in the development of new control system devices; however, legacy control systems remain vulnerable. Most efforts to secure control systems are aimed at protecting network borers, but if an intruder gets inside the network these systems are vulnerable to a cyber attack.
Security Implications of Physical Design Attributes in the Emergency Department.
Pati, Debajyoti; Pati, Sipra; Harvey, Thomas E
2016-07-01
Security, a subset of safety, is equally important in the efficient delivery of patient care. The emergency department (ED) is susceptible to violence creating concerns for the safety and security of patients, staff, and visitors and for the safe and efficient delivery of care. Although there is an implicit and growing recognition of the role of the physical environment, interventions typically have been at the microlevel. The objective of this study was to identify physical design attributes that potentially influence safety and efficiency of ED operations. An exploratory, qualitative research design was adopted to examine the efficiency and safety correlates of ED physical design attributes. The study comprised a multimeasure approach involving multidisciplinary gaming, semistructured interviews, and touring interviews of frontline staff in four EDs at three hospital systems across three states. Five macro physical design attributes (issues that need to be addressed at the design stage and expensive to rectify once built) emerged from the data as factors substantially associated with security issues. They are design issues pertaining to (a) the entry zone, (b) traffic management, (c) patient room clustering, (d) centralization versus decentralization, and (e) provisions for special populations. Data from this study suggest that ED security concerns are generally associated with three sources: (a) gang-related violence, (b) dissatisfied patients, and (c) behavioral health patients. Study data show that physical design has an important role in addressing the above-mentioned concerns. Implications for ED design are outlined in the article. © The Author(s) 2016.
Mastering the Gray Zone: Understanding a Changing Era of Conflict
2015-12-01
debate concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...an international audience, and honor soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the...U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on
Federal Register 2010, 2011, 2012, 2013, 2014
2011-02-07
..., Inc. (n/k/a CA Goldfields, Inc.), Order of Suspension of Trading February 3, 2011. It appears to the... current and accurate information concerning the securities of B-Teller, Inc. (n/k/a CA Goldfields, Inc...(k) of the Securities Exchange Act of 1934, that trading in the securities of the above-listed...
Closing the Security Gap: Building Irregular Security Forces
2012-06-08
had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi
Soviet Interests in Afghanistan and Implications upon Withdrawal
1990-06-01
Causes of the Invasion ................ 87 Protection of Long -Standing Soviet Investments in Afghanistan .......... 88 Security Concerns...its denial to the West, if necessary, have always remained a priority long -range economic interest.L0 SECURITY OF FRONTIERS From Czarist times, the...territory, perhaps with a long -range goal of securing a warm water port. With the passage of time, Russian interests additionally included balancing
ERIC Educational Resources Information Center
Moran, Matthew; Hobbs, Christopher
2018-01-01
In recent years, nuclear security has gained prominence on the international security agenda. Driven by post 9/11 anxieties and the politicization of fears regarding nuclear terrorism, concerns in this area have spawned a wealth of initiatives, which seek to counter this threat. Principal among these have been efforts to promote nuclear security…
Preparing for War Moscow Facing an Arc of Crisis
2016-12-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Maintaining the Status Quo in the Taiwan Strait
2013-03-01
of National Security and Strategy 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) U.S. Army...Count: 5,308 14. ABSTRACT In order to ensure vital U.S. interests concerning security and economic freedom in the region, the status quo in the...international/regional support of Taiwan, Taiwanese military deterrence backed by strategically ambiguous U.S. assurances of security , intertwined
Cyber security evaluation of II&C technologies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas, Ken
The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) tomore » address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-21
...., and PC Universe, Inc. November 19, 2013. It appears to the Securities and Exchange Commission that... information concerning the securities of PC Universe, Inc. because it has not filed any periodic reports since...
DOT National Transportation Integrated Search
2004-11-11
The catastrophic events of September 11, 2001 and the ongoing war on terrorism have heightened the level of concern from Federal government officials and the transportation industry regarding the secure transport of hazardous materials (HAZMAT). Secu...
76 FR 18264 - Proposed Collection; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2011-04-01
..., Copies Available From: Securities and Exchange Commission, Office of Investor Education and Advocacy... resumption of quotations in a quotation medium by a broker-dealer for over-the- counter (``OTC'') securities... quotation for publication, in a quotation medium unless they have reviewed specified information concerning...
The Campus Executive's Role in Security and Liability Issues.
ERIC Educational Resources Information Center
Bromley, Max; Territo, Leonard
1986-01-01
Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-23
... DEPARTMENT OF THE TREASURY Office of the Comptroller of the Currency Agency Information Collection Activities: Information Collection Renewal; Comment Request; Securities Offering Disclosure Rules AGENCY... comment concerning the renewal of an information collection titled, ``Securities Offering Disclosure Rules...
ERIC Educational Resources Information Center
Jones, Robert J.; Zehner, Mark R.
1996-01-01
In late 1994, the United States Securities and Exchange Commission (SEC) issued new rules applicable to issuers of municipal securities (including school districts) concerning disclosure to the investment community. Describes how SEC's existing Rule 15c2-12 has been implemented. Discusses its purpose, jurisdiction, obligated persons, written…
Securing electronic mail: The risks and future of electronic mail
NASA Astrophysics Data System (ADS)
Weeber, S. A.
1993-03-01
The network explosion of the past decade has significantly affected how many of us conduct our day to day work. We increasingly rely on network services such as electronic mail, file transfer, and network newsgroups to collect and distribute information. Unfortunately, few of the network services in use today were designed with the security issues of large heterogeneous networks in mind. In particular, electronic mail, although heavily relied upon, is notoriously insecure. Messages can be forged, snooped, and even altered by users with only a moderate level of system proficiency. The level of trust that can be assigned at present to these services needs to be carefully considered. In the past few years, standards and tools have begun to appear addressing the security concerns of electronic mail. Principal among these are RFC's 1421, 1422, 1423, and 1424, which propose Internet standards in the areas of message encipherment, key management, and algorithms for privacy enhanced mail (PEM). Additionally, three PEM systems, offering varying levels of compliance with the PEM RFC's, have also recently emerged: PGP, RIPEM, and TIS/PEM. This paper addresses the motivations and requirements for more secure electronic mail, and evaluates the suitability of the currently available PEM systems.
Maternal secure-base scripts and children's attachment security in an adopted sample.
Veríssimo, Manuela; Salvaterra, Fernanda
2006-09-01
Studies of families with adopted children are of special interest to attachment theorists because they afford opportunities to probe assumptions of attachment theory with regard to the developmental timing of interactions necessary to form primary attachments and also with regard to effects of shared genes on child attachment quality. In Bowlby's model, attachment-relevant behaviors and interactions are observable from the moment of birth, but for adoptive families, these interactions cannot begin until the child enters the family, sometimes several months or even years post-partum. Furthermore, because adoptive parents and adopted children do not usually share genes by common descent, any correspondence between attachment representations of the parent and secure base behavior of the child must arise as a consequence of dyadic interaction histories. The objectives of this study were to evaluate whether the child's age at the time of adoption or at the time of attachment assessment predicted child attachment security in adoptive families and also whether the adoptive mother's internal attachment representation predicted the child's attachment security. The participants were 106 mother - child dyads selected from the 406 adoptions carried out through the Lisbon Department of Adoption Services over a period of 3 years. The Attachment Behavior Q-Set (AQS; Waters, 1995) was used to assess secure base behavior and an attachment script representation task was used to assess the maternal attachment representations. Neither child's age at the time of adoption, nor age of the child at assessment significantly predicted the AQS security score; however, scores reflecting the presence and quality of maternal secure base scripts did predict AQS security. These findings support the notion that the transmission of attachment security across generations involves mutual exchanges and learning by the child and that the exchanges leading to secure attachment need not begin at birth. These results complement the findings and conceptual arguments offered by Bowlby and Ainsworth concerning the critical influence of maternal representations of attachment to the quality of attachment security in children.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-05
... provisions concerning payments for home health services comply with the requirements of the Social Security... DEPARTMENT OF HEALTH AND HUMAN SERVICES Centers for Medicare & Medicaid Services Notice of Opportunity for a Hearing on Compliance of Missouri State Plan Provisions Concerning Payments for Home Health...
Code of Federal Regulations, 2014 CFR
2014-01-01
... 3 The President 1 2014-01-01 2014-01-01 false Rulemaking Concerning the Standards for Designating Positions in the Competitive Service as National Security Sensitive and Related Matters Presidential Documents Other Presidential Documents Memorandum of January 25, 2013 Rulemaking Concerning the Standards for Designating Positions in the...
Security and privacy of EHR systems--ethical, social and legal requirements.
Kluge, Eike-Henner W
2003-01-01
This paper addresses social, ethical and legal concerns about security and privacy that arise in the development of international interoperable health information systems. The paper deals with these concerns under four rubrics: the ethical status of electronic health records, the social and legal embedding of interoperable health information systems, the overall information-requirements healthcare as such, and the role of health information professionals as facilitators. It argues that the concerns that arise can be met if the development of interoperability protocols is guided by the seven basic principles of information ethics that have been enunciated in the IMIA Code of Ethics for Health Information Professionals and that are central to the ethical treatment of electronic health records.
Kisekka, Victoria; Giboney, Justin Scott
2018-04-11
The diffusion of health information technologies (HITs) within the health care sector continues to grow. However, there is no theory explaining how success of HITs influences patient care outcomes. With the increase in data breaches, HITs' success now hinges on the effectiveness of data protection solutions. Still, empirical research has only addressed privacy concerns, with little regard for other factors of information assurance. The objective of this study was to study the effectiveness of HITs using the DeLone and McLean Information Systems Success Model (DMISSM). We examined the role of information assurance constructs (ie, the role of information security beliefs, privacy concerns, and trust in health information) as measures of HIT effectiveness. We also investigated the relationships between information assurance and three aspects of system success: attitude toward health information exchange (HIE), patient access to health records, and perceived patient care quality. Using structural equation modeling, we analyzed the data from a sample of 3677 cancer patients from a public dataset. We used R software (R Project for Statistical Computing) and the Lavaan package to test the hypothesized relationships. Our extension of the DMISSM to health care was supported. We found that increased privacy concerns reduce the frequency of patient access to health records use, positive attitudes toward HIE, and perceptions of patient care quality. Also, belief in the effectiveness of information security increases the frequency of patient access to health records and positive attitude toward HIE. Trust in health information had a positive association with attitudes toward HIE and perceived patient care quality. Trust in health information had no direct effect on patient access to health records; however, it had an indirect relationship through privacy concerns. Trust in health information and belief in the effectiveness of information security safeguards increases perceptions of patient care quality. Privacy concerns reduce patients' frequency of accessing health records, patients' positive attitudes toward HIE exchange, and overall perceived patient care quality. Health care organizations are encouraged to implement security safeguards to increase trust, the frequency of health record use, and reduce privacy concerns, consequently increasing patient care quality. ©Victoria Kisekka, Justin Scott Giboney. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 11.04.2018.
Pharmacy layout: What are consumers' perceptions?.
Emmett, Dennis; Paul, David P; Chandra, Ashish; Barrett, Hilton
2006-01-01
The physical layout of a retail pharmacy can play a significant role in the development of the customers' perceptions which can have a positive (or negative) impact on its sales potential. Compared to most general merchandise stores, pharmacies are more concerned about safety and security issues due to the nature of their products. This paper will discuss these aspects as well as the physical and professional environments of retail pharmacies that influence the perceptions of customers and how these vary whether chain, independent, or hospital pharmacies.
Striking First: Preemptive and Preventive Attack in U.S. National Security Policy
2006-01-01
Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh , PA...source of petroleum before a U.S. oil embargo could bring the Japanese war effort in China to its knees .29 Such cases have significant parallels with...anticipation of being attacked are a cen- tral concern in virtually all rules of engagement. 16 Striking First both to serve as a basis for the rest of
Offshore oil and gas drilling: a necessity for US energy security
DOE Office of Scientific and Technical Information (OSTI.GOV)
DiBona, C.J.
1984-12-06
The US remains vulnerable to significant interruptions in its oil supply, cautions the president of the American Petroleum Institute. Commenting on an increasingly precarious position maintained by the US, the author discusses government restrictions hindering development of domestic petroleum reserves and addresses the environmental concerns regarding offshore oil and gas drilling. Responsible efforts to increase production of these vital fuels will make an important contribution to the US economy and, the author urges, such action must begin soon.
77 FR 50204 - Star Entertainment Group, Inc., Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-08-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Star Entertainment Group, Inc., Order of... lack of current and accurate information concerning the securities of Star Entertainment Group, Inc. (``Star Entertainment'') because of questions regarding the accuracy of the company's financial statements...
77 FR 59690 - Titan Resources International, Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Titan Resources International, Corp.; Order of... a lack of current and accurate information concerning the securities of Titan Resources International, Corp. (``Titan''). Titan is a Wyoming corporation purportedly based in Ontario, Canada. Questions...
77 FR 65602 - Chimera Energy Corporation; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-29
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Chimera Energy Corporation; Order of... lack of current and accurate information concerning the securities of Chimera Energy Corporation (``Chimera'') because of questions regarding the accuracy of statements by Chimera in press releases to...
Application Security Automation
ERIC Educational Resources Information Center
Malaika, Majid A.
2011-01-01
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
Spatially Explicit Life Cycle Assessment of Biofuel Feedstock Production
Biofuels derived from renewable resources have gained increased research and development priority due to increasing energy demand and national security concerns. In the US, the Energy Independence and Security Act (EISA) of 2007 mandated the annual production of 56.8 billion L of...
32 CFR 154.10 - Limitations and restrictions.
Code of Federal Regulations, 2011 CFR
2011-07-01
... necessary for a proper personnel security determination. Questions concerning personal and domestic affairs... question is relevant to the criteria of § 154.7. Similarly, the probing of a person's thoughts or beliefs and questions about conduct that have no personnel security implications are unwarranted. When...
32 CFR 154.10 - Limitations and restrictions.
Code of Federal Regulations, 2010 CFR
2010-07-01
... necessary for a proper personnel security determination. Questions concerning personal and domestic affairs... question is relevant to the criteria of § 154.7. Similarly, the probing of a person's thoughts or beliefs and questions about conduct that have no personnel security implications are unwarranted. When...
Douglas, Vasiliki; Chan, Hing Man; Wesche, Sonia; Dickson, Cindy; Kassi, Norma; Netro, Lorraine; Williams, Megan
2014-01-01
Because of a lack of transportation infrastructure, Old Crow has the highest food costs and greatest reliance on traditional food species for sustenance of any community in Canada's Yukon Territory. Environmental, cultural, and economic change are driving increased perception of food insecurity in Old Crow. To address community concerns regarding food security and supply in Old Crow and develop adaptation strategies to ameliorate their impact on the community. A community adaptation workshop was held on October 13, 2009, in which representatives of different stakeholders in the community discussed a variety of food security issues facing Old Crow and how they could be dealt with. Workshop data were analyzed using keyword, subject, and narrative analysis techniques to determine community priorities in food security and adaptation. Community concern is high and favored adaptation options include agriculture, improved food storage, and conservation through increased traditional education. These results were presented to the community for review and revision, after which the Vuntut Gwitchin Government will integrate them into its ongoing adaptation planning measures.
Army Global Basing Posture: An Analytic Framework for Maximizing Responsiveness and Effectiveness
2015-01-01
potential changes in the national security environment and to evaluate U.S. Army stationing, prepositioning, security cooperation activities, and...report should be of interest to those concerned with U.S. global posture and national security strategy, especially as it pertains to U.S. land power...40 A.1. United Nations Support Index for Plenary Votes, by State ................................................ 64 A.2. United Nations
77 FR 29399 - Order of Suspension of Trading; In the Matter of 1-800-ATTORNEY, Inc., et al.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; In the Matter of 1-800-ATTORNEY, Inc., et al. May 14, 2012. It appears to the Securities and Exchange Commission that there is a lack of current and accurate information concerning the securities of 1-800-ATTORNEY, Inc. because questions have arisen as to its...
Arab Threat Perceptions and the Future of the U.S. Military Presence in the Middle East
2015-10-01
knowledge, and provides solutions to strategic Army issues affecting the national security community . The Peacekeeping and Stability Operations...analysts concern topics having strategic implications for the Army, the Department of Defense, and the larger national security community . In addition...update the national security community on the research of our analysts, recent and forthcoming publications, and upcoming confer- ences sponsored by
ERIC Educational Resources Information Center
Miller, Steven E.; Seiberling, Chris
2004-01-01
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Challenge and Response: Anticipating US Military Security Concerns
1994-08-01
in the U.S. And the Russian Orthodox Church may emerge as another such political force as was evidenced by its mediative role in the turbulent days...objectives (ends) and public opinion. Recall the turmoil in the United States during the Vietnam War and how 471 internal politics affected the...ABSTRACT 15. SUBJECT TERMS Military planning - United States; National Security - United States; World politics - 1989 - 16. SECURITY CLASSIFICATION OF
2016-12-01
as a Fulbright Scholar at Durham University’s Institute of Advanced Study . Dr. Manjikian’s publications in- clude Apocalypse and Post -Politics: The...concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S
Healthcare teams over the Internet: programming a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2003-07-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modern healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has, therefore, become a major concern. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security model is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control (HAC) security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
Healthcare teams over the Internet: towards a certificate-based approach.
Georgiadis, Christos K; Mavridis, Ioannis K; Pangalos, George I
2002-01-01
Healthcare environments are a representative case of collaborative environments since individuals (e.g. doctors) in many cases collaborate in order to provide care to patients in a more proficient way. At the same time modem healthcare institutions are increasingly interested in sharing access of their information resources in the networked environment. Healthcare applications over the Internet offer an attractive communication infrastructure at worldwide level but with a noticeably great factor of risk. Security has therefore become a major concern for healthcare applications over the Internet. However, although an adequate level of security can be relied upon digital certificates, if an appropriate security policy is used, additional security considerations are needed in order to deal efficiently with the above team-work concerns. The already known Hybrid Access Control security model supports and handles efficiently healthcare teams with active security capabilities and is capable to exploit the benefits of certificate technology. In this paper we present the way for encoding the appropriate authoritative information in various types of certificates, as well as the overall operational architecture of the implemented access control system for healthcare collaborative environments over the Internet. A pilot implementation of the proposed methodology in a major Greek hospital has shown the applicability of the proposals and the flexibility of the access control provided.
NASA Technical Reports Server (NTRS)
Barnett, Traci M.
2004-01-01
Safety and security is very important at NASA. The Security Management and Safeguards Office goal is ensure safety and security for all NASA Lewis and Plum Brook Station visitors and workers. The office protects against theft, sabotage, malicious damage, espionage, and other threats or acts of violence. There are three types of security at NASA: physical, IT, and personnel. IT is concerned with sensitive and classified information and computers. Physical security includes the officers who check visitors and workers in and patrol the facility. Personnel security is concerned with background checks during hiring. During my internship, I met people from and gained knowledge about all three types of security. I primarily worked with Dr. Richard Soppet in physical security. During my experience with physical security, I observed and worked with many aspects of it. I attended various security meetings at both NASA Lewis and Plum Brook. The meetings were about homeland security and other improvements that will be made to both facilities. I also spent time with a locksmith. The locksmith makes copies of keys and unlocks doors for people who need them. I rode around in a security vehicle with an officer as he patrolled. I also observed the officer make a search of a visitor s vehicle. All visitors vehicles are searched upon entering NASA. I spent time and observed in the dispatch office. The officer answers calls and sends out officers when needed. The officer also monitors the security cameras. My primary task was completing an emergency response manual. This manual would assist local law enforcement and fire agencies in case of an emergency. The manual has pictures and descriptions of the buildings. It also contains the information about hazards inside of the buildings. This information will be very helpul to law enforcement so that when called upon during an emergency, they will not create an even bigger problem with collateral damage.
44 CFR 331.3 - Scope and applicability.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF HOMELAND SECURITY PREPAREDNESS PRESERVATION OF THE MOBILIZATION BASE THROUGH THE PLACEMENT OF... of Small Business Administration, assist concerns which have agreed to perform contracts in labor surplus areas in obtaining Government procurement business by providing such concerns with timely...
Defining Information Security.
Lundgren, Björn; Möller, Niklas
2017-11-15
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
Safety and security in acute admission psychiatric wards in Ireland and London: a comparative study.
Cowman, Seamus; Bowers, Len
2009-05-01
The comparative element of this study is to describe safety and security measures in psychiatric acute admission wards in the Republic of Ireland and London; to describe differences and similarities in terms of safety and security patterns in the Republic of Ireland and London; and to make recommendations on safety and security to mental health services management and psychiatric nurses. Violence is a serious problem in psychiatric services and staff experience significant psychological reactions to being assaulted. Health and Safety Authorities in the UK and Ireland have expressed concern about violence and assault in healthcare, however, there remains a lack of clarity on matters of procedure and policy pertaining to safety and security in psychiatric hospitals. A descriptive survey research design was employed. Questionnaires were circulated to all acute wards in London and in Ireland and the resulting data compared. A total of 124 psychiatric wards from London and 43 wards from Ireland were included in this study and response rates of 70% (London) and 86% (Ireland) were obtained. Differences and similarities in safety and security practices were identified between London and Ireland, with Irish wards having generally higher and more intensive levels of security. There is a lack of coherent policy and procedure in safety and security measures across psychiatric acute admission wards in the Republic of Ireland and London. Given the trends in European Union (EU) regulation, there is a strong argument for the publication of acceptable minimum guidelines for safety and security in mental health services across the EU. There must be a concerted effort to ensure that all policy and procedure in safety and security is founded on evidence and best practice. Mental health managers must establish a review of work safety and security procedures and practices. Risk assessment and environmental audits of all mental health clinical environments should be mandatory.
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2012 CFR
2012-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section... concerning open-end accounts, to the extent the action taken is on the basis of a change of name or marital...(b) concerning information about the sex of an applicant, but only to the extent necessary for...
12 CFR 202.3 - Limited exceptions for certain classes of transactions.
Code of Federal Regulations, 2013 CFR
2013-01-01
... securities credit: (i) Section 202.5(b) concerning information about the sex of an applicant; (ii) Section... concerning open-end accounts, to the extent the action taken is on the basis of a change of name or marital...(b) concerning information about the sex of an applicant, but only to the extent necessary for...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-27
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Announcement of Test Concerning... announces U.S. Customs and Border Protection's (CBP's) plan to conduct a test concerning the manifesting and... test announced in this document begins. In HQ Ruling H026715, CBP held that in order to ensure the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... 12 Banks and Banking 3 2011-01-01 2011-01-01 false Statement of policy concerning bank holding companies engaging in futures, forward and options contracts on U.S. Government and agency securities and... concerning bank holding companies engaging in futures, forward and options contracts on U.S. Government and...
Extended outlook: description, utilization, and daily applications of cloud technology in radiology.
Gerard, Perry; Kapadia, Neil; Chang, Patricia T; Acharya, Jay; Seiler, Michael; Lefkovitz, Zvi
2013-12-01
The purpose of this article is to discuss the concept of cloud technology, its role in medical applications and radiology, the role of the radiologist in using and accessing these vast resources of information, and privacy concerns and HIPAA compliance strategies. Cloud computing is the delivery of shared resources, software, and information to computers and other devices as a metered service. This technology has a promising role in the sharing of patient medical information and appears to be particularly suited for application in radiology, given the field's inherent need for storage and access to large amounts of data. The radiology cloud has significant strengths, such as providing centralized storage and access, reducing unnecessary repeat radiologic studies, and potentially allowing radiologic second opinions more easily. There are significant cost advantages to cloud computing because of a decreased need for infrastructure and equipment by the institution. Private clouds may be used to ensure secure storage of data and compliance with HIPAA. In choosing a cloud service, there are important aspects, such as disaster recovery plans, uptime, and security audits, that must be considered. Given that the field of radiology has become almost exclusively digital in recent years, the future of secure storage and easy access to imaging studies lies within cloud computing technology.
75 FR 21261 - Privacy Act of 1974; System of Records
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-23
... replace with ``Full name, Social Security Number (SSN); individual case reports concerning the exercise of..., requests for local authorities to refrain from exercising their jurisdiction, communications with lawyers... provide full name, Social Security Number (SSN) or other information verifiable from the record itself. In...
8 CFR 212.1 - Documentary requirements for nonimmigrants.
Code of Federal Regulations, 2010 CFR
2010-01-01
... special humanitarian concern; and (iv) Poses no threat to the welfare, safety or security of the United States, its territories, or commonwealths. Any potential threats to the welfare, safety, or security of...) of this section: Australia, Brunei, Indonesia, Japan, Malaysia, Nauru, New Zealand, Papua New Guinea...
32 CFR 321.14 - DSS implementation policies.
Code of Federal Regulations, 2014 CFR
2014-07-01
...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2014-07-01 2014-07-01 false DSS implementation policies. 321.14 Section 321...
32 CFR 321.14 - DSS implementation policies.
Code of Federal Regulations, 2013 CFR
2013-07-01
...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2013-07-01 2013-07-01 false DSS implementation policies. 321.14 Section 321...
32 CFR 321.14 - DSS implementation policies.
Code of Federal Regulations, 2012 CFR
2012-07-01
...) PRIVACY PROGRAM DEFENSE SECURITY SERVICE PRIVACY PROGRAM § 321.14 DSS implementation policies. (a) General... matters of particular concern to the Defense Security Service. (b) Privacy Act rules application. Any... 32 National Defense 2 2012-07-01 2012-07-01 false DSS implementation policies. 321.14 Section 321...
78 FR 14807 - Notice of Proposed Information Collection
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-07
... DEPARTMENT OF HOMELAND SECURITY United States Secret Service Notice of Proposed Information... request as required by the Paperwork Reduction Act of 1995. Currently, the U.S. Secret Service, within the U.S. Department of Homeland Security, is soliciting comments concerning the SSF 3237, U.S. Secret...
20 CFR 401.5 - Purpose of the regulations.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the Privacy Act of 1974, 5 U.S.C. 552a and section 1106 of the Social Security Act concerning....5 Employees' Benefits SOCIAL SECURITY ADMINISTRATION PRIVACY AND DISCLOSURE OF OFFICIAL RECORDS AND... with other applicable statutes. (b) Privacy. This part implements the Privacy Act by establishing...
77 FR 73509 - Emerging World Pharma, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-10
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Emerging World Pharma, Inc.; Order of... lack of current and accurate information concerning the securities of Emerging World Pharma, Inc. (``Emerging World''). Emerging World is a Florida corporation purportedly based in Manassas, Virginia and...
75 FR 34183 - Micro Laboratories, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Micro Laboratories, Inc.; Order of Suspension... of current and accurate information concerning the securities of Micro Laboratories, Inc. (``Micro Laboratories'') because it has not filed any periodic reports since the period ended June 30, 2005. Micro...
Financial forecasts accuracy in Brazil's social security system.
Silva, Carlos Patrick Alves da; Puty, Claudio Alberto Castelo Branco; Silva, Marcelino Silva da; Carvalho, Solon Venâncio de; Francês, Carlos Renato Lisboa
2017-01-01
Long-term social security statistical forecasts produced and disseminated by the Brazilian government aim to provide accurate results that would serve as background information for optimal policy decisions. These forecasts are being used as support for the government's proposed pension reform that plans to radically change the Brazilian Constitution insofar as Social Security is concerned. However, the reliability of official results is uncertain since no systematic evaluation of these forecasts has ever been published by the Brazilian government or anyone else. This paper aims to present a study of the accuracy and methodology of the instruments used by the Brazilian government to carry out long-term actuarial forecasts. We base our research on an empirical and probabilistic analysis of the official models. Our empirical analysis shows that the long-term Social Security forecasts are systematically biased in the short term and have significant errors that render them meaningless in the long run. Moreover, the low level of transparency in the methods impaired the replication of results published by the Brazilian Government and the use of outdated data compromises forecast results. In the theoretical analysis, based on a mathematical modeling approach, we discuss the complexity and limitations of the macroeconomic forecast through the computation of confidence intervals. We demonstrate the problems related to error measurement inherent to any forecasting process. We then extend this exercise to the computation of confidence intervals for Social Security forecasts. This mathematical exercise raises questions about the degree of reliability of the Social Security forecasts.
Financial forecasts accuracy in Brazil’s social security system
2017-01-01
Long-term social security statistical forecasts produced and disseminated by the Brazilian government aim to provide accurate results that would serve as background information for optimal policy decisions. These forecasts are being used as support for the government’s proposed pension reform that plans to radically change the Brazilian Constitution insofar as Social Security is concerned. However, the reliability of official results is uncertain since no systematic evaluation of these forecasts has ever been published by the Brazilian government or anyone else. This paper aims to present a study of the accuracy and methodology of the instruments used by the Brazilian government to carry out long-term actuarial forecasts. We base our research on an empirical and probabilistic analysis of the official models. Our empirical analysis shows that the long-term Social Security forecasts are systematically biased in the short term and have significant errors that render them meaningless in the long run. Moreover, the low level of transparency in the methods impaired the replication of results published by the Brazilian Government and the use of outdated data compromises forecast results. In the theoretical analysis, based on a mathematical modeling approach, we discuss the complexity and limitations of the macroeconomic forecast through the computation of confidence intervals. We demonstrate the problems related to error measurement inherent to any forecasting process. We then extend this exercise to the computation of confidence intervals for Social Security forecasts. This mathematical exercise raises questions about the degree of reliability of the Social Security forecasts. PMID:28859172
Tao, Jinyuan; Gunter, Glenda; Tsai, Ming-Hsiu; Lim, Dan
2016-01-01
Recently, the many robust learning management systems, and the availability of affordable laptops, have made secure laptop-based testing a reality on many campuses. The undergraduate nursing program at the authors' university began to implement a secure laptop-based testing program in 2009, which allowed students to use their newly purchased laptops to take quizzes and tests securely in classrooms. After nearly 5 years' secure laptop-based testing program implementation, a formative evaluation, using a mixed method that has both descriptive and correlational data elements, was conducted to seek constructive feedback from students to improve the program. Evaluation data show that, overall, students (n = 166) believed the secure laptop-based testing program helps them get hands-on experience of taking examinations on the computer and gets them prepared for their computerized NCLEX-RN. Students, however, had a lot of concerns about laptop glitches and campus wireless network glitches they experienced during testing. At the same time, NCLEX-RN first-time passing rate data were analyzed using the χ2 test, and revealed no significant association between the two testing methods (paper-and-pencil testing and the secure laptop-based testing) and students' first-time NCLEX-RN passing rate. Based on the odds ratio, however, the odds of students passing NCLEX-RN the first time was 1.37 times higher if they were taught with the secure laptop-based testing method than if taught with the traditional paper-and-pencil testing method in nursing school. It was recommended to the institution that better quality of laptops needs to be provided to future students, measures needed to be taken to further stabilize the campus wireless Internet network, and there was a need to reevaluate the Laptop Initiative Program.
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
... Interpretive Notice Concerning the Application of Rule G-17 to Municipal Advisors September 26, 2011. On August... notice concerning the application of MSRB Rule G-17 to municipal advisors. Notice of the proposed rule...
Schendel, Diana E; Bresnahan, Michaeline; Carter, Kim W; Francis, Richard W; Gissler, Mika; Grønborg, Therese K; Gross, Raz; Gunnes, Nina; Hornig, Mady; Hultman, Christina M; Langridge, Amanda; Lauritsen, Marlene B; Leonard, Helen; Parner, Erik T; Reichenberg, Abraham; Sandin, Sven; Sourander, Andre; Stoltenberg, Camilla; Suominen, Auli; Surén, Pål; Susser, Ezra
2013-11-01
The International Collaboration for Autism Registry Epidemiology (iCARE) is the first multinational research consortium (Australia, Denmark, Finland, Israel, Norway, Sweden, USA) to promote research in autism geographical and temporal heterogeneity, phenotype, family and life course patterns, and etiology. iCARE devised solutions to challenges in multinational collaboration concerning data access security, confidentiality and management. Data are obtained by integrating existing national or state-wide, population-based, individual-level data systems and undergo rigorous harmonization and quality control processes. Analyses are performed using database federation via a computational infrastructure with a secure, web-based, interface. iCARE provides a unique, unprecedented resource in autism research that will significantly enhance the ability to detect environmental and genetic contributions to the causes and life course of autism.
A 3S Risk ?3SR? Assessment Approach for Nuclear Power: Safety Security and Safeguards.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Forrest, Robert; Reinhardt, Jason Christian; Wheeler, Timothy A.
Safety-focused risk analysis and assessment approaches struggle to adequately include malicious, deliberate acts against the nuclear power industry's fissile and waste material, infrastructure, and facilities. Further, existing methods do not adequately address non- proliferation issues. Treating safety, security, and safeguards concerns independently is inefficient because, at best, it may not take explicit advantage of measures that provide benefits against multiple risk domains, and, at worst, it may lead to implementations that increase overall risk due to incompatibilities. What is needed is an integrated safety, security and safeguards risk (or "3SR") framework for describing and assessing nuclear power risks that canmore » enable direct trade-offs and interactions in order to inform risk management processes -- a potential paradigm shift in risk analysis and management. These proceedings of the Sandia ePRA Workshop (held August 22-23, 2017) are an attempt to begin the discussions and deliberations to extend and augment safety focused risk assessment approaches to include security concerns and begin moving towards a 3S Risk approach. Safeguards concerns were not included in this initial workshop and are left to future efforts. This workshop focused on four themes in order to begin building out a the safety and security portions of the 3S Risk toolkit: 1. Historical Approaches and Tools 2. Current Challenges 3. Modern Approaches 4. Paths Forward and Next Steps This report is organized along the four areas described above, and concludes with a summary of key points. 2 Contact: rforres@sandia.gov; +1 (925) 294-2728« less
Schnierle, Jeanette; Florian, Hannah; Agarwal, Aradhna; Rundell, Kristen; McAlearney, Ann Scheck
2017-01-01
Background Patient portals have shown promise in engaging individuals in self-management of chronic conditions by allowing patients to input and track health information and exchange secure electronic messages with their providers. Past studies have identified patient barriers to portal use including usability issues, low health literacy, and concerns about loss of personal contact as well as provider concerns such as increased time spent responding to messages. However, to date, studies of both patient and provider perspectives on portal use have focused on the pre-implementation or initial implementation phases and do not consider how these issues may change as patients and providers gain greater experience with portals. Objective Our study examined the following research question: Within primary care offices with high rates of patient-portal use, what do experienced physician and patient users of the ambulatory portal perceive as the benefits and challenges of portal use in general and secure messaging in particular? Methods This qualitative study involved 42 interviews with experienced physician and patient users of an ambulatory patient portal, Epic’s MyChart. Participants were recruited from the Department of Family Medicine at a large Academic Medical Center (AMC) and included providers and their patients, who had been diagnosed with at least one chronic condition. A total of 29 patients and 13 primary care physicians participated in the interviews. All interviews were conducted by telephone and followed a semistructured interview guide. Interviews were transcribed verbatim to permit rigorous qualitative analysis. Both inductive and deductive methods were used to code and analyze the data iteratively, paying particular attention to themes involving secure messaging. Results Experienced portal users discussed several emergent themes related to a need for greater clarity on when and how to use the secure messaging feature. Patient concerns included worry about imposing on their physician’s time, the lack of provider compensation for responding to secure messages, and uncertainty about when to use secure messaging to communicate with their providers. Similarly, providers articulated a lack of clarity as to the appropriate way to communicate via MyChart and suggested that additional training for both patients and providers might be important. Patient training could include orienting patients to the “rules of engagement” at portal sign-up, either in the office or through an online tutorial. Conclusions As secure messaging through patient portals is increasingly being used as a method of physician-patient communication, both patients and providers are looking for guidance on how to appropriately engage with each other using this tool. Patients worry about whether their use is appropriate, and providers are concerned about the content of messages, which allow them to effectively manage patient questions. Our findings suggest that additional training may help address the concerns of both patients and providers, by providing “rules of engagement” for communication via patient portals. PMID:28676467
Neuromodulation research and application in the U.S. Department of Defense.
Nelson, Jeremy T; Tepe, Victoria
2015-01-01
Modern neuromodulatory techniques for military applications have been explored for the past decade, with an intent to optimize operator performance and, ultimately, to improve overall military effectiveness. In light of potential military applications, some researchers have voiced concern about national security agency involvement in this area of research, and possible exploitation of research findings to support military objectives. The aim of this article is to examine the U.S. Department of Defense's interest in and application of neuromodulation. We explored articles, cases, and historical context to identify critical considerations of debate concerning dual use (i.e., national security and civilian) technologies, specifically focusing on non-invasive brain stimulation (NIBS). We review the background and recent examples of DoD-sponsored neuromodulation research, framed in the more general context of research that aims to optimize and/or rehabilitate human performance. We propose that concerns about military exploitation of neuromodulatory science and technology are not unique, but rather are part of a larger philosophic debate pertaining to military application of human performance science and technology. We consider unique aspects of the Department of Defense research enterprise--which includes programs crucial to the advancement of military medicine--and why it is well-situated to fund and perform such research. We conclude that debate concerning DoD investment in human performance research must recognize the significant potential for dual use (civilian, medical) benefit as well as the need for civilian scientific insight and influence. Military interests in the health and performance of service members provide research funding and impetus to dual use applications that will benefit the civilian community. Copyright © 2015 Elsevier Inc. All rights reserved.
HIV/AIDS, conflict and security in Africa: rethinking relationships
2008-01-01
The effect of conflict on HIV transmission and regional and global security has been the subject of much recent discussion and debate. Many long held assumptions regarding these relationships are being reconsidered. Conflict has long been assumed to contribute significantly to the spread of HIV infection. However, new research is casting doubt on this assumption. Studies from Africa suggest that conflict does not necessarily predispose to HIV transmission and indeed, there is evidence to suggest that recovery in the "post-conflict" state is potentially dangerous from the standpoint of HIV transmission. As well, refugee populations have been previously considered as highly infected vectors of HIV transmission. But in light of new investigation this belief is also being reconsidered. There has additionally been concern that high rates of HIV infection among many of the militaries of sub-Saharan Africa poses a threat to regional security. However, data is lacking on both dramatically elevated prevalence amongst soldiers and a possible negative effect on regional security. Nevertheless, HIV/AIDS remain a serious threat to population health and economic well being in this region. These issues are of vital importance for HIV programming and health sector development in conflict and "post-conflict" societies and will constitute formidable challenges to the international community. Further research is required to better inform the discussion of HIV, conflict, and security in sub-Saharan Africa. PMID:19014653
76 FR 12144 - Advanced Optics Electronics, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Advanced Optics Electronics, Inc.; Order of... lack of current and accurate information concerning the securities of Advanced Optics Electronics, Inc... in Advanced Optics Electronics, Inc. Therefore, it is ordered, pursuant to Section 12(k) of the...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-23
... Electronics, Inc.; Order of Suspension of Trading June 21, 2011. It appears to the Securities and Exchange... information concerning the securities of SJ Electronics, Inc. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-04
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Acies Corporation, Immtech Pharmaceuticals, Inc., MRU Holdings, Inc., MSTI Holdings, Inc., Nestor, Inc., New Generation Holdings, Inc., and Nuevo... that there is a lack of current and accurate information concerning the securities of New Generation...
77 FR 22221 - Security Zones; North Atlantic Treaty Organization (NATO) Summit, Chicago, IL
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-13
... affect your small business, organization, or governmental jurisdiction and you have questions concerning...-AA87 Security Zones; North Atlantic Treaty Organization (NATO) Summit, Chicago, IL AGENCY: Coast Guard... with a large scale, international political event. DATES: This rule is effective between 8 a.m. on May...
29 CFR 2580.412-2 - Plans exempt from the coverage of section 13.
Code of Federal Regulations, 2010 CFR
2010-07-01
... whole or in part, of dealing with employers concerning an employee welfare or pension benefit plan, or... Section 2580.412-2 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR TEMPORARY BONDING RULES UNDER THE EMPLOYEE RETIREMENT INCOME SECURITY ACT OF...
17 CFR 17.02 - Form, manner and time of filing reports.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Form, manner and time of filing reports. 17.02 Section 17.02 Commodity and Securities Exchanges COMMODITY FUTURES TRADING... markets located in that time zone, and central time for information concerning all other markets. (b...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-30
...-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of Proposed Rule Change Regarding Professional Qualifications and Information Concerning Associated Persons September 26, 2011... Organization's Statement of the Terms of Substance of the Proposed Rule Change The MSRB is filing with the SEC...
Sen. Snowe, Olympia J. [R-ME
2009-05-19
Senate - 05/19/2009 Read twice and referred to the Committee on Small Business and Entrepreneurship. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
Cryptographic Research and NSA: Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
Davida, George I.
1981-01-01
The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)
Report of the Public Cryptography Study Group.
ERIC Educational Resources Information Center
American Council on Education, Washington, DC.
Concerns of the National Security Agency (NSA) that information contained in some articles about cryptography in learned and professional journals and in monographs might be inimical to the national security are addressed. The Public Cryptography Study Group, with one dissenting opinion, recommends that a voluntary system of prior review of…
Information Security and Privacy in Network Environments.
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Office of Technology Assessment.
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
78 FR 74216 - Guar Global Ltd.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-10
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Guar Global Ltd.; Order of Suspension of... and the protection of investors require a suspension of trading in the securities of Guar Global Ltd. (``Guar Global'') because of concerns regarding the accuracy and adequacy of information in the...
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AB Liquidating Corp. (f/k/a Adaptive Broadband Corp.), Globalnet Corp., Greenland Corp., KeraVision, Inc., Lifespan, Inc., STAR Telecommunications... concerning the securities of STAR Telecommunications, Inc. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-17
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Data Fortress Systems Group Ltd., Digital Youth Network Corp., Fantom Technologies, Inc., and KIK Technology International, Inc., Order of... of current and accurate information concerning the securities of Data Fortress Systems Group Ltd...
78 FR 72139 - Nevada Gold Corp.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1 ] Nevada Gold Corp.; Order of Suspension of... current and accurate information concerning the securities of Nevada Gold Corp. (``Nevada Gold'') because of questions regarding the accuracy of assertions by Nevada Gold, and by others, to investors in...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Patch International, Inc., QuadTech International, Inc., Strategic Resources, Ltd., and Virtual Medical Centre, Inc.; Order of Suspension of Trading... lack of current and accurate information concerning the securities of Virtual Medical Centre, Inc...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-07
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; Airtrax, Inc., Amedia Networks, Inc., American Business Financial Services, Inc., Appalachian Bancshares, Inc., and... information concerning the securities of American Business Financial Services, Inc. because it has not filed...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-12-09
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Community Alliance, Inc., Defi Global, Inc., Easy Energy, Inc., Industry Concept Holdings, Inc., and Transworld Benefits International, Inc.; Order... that there is a lack of current and accurate information concerning the securities of Industry Concept...
78 FR 69516 - In The Matter of: Sovereign Lithium, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In The Matter of: Sovereign Lithium, Inc... securities of Sovereign Lithium, Inc. (``Sovereign Lithium'') because of concerns regarding the accuracy and adequacy of information in the marketplace and potentially manipulative transactions in Sovereign Lithium's...
12 CFR 742.4 - RegFlex Relief.
Code of Federal Regulations, 2010 CFR
2010-01-01
... discretionary control can be delegated; (6) “Stress testing” of investments. Section 703.12(c) of this chapter concerning “stress testing” of securities holdings to assess the impact of an extreme interest rate shift; (7... nationally-recognized statistical rating organization; (ii) The security meets the definition of mortgage...
Consumers and Food Security: Uncertain or Empowered?
ERIC Educational Resources Information Center
Kneafsey, Moya; Dowler, Elizabeth; Lambie-Mumford, Hannah; Inman, Alex; Collier, Rosemary
2013-01-01
Provoked by concerns about climate change, resource depletion and economic recession, the concept of food security has experienced a renaissance in international policy and research agendas. Despite this interest, the problem of food insecurity in wealthy countries has still not received enough attention. We argue that it is worthy of research and…
76 FR 17726 - In the Matter of Euro Solar Parks, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-30
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Euro Solar Parks, Inc.; Order... there is a lack of current and accurate information concerning the securities of Euro Solar Parks, Inc. (``Euro Solar'') because of [[Page 17727
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-15
... DEPARTMENT OF HOMELAND SECURITY 48 CFR Parts 3009 and 3052 [Docket No. DHS-2010-0017] RIN 1601... corrects internal citations within the Homeland Security Acquisition Regulation to reflect previous redesignation of sections related to contracting with corporate expatriates and the recodification of certain...
77 FR 22622 - AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AP Henderson Group, BPO Management Services, Inc., Capital Mineral Investors, Inc., CardioVascular BioTherapeutics, Inc., and 1st Centennial... that there is a lack of current and accurate information concerning the securities of 1st Centennial...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-14
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] RMD Technologies, Inc., Rockwall Holdings, Inc., Southmark Corp., Stargold Mines, Inc., Stelax Industries, Ltd., Stem Cell Innovations, Inc., and Surfect... there is a lack of current and accurate information concerning the securities of Stem Cell Innovations...
USDA-ARS?s Scientific Manuscript database
In recent years, concerns about global, sustainable, and nutritional security have gained substantial momentum propelled by rapid increases in global population and food insecurity. Historically, plant breeding has played a key role in improving crop yield to keep pace with the rising global populat...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Fearless International, Inc., Glassmaster Company, Global Entertainment Holdings/Equities, Inc., Global Realty Development Corp., Global... concerning the securities of Global Entertainment Holdings/Equities, Inc. because it has not filed any...
Campus Security Authorities, a New Look
ERIC Educational Resources Information Center
McCauley, Terry
2012-01-01
Recent high-profile events created the need for institutions in the United States to heighten concerns about how those responsible for compliance with the Clery Act handle Campus Security Authority (CSA) issues. Not expressly but realistically those responsible for integrating this complicated set of laws within institutions have likely just been…
78 FR 8682 - Americas Energy Company-AECo; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Americas Energy Company--AECo; Order of... lack of current and accurate information concerning the securities of Americas Energy Company-AECo (``Americas'') because Americas has not filed any periodic reports since the period ended September 30, 2011...
ERIC Educational Resources Information Center
Giesen, J. Martin; Cavenaugh, Brenda S.
2013-01-01
Introduction: Given mutual concerns of vocational rehabilitation and the Social Security Administration, our purpose was to evaluate the effect of current individual and economic factors on competitive employment for Social Security Disability Insurance (SSDI) beneficiaries with visual impairments in vocational rehabilitation. Methods: Using…
India’s Evolving Nuclear Force and Its Implications for U.S. Strategy in the Asia-Pacific
2016-06-01
concerning the role of ground forces in achieving national security objectives. The Strategic Studies Institute publishes national security and...international audience, and honor Soldiers—past and present. STRATEGIC STUDIES INSTITUTE The Strategic Studies Institute (SSI) is part of the U.S...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists
Kramer, Daniel B.; Foo Kune, Denis; Auto de Medeiros, Julio; Yan, Chen; Xu, Wenyuan; Crawford, Thomas; Fu, Kevin
2017-01-01
Abstract Medical devices increasingly depend on software. While this expands the ability of devices to perform key therapeutic and diagnostic functions, reliance on software inevitably causes exposure to hazards of security vulnerabilities. This article uses a recent high‐profile case example to outline a proactive approach to security awareness that incorporates a scientific, risk‐based analysis of security concerns that supports ongoing discussions with patients about their medical devices. PMID:28512774
Biosecurity and the review and publication of dual-use research of concern.
Patrone, Daniel; Resnik, David; Chin, Lisa
2012-09-01
Dual-use research of concern (DURC) is scientific research with significant potential for generating information that could be used to harm national security, the public health, or the environment. Editors responsible for journal policies and publication decisions play a vital role in ensuring that effective safeguards exist to cope with the risks of publishing scientific research with dual-use implications. We conducted an online survey of 127 chief editors of life science journals in 27 countries to examine their attitudes toward and experience with the review and publication of dual-use research of concern. Very few editors (11) had experience with biosecurity review, and no editor in our study reported having ever refused a submission on biosecurity grounds. Most respondents (74.8%) agreed that editors have a responsibility to consider biosecurity risks during the review process, but little consensus existed among editors on how to handle specific issues in the review and publication of research with potential dual-use implications. More work is needed to establish consensus on standards for the review and publication of dual-use research of concern in life science journals.
Biosecurity and the Review and Publication of Dual-Use Research of Concern
Resnik, David; Chin, Lisa
2012-01-01
Dual-use research of concern (DURC) is scientific research with significant potential for generating information that could be used to harm national security, the public health, or the environment. Editors responsible for journal policies and publication decisions play a vital role in ensuring that effective safeguards exist to cope with the risks of publishing scientific research with dual-use implications. We conducted an online survey of 127 chief editors of life science journals in 27 countries to examine their attitudes toward and experience with the review and publication of dual-use research of concern. Very few editors (11) had experience with biosecurity review, and no editor in our study reported having ever refused a submission on biosecurity grounds. Most respondents (74.8%) agreed that editors have a responsibility to consider biosecurity risks during the review process, but little consensus existed among editors on how to handle specific issues in the review and publication of research with potential dual-use implications. More work is needed to establish consensus on standards for the review and publication of dual-use research of concern in life science journals. PMID:22871221
Code of Federal Regulations, 2010 CFR
2010-07-01
... matters concerning the Air Force. The Secretary of Homeland Security, addressing matters concerning the... 32 National Defense 2 2010-07-01 2010-07-01 false Definitions. 281.3 Section 281.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS...
Code of Federal Regulations, 2014 CFR
2014-07-01
... matters concerning the Air Force. The Secretary of Homeland Security, addressing matters concerning the... 32 National Defense 2 2014-07-01 2014-07-01 false Definitions. 281.3 Section 281.3 National Defense Department of Defense (Continued) OFFICE OF THE SECRETARY OF DEFENSE (CONTINUED) MISCELLANEOUS...
Distance Learning: What's Holding Back This Boundless Delivery System?
ERIC Educational Resources Information Center
Bruder, Isabelle
1989-01-01
Discusses distance learning, identifies who distance learners may be, and examines issues involved in establishing distance learning systems. Topics discussed include teacher concerns, including job security and certification; curriculum concerns, including state and local requirements and cross-cultural issues; cooperative development,…
Tsenov, B G; Emery, R J; Whitehead, L W; Gonzalez, J Reingle; Gemeinhardt, G L
2018-03-01
While many organizations maintain multiple layers of security control methodologies to prevent outsiders from gaining unauthorized access, persons such as employees or contractors who have been granted legitimate access can represent an "insider threat" risk. Interestingly, some of the most notable radiological events involving the purposeful contamination or exposure of individuals appear to have been perpetrated by insiders. In the academic and medical settings, radiation safety professionals focus their security efforts on (1) ensuring controls are in place to prevent unauthorized access or removal of sources, and (2) increasing security controls for the unescorted accessing of large sources of radioactivity (known as "quantities of concern"). But these controls may not completely address the threat insiders represent when radioactive materials below these quantities are present. The goal of this research project was to characterize the methodologies currently employed to counteract the insider security threat for the misuse or purposeful divergence of radioactive materials used in the academic and medical settings. A web-based survey was used to assess how practicing radiation safety professionals in academic and medical settings anticipate, evaluate, and control insider threat security risks within their institutions. While all respondents indicated that radioactive sources are being used in amounts below quantities of concern, only 6 % consider insider threat security issues as part of the protocol review for the use of general radioactive materials. The results of this survey identify several opportunities for improvement for institutions to address security gaps.
Davis, Deborah; Soref, Assaf; Villalobos, J Guillermo; Mikulincer, Mario
2016-08-01
Interviewers often face respondents reluctant to disclose sensitive, embarrassing or potentially damaging information. We explored effects of priming 5 states of mind on willingness to disclose: including 2 expected to facilitate disclosure (self-affirmation, attachment security), and 3 expected to inhibit disclosure (self-disaffirmation, attachment insecurity, mortality salience). Israeli Jewish participants completed a survey including a manipulation of 1 of these states of mind, followed by questions concerning hostile thoughts and behaviors toward the Israeli Arab outgroup, past minor criminal behaviors, and socially undesirable traits and behaviors. Self-affirmation led to more disclosures of all undesirable behaviors than neutral priming, whereas self-disaffirmation led to less disclosures. Mortality salience led to fewer disclosures of socially undesirable and criminal behaviors compared to neutral priming, but more disclosures of hostile thoughts and behaviors toward Israeli Arabs. Security priming facilitated disclosure of hostile attitudes toward Israeli Arabs. However, neither security nor insecurity priming had any other significant effects. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Lalloo, R; Ayo-Yusuf, O A; Yengopal, V
2008-05-01
This study investigated the career choice and aspirations of early phase dental students in the four dental schools in South Africa, namely the University of the Western Cape (UWC), University of the Witwatersrand (Wits), University of Limpopo (Medunsa) and University of Pretoria (UP). Willing participants completed a self-administered questionnaire (n=184). Motivations for entering a dentistry programme were similar across race and university, with wanting a secure job most often stated as an important factor. For a third of respondents, dentistry was not a first choice. Amongst the White students, it was a first choice for 82% compared with 59% amongst Black Africans. Expected income five-years after graduation also differed significantly across race and university, with White and UP students expecting to earn considerably higher than the others. About 36% of students were concerned about the levels of personal debt related to studying, with the White and Asian students less concerned. Those who expected lower levels of income from the profession were more concerned about personal debts. Most students planned to enter general dental practice (GDP) after community service, almost all White and Wits students expressed this intention, compared with only 35% of Black Africans and 39% of Medunsa students. Orthodontics and Maxillofacial & Oral Surgery were the most popular specialities of choice. The professional attribute "Has a friendly manner and good relationship with patients" was ranked high most often. In conclusion, career advice may not need to be tailored differently for the different racial groups. There is however a need for further investigations on how to address the concerns of financial security which may be realised by the practice of dentistry, and in particular the racial disparities observed in expectations of the profession. This study further highlights the need for government financial assistance for students from under-represented groups.
Spatiotemporal patterns of paddy rice croplands in China and India from 2000 to 2015.
Zhang, Geli; Xiao, Xiangming; Biradar, Chandrashekhar M; Dong, Jinwei; Qin, Yuanwei; Menarguez, Michael A; Zhou, Yuting; Zhang, Yao; Jin, Cui; Wang, Jie; Doughty, Russell B; Ding, Mingjun; Moore, Berrien
2017-02-01
Due to rapid population growth and urbanization, paddy rice agriculture is experiencing substantial changes in the spatiotemporal pattern of planting areas in the two most populous countries-China and India-where food security is always the primary concern. However, there is no spatially explicit and continuous rice-planting information in either country. This knowledge gap clearly hinders our ability to understand the effects of spatial paddy rice area dynamics on the environment, such as food and water security, climate change, and zoonotic infectious disease transmission. To resolve this problem, we first generated annual maps of paddy rice planting areas for both countries from 2000 to 2015, which are derived from time series Moderate Resolution Imaging Spectroradiometer (MODIS) data and the phenology- and pixel-based rice mapping platform (RICE-MODIS), and analyzed the spatiotemporal pattern of paddy rice dynamics in the two countries. We found that China experienced a general decrease in paddy rice planting area with a rate of 0.72 million (m) ha/yr from 2000 to 2015, while a significant increase at a rate of 0.27mha/yr for the same time period happened in India. The spatial pattern of paddy rice agriculture in China shifted northeastward significantly, due to simultaneous expansions in paddy rice planting areas in northeastern China and contractions in southern China. India showed an expansion of paddy rice areas across the entire country, particularly in the northwestern region of the Indo-Gangetic Plain located in north India and the central and south plateau of India. In general, there has been a northwesterly shift in the spatial pattern of paddy rice agriculture in India. These changes in the spatiotemporal patterns of paddy rice planting area have raised new concerns on how the shift may affect national food security and environmental issues relevant to water, climate, and biodiversity. Copyright © 2016 Elsevier B.V. All rights reserved.
MacDonald, Glen M
2010-12-14
The current Southwest drought is exceptional for its high temperatures and arguably the most severe in history. Coincidentally, there has been an increase in forest and woodland mortality due to fires and pathogenic outbreaks. Although the high temperatures and aridity are consistent with projected impacts of greenhouse warming, it is unclear whether the drought can be attributed to increased greenhouse gases or is a product of natural climatic variability. Climate models indicate that the 21st century will be increasingly arid and droughts more severe and prolonged. Forest and woodland mortality due to fires and pathogens will increase. Demography and food security dictate that water demand in the Southwest will remain appreciable. If projected population growth is twinned with suburb-centered development, domestic demands will intensify. Meeting domestic demands through transference from agriculture presents concerns for rural sustainability and food security. Environmental concerns will limit additional transference from rivers. It is unlikely that traditional supply-side solutions such as more dams will securely meet demands at current per-capita levels. Significant savings in domestic usage can be realized through decreased applications of potable water to landscaping, but this is a small fraction of total regional water use, which is dominated by agriculture. Technical innovations, policy measures, and market-based solutions that increase supply and decrease water demand are all needed. Meeting 21st-century sustainability challenges in the Southwest will also require planning, cooperation, and integration that surpass 20th-century efforts in terms of geographic scope, jurisdictional breadth, multisectoral engagement, and the length of planning timelines.
Singh, Abhinav; Purohit, Bharathi M
2017-06-01
To assess patient satisfaction, self-rated oral health and associated factors, including periodontal status and dental caries, among patients covered for dental insurance through a National Social Security Scheme in New Delhi, India. A total of 1,498 patients participated in the study. Satisfaction levels and self-rated oral-health scores were measured using a questionnaire comprising 12 closed-ended questions. Clinical data were collected using the Community Periodontal Index (CPI) and the decayed, missing and filled teeth (DMFT) index. Regression analysis was conducted to evaluate factors associated with dental caries, periodontal status and self-rated oral health. Areas of concern included poor cleanliness within the hospital, extensive delays for appointments, waiting time in hospital and inadequate interpersonal and communication skills among health-care professionals. Approximately 51% of the respondents rated their oral health as fair to poor. Younger age, no tobacco usage, good periodontal status and absence of dental caries were significantly associated with higher oral health satisfaction, with odds ratios of 3.94, 2.38, 2.58 and 2.09, respectively (P ≤ 0.001). The study indicates poor satisfaction levels with the current dental care system and a poor self-rated oral health status among the study population. Some specific areas of concern have been identified. These findings may facilitate restructuring of the existing dental services under the National Social Security Scheme towards creating a better patient care system. © 2017 FDI World Dental Federation.
Put a Coalatom in Your Tank: The Compelling Case for a Marriage of Coal and Nuclear Energy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Penfield, Scott R. Jr.; Bolthrunis, Charles O.
2006-07-01
Increasing costs and security concerns with present fossil energy sources, plus environmental concerns related to CO{sub 2} emissions and the emergence of new technologies in the energy and transportation sectors set the stage for a marriage of convenience between coal and nuclear energy. As the price of oil continues to increase and supply becomes increasingly constrained, coal offers a secure domestic alternative to foreign oil as a source of liquid fuels. However, conventional technologies for converting coal to liquid fuels produce large quantities of CO{sub 2} that must be released or sequestered. Advanced nuclear technologies, particularly the High-Temperature Gas-Cooled Reactormore » (HTGR), have the potential to produce hydrogen via water splitting; however, the transportation and storage of hydrogen are significant barriers to the 'Holy Grail', the Hydrogen Economy. In a coal/nuclear marriage, the hydrogen and oxygen provided by nuclear energy are joined with coal as a source of carbon to provide liquid fuels with negligible CO{sub 2} release from the process. In combination with emerging hybrid vehicles, fuels based on a coal/nuclear marriage promise stable prices, increased domestic security and a reduction in CO{sub 2} emissions without the need to completely replace our transportation fuels infrastructure. The intent of this paper is to outline the technical basis for the above points and to show that process energy applications of nuclear energy can provide the basis for answering some of the tougher questions related to energy and the environment. (authors)« less
Water, climate change, and sustainability in the southwest
2010-01-01
The current Southwest drought is exceptional for its high temperatures and arguably the most severe in history. Coincidentally, there has been an increase in forest and woodland mortality due to fires and pathogenic outbreaks. Although the high temperatures and aridity are consistent with projected impacts of greenhouse warming, it is unclear whether the drought can be attributed to increased greenhouse gasses or is a product of natural climatic variability. Climate models indicate that the 21st century will be increasingly arid and droughts more severe and prolonged. Forest and woodland mortality due to fires and pathogens will increase. Demography and food security dictate that water demand in the Southwest will remain appreciable. If projected population growth is twinned with suburb-centered development, domestic demands will intensify. Meeting domestic demands through transference from agriculture presents concerns for rural sustainability and food security. Environmental concerns will limit additional transference from rivers. It is unlikely that traditional supply-side solutions such as more dams will securely meet demands at current per-capita levels. Significant savings in domestic usage can be realized through decreased applications of potable water to landscaping, but this is a small fraction of total regional water use, which is dominated by agriculture. Technical innovations, policy measures, and market-based solutions that increase supply and decrease water demand are all needed. Meeting 21st-century sustainability challenges in the Southwest will also require planning, cooperation, and integration that surpass 20th-century efforts in terms of geographic scope, jurisdictional breadth, multisectoral engagement, and the length of planning timelines. PMID:21149704
Security and Efficiency Concerns With Distributed Collaborative Networking Environments
2003-09-01
have the ability to access Web communications services of the WebEx MediaTone Network from a single login. [24] WebEx provides a range of secure...Web. WebEx services enable secure data, voice and video communications through the browser and are supported by the WebEx MediaTone Network, a global...designed to host large-scale, structured events and conferences, featuring a Q&A Manager that allows multiple moderators to handle questions while
Computer network security for the radiology enterprise.
Eng, J
2001-08-01
As computer networks become an integral part of the radiology practice, it is appropriate to raise concerns regarding their security. The purpose of this article is to present an overview of computer network security risks and preventive strategies as they pertain to the radiology enterprise. A number of technologies are available that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must be supplemented with vigilant user and system management.
MDA-based EHR application security services.
Blobel, Bernd; Pharow, Peter
2004-01-01
Component-oriented, distributed, virtual EHR systems have to meet enhanced security and privacy requirements. In the context of advanced architectural paradigms such as component-orientation, model-driven, and knowledge-based, standardised security services needed have to be specified and implemented in an integrated way following the same paradigm. This concerns the deployment of formal models, meta-languages, reference models such as the ISO RM-ODP, and development as well as implementation tools. International projects' results presented proceed on that streamline.
Irrigation of floricultural and nursery crops with saline wastewaters
USDA-ARS?s Scientific Manuscript database
Water security has become a major concern throughout the western United States and other arid and semiarid regions worldwide. Uncertainties concerning the allocation and dependability of good quality water have led to increased interest in the use alternative, non-potable waters for irrigated agric...
A New Spin On An Old Crop for Bioenergy: Sorghum
USDA-ARS?s Scientific Manuscript database
Seeking alternative and renewable sources of energy is necessary due to oil price fluctuations, environmental concerns, and national security concerns. Additionally, Southern U.S. agriculture has been negatively affected by drought conditions over the last several years. For these reasons, sorghum m...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-25
... Activities: Cargo Manifest/ Declaration, Stow Plan, Container Status Messages and Importer Security Filing... concerning the following information collection. Title: Cargo Manifest/Declaration, Stow Plan, Container... and other Federal agencies to comment on an information collection requirement concerning the Cargo...
United States national security policy making and Vietnam
DOE Office of Scientific and Technical Information (OSTI.GOV)
Davidson, M.W.
1985-01-01
The United States failed to achieve its goals in waging a war in Vietnam. This thesis endeavors to show that this failure was due to errors in the formulation of American national security policy regarding Vietnam. The policy making process went astray, at least in part, due to a narrowing of the role of senior military officers as national security policy makers. The restricted role of senior officers as national security policy makers adversely affected American policy formulation regarding Vietnam. The United States response to the coup against Diem in 1963 and the deployment of conventional American forces to groundmore » combat in Vietnam, in 1965 were undertaken without a clear recognition of the considerable costs of the commitments being assumed. Senior military officers had prompted such a recognition in similar previous crises but were not in a policy making position to do so concerning Vietnam. The policymaking input that was absent was ethical counsel of a fundamental nature. Clausewitz viewed the mortality of a war as being embodied in the national will to fight that war. The absence of an accurate appreciation of the costs of a military solution in Vietnam denied civilian officials a critical policy making factor and contributed significantly to the defeat of the American purpose there.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-13
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: Brendan Technologies, Inc., CenterStaging Corp., PGMI, Inc., Thermal Energy Storage, Inc., and Trinity3 Corporation; Order of... there is a lack of current and accurate information concerning the securities of Thermal Energy Storage...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] AIMS Worldwide, Inc., Apollo Capital Group, Inc., CommunitySouth Financial Corp., Last Mile Logistics Group, Inc., Made in America Entertainment... concerning the securities of Last Mile Logistics Group, Inc. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-01-27
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Tornado Gold International Corp., Twin Faces East Entertainment Corp., Universal Ice Blast, Inc., US Farms, Inc., US Microbics... concerning the securities of Tornado Gold International Corp. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Dawn Technologies, Inc., Distinctive Devices, Inc., Haber, Inc., and Independence Brewing Co.; Order of Suspension of Trading June 14... a lack of current and accurate information concerning the securities of Independence Brewing Co...
Securing clean water: A secret to success
Michael Somerville; Dino DeSimone
2000-01-01
Securing clean water is a primary goal for many agencies, organizations, and concerned citizens. To achieve that goal, agencies have traditionally taken a mostly regulatory approach. In recent years, however, a major trend in government has been to move decision-making and action-taking to the local level. Conservation Districts, watershed organizations, and other...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-04
... SECURITIES AND EXCHANGE COMMISSION [ File No. 500-1] In the Matter of Heritage Worldwide, Inc., Impala Mineral Exploration Corp., Klondike Star Mineral Corporation, MIV Therapeutics Inc., Most Home... concerning the securities of Klondike Star Mineral Corporation because it has not filed any periodic reports...
School Security: A Growing Concern
ERIC Educational Resources Information Center
Walker, Milton G.
1976-01-01
Vandalism, trespassing, drug traffic, crowd control, automobile traffic, and emergencies such as fire or storms--these are the kinds of problems a school security system should be designed to eliminate or minimize. A preventive program can save more money than it costs and can improve the learning environment at the same time, says this writer.…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] American Unity Investments, Inc., China Display Technologies, Inc., China Wind Energy, Inc., Fuda Faucet Works, Inc., Greater China Media... concerning the securities of China Wind Energy, Inc. because it has not filed any periodic reports since the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-28
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: American United Gold Corporation, AMS Homecare Inc., Aucxis Corp., and CYOP Systems International Inc.; Order of Suspension of... current and accurate information concerning the securities of American United Gold Corporation because it...
78 FR 63559 - Order Of Suspension of Trading; In the Matter of ARX Gold Corp.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-24
... of ARX Gold Corp. October 22, 2013. It appears to the Securities and Exchange Commission (``Commission'') that there is a lack of current and accurate information concerning the securities of ARX Gold Corp. (``ARX Gold''), quoted under the ticker symbol DUCP, because of questions regarding the...
NASA Blue Team: Determining Operational Security Posture of Critical Systems and Networks
NASA Technical Reports Server (NTRS)
Alley, Adam David
2016-01-01
Emergence of Cybersecurity has increased the focus on security risks to Information Technology (IT) assets going beyond traditional Information Assurance (IA) concerns: More sophisticated threats have emerged from increasing sources as advanced hacker tools and techniques have emerged and proliferated to broaden the attack surface available across globally interconnected networks.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-06
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] BluePoint Linux Software Corp., China Bottles Inc., Long-e International, Inc., and Nano Superlattice Technology, Inc.; Order of Suspension of... current and accurate information concerning the securities of BluePoint Linux Software Corp. because it...
Strategy for Peace. Annual U.S. Foreign Policy Conference (22nd, October 16-18, 1981).
ERIC Educational Resources Information Center
Stanley Foundation, Muscatine, IA.
Five discussion topics concerning peace were dealt with by conference participants, who included university faculty and officials from national and international agencies and organizations. The first topic, North-South relations and international security, considers U.S. security and the Third World, U.S. economic interests in the developing…
18 CFR 3b.202 - Collection of information from individuals concerned.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the Commission for inclusion in a system of records which may result in adverse determinations about... providing all or any part of the requested information. (c) Social security numbers will not be required... requested to disclose his social security number to the Commission, he will be informed under what statutory...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-25
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of Camelot Entertainment Group, Inc., Cavico Corp., Global 8 Environmental Technologies, Inc., GTC Telecom Corp., ICF Corporation, and... concerning the securities of GTC Telecom Corp. because it has not filed any periodic reports since the period...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-20
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] In the Matter of: BP International, Inc., CyGene Laboratories, Inc., Delek Resources, Inc., Flooring America, Inc., International Diversified... there is a lack of current and accurate information concerning the securities of CyGene Laboratories...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-22
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Abviva, Inc., ACTIS Global Ventures, Inc., aeroTelesis, Inc., Amwest Insurance Group, Inc., and Auto Underwriters of America, Inc.; Order of... concerning the securities of Auto Underwriters of America, Inc. because it has not filed any periodic reports...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-11-16
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] DIAS Holding, Inc., EarthBlock Technologies, Inc., Ensurapet, Inc., FIIC Holdings, Inc., GeM Solutions, Inc., Gold Star Tutoring Services Inc., and... accurate information concerning the securities of EarthBlock Technologies, Inc. because it has not filed...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-04-02
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Advanced BioPhotonics, Inc., Advanced Viral Research Corp., Brantley Capital Corp., Brilliant Technologies Corporation, 4C Controls, Inc., and 2-Track... Commission that there is a lack of current and accurate information concerning the securities of Advanced Bio...
76 FR 1559 - Guidelines for the Use of Electronic Voting Systems in Union Officer Elections
Federal Register 2010, 2011, 2012, 2013, 2014
2011-01-11
... voting. Id. However, there are still concerns regarding on-line computer security, viruses and attacks... casting votes at polling sites; electronic voting from remote site personal computers via the Internet..., Washington, DC 20210. Because of security precautions, the Department continues to experience delays in U.S...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-09
..., DHS. ACTION: Notice. SUMMARY: The United States and Canada are staunch allies, vital economic partners... in which the United States and Canada share responsibility for the security and resilience of our..., while working together to facilitate the flows of legitimate travel and trade. Beyond the Border...
The National Bureau of Asian Research
security concerns, starting with overhauling CFIUS [Committee on Foreign Investment in the United States for Innovation, Trade, and StrategyJohn M. Shalikashvili Chair in National Security StudiesKenneth B ForumInnovative AsiaIndia's IP and Innovation PolicyThe Globalization of China's Life Science SectorAll IP
77 FR 25774 - Order of Suspension of Trading; In the Matter of Berman Center, Inc., Cyberkinetics...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-01
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] Order of Suspension of Trading; In the Matter of Berman Center, Inc., Cyberkinetics Neurotechnology Systems, Inc., and Java Detour, Inc. April 27... information concerning the securities of Java Detour, Inc. because it has not filed any periodic reports since...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... Collection Surrounding the Sale and Issue of Marketable Book-Entry Securities ACTION: Notice and request for... Department of the Treasury is soliciting comments concerning the Sale and Issue of Marketable Book-Entry... Marketable Book-Entry Securities. OMB Number: 1535-0112. Abstract: The information is requested to ensure...
The Emotional Climate of the Interpersonal Classroom in a Maximum Security Prison for Males.
ERIC Educational Resources Information Center
Meussling, Vonne
1984-01-01
Examines the nature, the task, and the impact of teaching in a maximum security prison for males. Data are presented concerning the curriculum design used in order to create a nonevaluative atmosphere. Inmates' reactions to self-disclosure and open communication in a prison setting are evaluated. (CT)
77 FR 10004 - C$ cMoney, Inc.; Order of Suspension of Trading
Federal Register 2010, 2011, 2012, 2013, 2014
2012-02-21
... SECURITIES AND EXCHANGE COMMISSION [File No. 500-1] C$ cMoney, Inc.; Order of Suspension of... current and accurate information concerning the securities of C$ cMoney, Inc. (``cMoney'') because of questions regarding the accuracy of assertions by cMoney, and by others, in press releases to investors and...
12 CFR 344.9 - Personal securities trading reporting by bank officers and employees.
Code of Federal Regulations, 2010 CFR
2010-01-01
... decisions for the accounts of customers; (2) Participate in the determination of such recommendations or decisions; or (3) In connection with their duties, obtain information concerning which securities are being purchased or sold or recommend such action, must report to the bank, within 30-calendar days after the end...
Reliability, Compliance, and Security in Web-Based Course Assessments
ERIC Educational Resources Information Center
Bonham, Scott
2008-01-01
Pre- and postcourse assessment has become a very important tool for education research in physics and other areas. The web offers an attractive alternative to in-class paper administration, but concerns about web-based administration include reliability due to changes in medium, student compliance rates, and test security, both question leakage…
Attachment and prejudice: The mediating role of empathy.
Boag, Elle M; Carnelley, Katherine B
2016-06-01
In two studies, we examined the novel hypothesis that empathy is a mechanism through which the relationship between attachment patterns and prejudice can be explained. Study 1 examined primed attachment security (vs. neutral prime), empathy, and prejudice towards immigrants. Study 2 examined primed attachment patterns (secure, avoidant, anxious), empathy subscales (perspective taking, empathic concern, personal distress), and prejudice towards Muslims. Across both studies, empathy mediated the relationship between primed attachment security and low prejudice levels. The findings suggest that enhancing felt security and empathic skills in individuals high in attachment-avoidance may lead to reduced prejudice. © 2015 The British Psychological Society.
The Psychology of Working Theory.
Duffy, Ryan D; Blustein, David L; Diemer, Matthew A; Autin, Kelsey L
2016-03-01
In the current article, we build on research from vocational psychology, multicultural psychology, intersectionality, and the sociology of work to construct an empirically testable Psychology of Working Theory (PWT). Our central aim is to explain the work experiences of all individuals, but particularly people near or in poverty, people who face discrimination and marginalization in their lives, and people facing challenging work-based transitions for which contextual factors are often the primary drivers of the ability to secure decent work. The concept of decent work is defined and positioned as the central variable within the theory. A series of propositions is offered concerning (a) contextual predictors of securing decent work, (b) psychological and economic mediators and moderators of these relations, and (c) outcomes of securing decent work. Recommendations are suggested for researchers seeking to use the theory and practical implications are offered concerning counseling, advocacy, and public policy. (c) 2016 APA, all rights reserved).
Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete—the traditional approach for calculating reliability—is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods. PMID:25405226
Security threat assessment of an Internet security system using attack tree and vague sets.
Chang, Kuei-Hu
2014-01-01
Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.
Analyzing the security of an existing computer system
NASA Technical Reports Server (NTRS)
Bishop, M.
1986-01-01
Most work concerning secure computer systems has dealt with the design, verification, and implementation of provably secure computer systems, or has explored ways of making existing computer systems more secure. The problem of locating security holes in existing systems has received considerably less attention; methods generally rely on thought experiments as a critical step in the procedure. The difficulty is that such experiments require that a large amount of information be available in a format that makes correlating the details of various programs straightforward. This paper describes a method of providing such a basis for the thought experiment by writing a special manual for parts of the operating system, system programs, and library subroutines.
Public perspectives on nuclear security. US national security surveys, 1993--1997
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, K.G.; Jenkins-Smith, H.C.
This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between USmore » and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.« less
Surviving self-employment: a personal case history.
Kasnot, K
1993-01-01
In the popular perception of what determines one's success as a free-lance illustrator, issues other than natural talent or artistic ability are seldom emphasized. In addition to a firm philosophical foundation and a good work ethic, the organization and management of practical concerns play significant roles in the successful operation of any free-lance business. Presented as a personal history, this article discusses some of the most important, yet most neglected, issues that are essential to the economic security and survival of anyone considering a career as a free-lance illustrator.
Recent developments in employee benefits law.
Rose, Jonathan G; Adler, Adam
2005-01-01
The first part of this article highlights important judicial developments involving employee benefits and the Employee Retirement Income Security Act of 1974 ("ERISA"), as amended, during the latter part of 2003 and the first part of 2004, including the most significant U.S. Supreme Court and federal circuit court decisions. The second part covers recent legislative and regulatory developments in employee benefits law. This article is not meant to be exhaustive, but discusses the more important developments during 2003-2004, with particular focus on issues of concern to the insurance industry.
Securing and sustaining employment: concerns of HIV patients in Singapore.
Tan, Si Ying; Ow Yong, Lai Meng; Foong, Jasmin Yuet Ee; Wong, Nicole Huay Sze; Chew, Li Ling; Koh, Yin Ling
2013-01-01
Employment sustainability is one of the most pressing issues inflicting people living with HIV (PLHIV). A qualitative approach was used to elucidate the perceived challenges in sustaining their employment and the perceived barriers in re-entering the workforce for HIV patients. In-depth interviews were conducted with 16 patients from an acute hospital in Singapore. The main challenges raised in sustaining employment were: (1) ability to ensure secrecy of diagnosis from employers, (2) ability to secure financial resources for treatment and sustenance, (3) ability to ensure stable health to meet job requirements, (4) ability to cognitively sit with the concerns of uncertainty and limitations in career, and (5) ability to work through discriminatory workplace practices. The perceived barriers in gaining workforce re-entry were: (1) fear of pre-employment medical screening and potential discriminatory practices at workplace, (2) concerns over health (frequent hospital admissions, physical weakness, and existing medical co-morbidities), and (3) psychosocial challenges (unstable accommodation, older age, financial issues, and trade skills limitation). The overarching factor that influences the success of sustaining and securing an employment among HIV patients is secrecy of the diagnosis. The individuals' health status, financial status and access to healthcare, and other psychosocial challenges further compound the issue.
Questionnaire about psychology/disease correlation–I
Ojog, DG; Pănescu, OM; Rusu, EC; Tănăsescu, MD
2011-01-01
Rationale: The existing personality inventories are exploring too general psychological features so that the possible psychology/disease associations might be leveled out. Objective: We attempt to build a tool to explore the possible correlation between certain psychological features and the most common internal disorders. Method: We have used two questionnaires containing many pairs of synonymous items (necessary for assessing the consistency of the answers). The items are divided into four main domains: preoccupation for the basal conditions of existence (health/ disease/ death, fear, money, lodging); interaction with other people; action, will/ volition, self-assertion; and preoccupation with the exterior. In this first article we are presenting the correlations between items of the first domain, based on the answers from our first 3138 respondents. Results and discussion: The concern about health is best reflected by general formulations. The desire for security is best expressed by items combining the worry about money and dwelling, and worst by items reflecting the eagerness to gain, keep or judiciously spend money. Among the various fears, those of future, darkness, and loneliness are better indicators of security concern. In assessing the anxiety about safety/ security, specific worries are more revelatory than the general ones. Precaution and inclination for order are the best indicators for the aspiration to stability. Poorer ones are the desire for cleanliness and the tendency to attachment. Health and security concerns seem to be consistently linked. The consistency evaluating system will be based upon pairs of synonymous items correlated with a10–200 or less error probability Abbreviations: PP = psychological profile; PF = personality feature; Q1/ Q2/ Q3 = first/ second/ third questionnaire; HeSD = health subdomain; SeSD = security subdomain; StSD = stability subdomain; ChiSq = chi square; ErrProb = error probability (probability of error). PMID:21505574
The International Student Safety Debate: Moving beyond Denial
ERIC Educational Resources Information Center
Nyland, C.; Forbes-Mewett, H.; Marginson, S.
2010-01-01
In 2009 international student safety became an issue of immediate concern to Australian international education exporters following a series of demonstrations by Indian students and interventions by concerned foreign governments. With these developments the "industry" became fixated on how best to secure Australia's share of the…
12 CFR 222.1 - Purpose, scope, and effective dates.
Code of Federal Regulations, 2010 CFR
2010-01-01
...) Section 115, concerning truncation of the social security number in a consumer report; (iv) Section 151(a... consumer reports; (viii) Section 155, concerning notice by debt collectors with respect to fraudulent... part generally applies to persons that obtain and use information about consumers to determine the...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-29
... DEPARTMENT OF HOMELAND SECURITY U.S. Customs and Border Protection Modification of Two National Customs Automation Program (NCAP) Tests Concerning Automated Commercial Environment (ACE) Document Image System (DIS) and Simplified Entry (SE); Correction AGENCY: U.S. Customs and Border Protection, Department...
Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study
NASA Astrophysics Data System (ADS)
Romanov, Anton; Okamoto, Eiji
With the increasing demand for services provided by communication networks, quality and reliability of such services as well as confidentiality of data transfer are becoming ones of the highest concerns. At the same time, because of growing hacker's activities, quality of provided content and reliability of its continuous delivery strongly depend on integrity of data transmission and availability of communication infrastructure, thus on information security of a given IT landscape. But, the amount of resources allocated to provide information security (like security staff, technical countermeasures and etc.) must be reasonable from the economic point of view. This fact, in turn, leads to the need to employ a forecasting technique in order to make planning of IT budget and short-term planning of potential bottlenecks. In this paper we present an approach to make such a forecasting for a wide class of information security related incidents (ISRI) — unambiguously detectable ISRI. This approach is based on different auto regression models which are widely used in financial time series analysis but can not be directly applied to ISRI time series due to specifics related to information security. We investigate and address this specifics by proposing rules (special conditions) of collection and storage of ISRI time series, adherence to which improves forecasting in this subject field. We present an application of our approach to one type of unambiguously detectable ISRI — amount of spam messages which, if not mitigated properly, could create additional load on communication infrastructure and consume significant amounts of network capacity. Finally we evaluate our approach by simulation and actual measurement.
Attitudes of South African oral hygienists towards compulsory community service.
Bhayat, A; Yengopal, V; Rudolph, M J; Naidoo, U; Vayej, A
2008-02-01
Compulsory Community Service (CCS) was introduced into the health service by the government to address the shortage and maldistribution of health professionals within the public sector. The aim of this study was to assess the perceptions of oral hygiene (OH) students, registered in 2004 at the five dental universities regarding the introduction of a 1-year-long CCS. To determine: (a) the students' socio-demographic profile and (b) their attitudes towards CCS. A self-administered questionnaire was hand delivered to all OH students who were registered during 2004 at the respective dental universities. The study yielded a response rate of 70% (109) with the average age of participants being 21.4 years. Most students were female (94%) and more than half were White (52%). More than half (53%) did not want to perform CCS even though 75% acknowledged its' importance. The most common concern for not supporting CCS was security (89%). Ninety per cent (90%) indicated that their preferred tasks would be to engage in clinical work and oral health promotion. Although the majority of participants supported the principles of CCS, a significant number were against the introduction citing security as their main concern. Most of the students preferred to perform clinical work and preventive programmes during their CCS.
Synergies and trade-offs between food security and biodiversity conservation
NASA Astrophysics Data System (ADS)
Molotoks, Amy
2016-04-01
Human land use activities have transformed a large proportion of the world's land surface and in particular, the expansion of agriculture has been a major driver in global land use change. The conversion of natural ecosystems to crop and pasture lands has contributed significantly to deforestation and associated biodiversity loss through habitat destruction. This loss has raised concerns about associated loss of ecological functions which directly support over one billion people worldwide. Furthermore, agriculture itself is heavily reliant on a number of ecosystem services which are essential for crop production. It is therefore essential that the global problems of food insecurity and biodiversity loss are not viewed independently as the methods used to address one will necessarily involve choices affecting the other. This poster will examine the relationship between food security provision and biodiversity hotspots by using global spatial datasets of land use and conservation value.
Airport full-body screening: what is the risk?
Mehta, Pratik; Smith-Bindman, Rebecca
2011-06-27
In the past year, the Transportation Security Administration has deployed full-body scanners in airports across the United States in response to heightened security needs. Several groups have opposed the scans, citing privacy concerns and fear of the radiation emitted by the backscatter x-ray scanners, 1 of the 2 types of machines in use. The radiation doses emitted by the scans are extremely small; the scans deliver an amount of radiation equivalent to 3 to 9 minutes of the radiation received through normal daily living. Furthermore, since flying itself increases exposure to ionizing radiation, the scan will contribute less than 1% of the dose a flyer will receive from exposure to cosmic rays at elevated altitudes. The estimation of cancer risks associated with these scans is difficult, but using the only available models, the risk would be extremely small, even among frequent flyers. We conclude that there is no significant threat of radiation from the scans.
SSeCloud: Using secret sharing scheme to secure keys
NASA Astrophysics Data System (ADS)
Hu, Liang; Huang, Yang; Yang, Disheng; Zhang, Yuzhen; Liu, Hengchang
2017-08-01
With the use of cloud storage services, one of the concerns is how to protect sensitive data securely and privately. While users enjoy the convenience of data storage provided by semi-trusted cloud storage providers, they are confronted with all kinds of risks at the same time. In this paper, we present SSeCloud, a secure cloud storage system that improves security and usability by applying secret sharing scheme to secure keys. The system encrypts uploading files on the client side and splits encrypted keys into three shares. Each of them is respectively stored by users, cloud storage providers and the alternative third trusted party. Any two of the parties can reconstruct keys. Evaluation results of prototype system show that SSeCloud provides high security without too much performance penalty.
The Impact of 'Being There': Psychiatric Staff Attitudes on the Use of Restraint.
Dahan, Sagit; Levi, Galit; Behrbalk, Pnina; Bronstein, Israel; Hirschmann, Shmuel; Lev-Ran, Shaul
2018-03-01
The practice of mechanically restraining psychiatric patients is constantly under debate, and staff attitudes are considered a central factor influencing restraining practices. The aim of this study was to explore associations between psychiatric staff members' presence and participation in incidences of restraint and attitudes towards mechanical restraints. Staff members (psychiatrists, nurses, paramedical staff; N = 143 working in a government psychiatric hospital in Israel) completed a questionnaire including personal information, participation in incidents of restraint and attitudes towards mechanical restraints. Items were categorized into the following categories: security and care; humiliation and offending; control; order; education and punishment. Compared to those who were not present during restraint, staff members who were present agreed significantly less with statements indicating that restraints are humiliating and offending and agreed more with statements indicating that restraints are used primarily for security and care (p < .05). Among those present in incidences of restraint, staff members who physically participated in restraint agreed significantly more with statements indicating that restraints are a means for security, care and order, and less with statements indicating restraints are humiliating and offending, compared to those present but not physically participating in restraint (p < .05). These findings highlight the importance of proximity of staff members to incidences of restraints. This may have implications in understanding the professional and social discourse concerning mechanical restraints.