On the Brink: Instability and the Prospect of State Failure in Pakistan
2010-04-12
unpredictable posture. Most importantly, these historical events, coupled with current political , economic, and security related issues, have created a...current political , economic, and security related issues, have created a fragile state with the propensity to fail. Therefore, this monograph highlights...hardships that have affected the state’s political stability, economic performance, and security. These unrelenting problems lie at the foundation
Global Security Contingency Fund: Summary and Issue Overview
2014-04-04
Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance
The Superpowers: Nuclear Weapons and National Security. National Issues Forums.
ERIC Educational Resources Information Center
Mitchell, Greg; Melville, Keith
Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…
Greenberg, Sheldon F
2007-09-01
In 2004 the US Department of Justice, Office of Community Oriented Policing Services, sponsored a National Summit on Campus Public Safety. The summit brought together various stakeholders including campus police and security officials, local police chiefs, college and university faculty and administrators, federal officials, students and parents, and community leaders to address the issues and complexities of campus safety. Delegates to the summit identified key issues in campus safety and security, which included establishing a national center on campus safety, balancing traditional open environments with the need to secure vulnerable sites, improving coordination with state and local police, reducing internal fragmentation, elevating professionalism, and increasing eligibility of campus police and security agencies to compete for federal law enforcement funds. Focus on "active shooters" on campus, resulting from the Virginia Tech incident, should not diminish attention placed on the broader, more prevalent safety and security issues facing the nation's educational campuses. Recommendations resulting from the summit called for establishing a national agenda on campus safety, formation of a national center on campus public safety, and increased opportunity for campus police and security agencies to compete for federal and state funds.
Banger, Alison K; Alakoye, Amoke O; Rizk, Stephanie C
2008-11-06
As part of the HHS funded contract, Health Information Security and Privacy Collaboration, 41 states and territories have proposed collaborative projects to address cross-state privacy and security challenges related to health IT and health information exchange. Multi-state collaboration on privacy and security issues remains complicated, and resources to support collaboration around these topics are essential to the success of such collaboration. The resources outlined here offer an example of how to support multi-stakeholder, multi-state projects.
20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.
Code of Federal Regulations, 2010 CFR
2010-04-01
... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...
20 CFR 404.1287 - Exceptions to the time limitations on assessments-for wages paid prior to 1987.
Code of Federal Regulations, 2011 CFR
2011-04-01
... determination; or (iv) The Social Security Administration has not issued to the State a final audit statement on... assessments-for wages paid prior to 1987. 404.1287 Section 404.1287 Employees' Benefits SOCIAL SECURITY... complete; or (iii) The Social Security Administration is developing a coverage or wage issue which was...
14 CFR 415.23 - Policy review.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...
14 CFR 415.23 - Policy review.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...
14 CFR 415.23 - Policy review.
Code of Federal Regulations, 2012 CFR
2012-01-01
... Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF... license application to determine whether it presents any issues affecting U.S. national security or... presents any issues affecting U.S. national security. (2) The FAA consults with the Department of State to...
ERIC Educational Resources Information Center
Education Law Association, Dayton, OH.
This booklet contains five chapters relating to issues in school safety and security, and fair dismissals: (1) "Ohio Legislation and Federal and State Decisions" (Richard J. Dickinson). Items of deliberation include financial matters, school safety issues, administrator and teacher contract matters, Title IX liability, school prayer, drug testing…
18 CFR 131.43 - Report of securities issued.
Code of Federal Regulations, 2010 CFR
2010-04-01
.... Securities and Exchange Commission registration fee 6. State mortgage registration tax 7. State commission fee 8. Fee for recording indenture 9. United States document tax 10. Printing and engraving expenses 11. Trustee's charges 12. Counsel fees 13. Accountant's fees 14. Cost of listing 15. Miscellaneous...
Defining Information Security.
Lundgren, Björn; Möller, Niklas
2017-11-15
This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.
Security improvement by using a modified coherent state for quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lu, Y.J.; Zhu, Luobei; Ou, Z.Y.
2005-03-01
Weak coherent states as a photon source for quantum cryptography have a limit in secure data rate and transmission distance because of the presence of multiphoton events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4-dB improvement in the secure data rate or a nearly twofold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible.
Contemporary United States Foreign Policy Towards Indonesia
2004-01-01
regard to resolving a number of longstanding territorial disputes, and it has become a cornerstone for the promotion of economic and social development...and stability and security in the region. However, Indonesia is also faced with a variety of social , economic, and internal security issues, most...faced with significant social , economic, and security issues. Thesis Question The thesis question is: Does contemporary US policy promote US national
2009-04-21
6 Intercity Passenger Rail Program (Amtrak) .....................................................................6... Intercity Bus Security Grant Program..............................................................................7 Trucking Security Program...continue security enhancements for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency
A Security Checklist for ERP Implementations
ERIC Educational Resources Information Center
Hughes, Joy R.; Beer, Robert
2007-01-01
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
DOT National Transportation Integrated Search
2003-09-09
Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...
2009-06-08
Security Grant Program ...............................................................................6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program...fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk
2009-08-05
Freight Rail Security Grant Program ...............................................................................6 Intercity Passenger Rail Program...Amtrak) .....................................................................6 Intercity Bus Security Grant Program...overview- fy2009.pdf. 19 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services
31 CFR 344.10 - What are Special Zero Interest securities?
Code of Federal Regulations, 2012 CFR
2012-07-01
... 31 Money and Finance:Treasury 2 2012-07-01 2012-07-01 false What are Special Zero Interest...-STATE AND LOCAL GOVERNMENT SERIES Special Zero Interest Securities § 344.10 What are Special Zero Interest securities? Special zero interest securities were issued as certificates of indebtedness and notes...
31 CFR 344.10 - What are Special Zero Interest securities?
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false What are Special Zero Interest...-STATE AND LOCAL GOVERNMENT SERIES Special Zero Interest Securities § 344.10 What are Special Zero Interest securities? Special zero interest securities were issued as certificates of indebtedness and notes...
Strategic Response to Energy-Related Security Threats in the US Department of Defense
2014-10-15
generation in the United States are fossil fuels . These include coal, natural gas, and oil . In some cases solar, wind, geothermal, and hydroelectric...and findings. The research addressed engagement on climate change and energy security issues by DoD across various tiers and sectors of the...on climate change and energy security issues by DoD across various tiers and sectors of the organization. Specifically, a tripartite analysis
Neuroscience, ethics, and national security: the state of the art.
Tennison, Michael N; Moreno, Jonathan D
2012-01-01
National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-26
..., corporate debt securities are fixed-income securities issued by businesses to finance their operations... consist of both foreign and domestic debt instruments, including corporate bonds, high yield bonds... stated above, the Fund may invest in a variety of debt securities, including corporate debt securities...
49 CFR 1572.13 - State responsibilities for issuance of hazardous materials endorsement.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Information System (CDLIS) operator of the results of the security threat assessment. (3) Revoke or deny the... TRANSPORTATION SECURITY CREDENTIALING AND SECURITY THREAT ASSESSMENTS Procedures and General Standards § 1572.13... security threat assessment in 49 CFR 1572.5 and issues an Initial Determination of Threat Assessment and...
17 CFR 229.1107 - (Item 1107) Issuing entities.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false (Item 1107) Issuing entities....1107 (Item 1107) Issuing entities. Provide the following information about the issuing entity: (a) State the issuing entity's name and describe the issuing entity's form of organization, including the...
17 CFR 229.1107 - (Item 1107) Issuing entities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false (Item 1107) Issuing entities....1107 (Item 1107) Issuing entities. Provide the following information about the issuing entity: (a) State the issuing entity's name and describe the issuing entity's form of organization, including the...
Russia and NATO Enlargement: The Assurances in 1990 and Their Implications
2009-06-01
to achieve “an agreement on the final legal settlement of the German question, which would serve our security interests and the cause of stability... intrinsically coupled to new security structures in Europe with no dominant player, particularly not the Soviet Union’s rival, the United States...main European security issues and would unconditionally acknowledge the CIS [Commonwealth of Independent States] as a sphere of vital interest to
2009-02-26
6 Intercity Passenger Rail Program (Amtrak...6 Intercity Bus Security Grant Program................................................................................. 7...for its intercity rail services between high-risk urban areas. 20 U.S. Department of Homeland Security, Federal Emergency Management Agency
State of Hispanic America: Working toward a More Secure Future. White Paper
ERIC Educational Resources Information Center
Vargas Poppe, Samanatha
2016-01-01
This document provides an analysis of key themes, as they relate to the U.S. Latino population, included in the President's 2016 State of the Union Address. Addressing these issues is critical to extend opportunity to more people to help ensure national prosperity and security for generations to come.
2008-04-01
with the treaty obligations of the United States and with the Constitution of the United States.” 98 For further discussion, see W. STULL HOLT, TREATIES...persons and property). 103 S.Res. 85, 91st Congress, 1st Sess. (1969). 104 Id. Secretary of State Dean Rusk and Thai Foreign Minister Thanat Khoman issued a
Neuroscience, Ethics, and National Security: The State of the Art
Tennison, Michael N.; Moreno, Jonathan D.
2012-01-01
National security organizations in the United States, including the armed services and the intelligence community, have developed a close relationship with the scientific establishment. The latest technology often fuels warfighting and counter-intelligence capacities, providing the tactical advantages thought necessary to maintain geopolitical dominance and national security. Neuroscience has emerged as a prominent focus within this milieu, annually receiving hundreds of millions of Department of Defense dollars. Its role in national security operations raises ethical issues that need to be addressed to ensure the pragmatic synthesis of ethical accountability and national security. PMID:22448146
31 CFR 356.5 - What types of securities does the Treasury auction?
Code of Federal Regulations, 2010 CFR
2010-07-01
... part to distinguish such securities from “inflation-protected” securities. We refer to fixed-principal... years. (2) Treasury inflation-protected notes. (i) Are issued with a stated rate of interest to be applied to the inflation-adjusted principal on each interest payment date; (ii) Have interest payable...
DOT National Transportation Integrated Search
2003-04-01
This testimony responds to the request of the National Commission on Terrorist Attacks Upon the United States for information on GAO's work in transportation security. It addresses (1) transportation security before September 2001; (2) what the feder...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2010 CFR
2010-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2012 CFR
2012-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2013 CFR
2013-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2014 CFR
2014-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
27 CFR 72.25 - Deposit of collateral.
Code of Federal Regulations, 2011 CFR
2011-04-01
... be pledged and deposited by claimants as collateral security in lieu of corporate sureties in... treasurers' checks may be furnished by claimants as collateral security in lieu of corporate sureties. (b..., Notes or Other Obligations Issued or Guaranteed by the United States as Security in Lieu of Surety or...
United States Strategic Plan for International Affairs.
1998-01-01
Humanitarian Response 39 Global Issues 41 US Strategic Plan for International Affairs International Affairs Strategic Plan Summary and Introduction...minimize the human costs of conflict and natural disasters. Global Issues : • Secure a sustainable global environment in order to protect the United States...involvement in addressing crises. 40 US Strategic Plan for International Affairs NATIONAL INTEREST: Global Issues The global environment has a
2009-12-01
6 Intercity Passenger Rail Program (Amtrak) .....................................................................7 Intercity Bus Security Grant...20 Additionally Amtrak is eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban...Research Service 7 Intercity Passenger Rail Program (Amtrak) The Intercity Passenger Rail Program (IPR) is designed to enhance security of the
2010-04-30
5 Intercity Bus Security Grant Program...eligibility.22 This grant program includes funding for the Freight Rail Security Grant Program (FRSGP), and the Intercity Passenger Rail Program (IPR...eligible to receive funding to continue security enhancements for its intercity rail services between high-risk urban areas. 21 U.S. Department of
Legal issues of the electronic dental record: security and confidentiality.
Szekely, D G; Milam, S; Khademi, J A
1996-01-01
Computer-based, electronic dental record keeping involves complex issues of patient privacy and the dental practitioner's ethical duty of confidentiality. Federal and state law is responding to the new legal issues presented by computer technology. Authenticating the electronic record in terms of ensuring its reliability and accuracy is essential in order to protect its admissibility as evidence in legal actions. Security systems must be carefully planned to limit access and provide for back-up and storage of dental records. Carefully planned security systems protect the patient from disclosure without the patient's consent and also protect the practitioner from the liability that would arise from such disclosure. Human errors account for the majority of data security problems. Personnel security is assured through pre-employment screening, employment contracts, policies, and staff education. Contracts for health information systems should include provisions for indemnification and ensure the confidentiality of the system by the vendor.
ERIC Educational Resources Information Center
Mendelsohn, Steven
This paper examines issues involved in identifying and securing sales tax exemptions to curtail the potential negative impact of state sales taxes on assistive technology. Chapter I discusses the nature of sales taxes, including their definition, their impact, their structure and administration, and the sources of exemptions. Chapter II considers…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-03-25
... identified by an interagency working group that is reviewing export control issues related to homeland security. The interagency working group is made up of representatives from the Departments of Commerce, Defense, Homeland Security and State. The purpose of the interagency working group is to ensure that...
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Issue. 308.1 Section 308.1 Money and... Issue. Federal Reserve Banks, as Fiscal Agents of the United States, and the Treasury Department may issue full-paid interim certificates in lieu of definitive securities, against full-paid allotments of...
Stonework or Sandcastle? Asia’s Regional Security Forum.
1995-07-01
security without equal security for all," and "with the growing interdependence of states, the differences in economic and social systems, ideologies... social integration, and historical background . . . [W]e cannot directly apply a European model to the different security environment of the Asia...contentious issue of human rights, a prominent theme in CSCE, along with pressures from Western countries on social , political and environmental
Clinton administration forging population-foreign policy links.
De Sherbinin, A
1994-12-01
In the US, the Clinton administration has renewed the link between global population and national security issues. These so-called "soft security issues" receive attention from the Under-Secretary of State for Global Affairs, Tim Wirth, and the senior director of the Global Environmental Affairs branch of the National Security Council, Eileen Claussen. Wirth and Claussen draft the US response to soft security issues such as environmental security, refugee and migration movements, political instability, and religious and ethnic conflict as well as the other nonmilitary threats of illegal drug trafficking, terrorism, and international organized crime. Population was first considered a foreign policy concern in the 1960s. By 1965, President Johnson decided that the US would provide family planning supplies and technical assistance to any country which asked for help. The initial justification for assuming a leading role in developing innovative population strategies for less developed countries was a humanitarian desire to forward economic development, the self-interest of maintaining access to resources, and concern that rapid growth produced more communists. Today the US remains concerned about resource access and economic development and is also wary of spill-over environmental effects, economic migration, diminished US trade opportunities, political asylum seekers and refugees, and increasing demand for US peacekeepers. It is also believed that rapid population growth leads to political destabilization. Critics of these views blame the development difficulties of less developed countries on poor governing decisions (inadequate institutions, trade barriers, or indifference). Women's reproductive rights advocates fear that using security as a rationale for population assistance could lead to restrictions on women's rights to choose the number and spacing of births. Despite such objections, the belief that population growth is an underlying problem in imploding states like Haiti, Rwanda, and Somalia has turned the attention of US policy-makers to these soft security issues.
Update: New Federal Financial Accounting for State and Local School Systems Due Out Soon.
ERIC Educational Resources Information Center
Sielke, Catherine C.
2002-01-01
Reports on several changes in the 2002 edition (forthcoming) of the federal government accounting handbook "Federal Financial Accounting for State and Local School Systems." Includes brief summary of "Emerging Issues" section of the handbook that addresses issues such as alternative revenues, charter schools, school safety and security,…
2011-09-15
bioethics literature on national security issues is surprisingly spares, the implications of neuroscience for national security are of increasing...in part by reviewing recent reports from the U.S. National Academies. Prof. Jonathan H. Marks, MA, BCL (OXON.), Associate Professor of Bioethics ...Humanities and Law at the Pennsylvania State University, and Director of the Bioethics and Medical Humanities Program on the main campus at University
Nonimmigrant Overstays: Brief Synthesis of the Issue
2010-01-15
finger biometric system for immigration identification17 to the major identity management and screening... finger scans and digital photographs) to check identity. Enhanced Border Security and Visa Entry Reform Act of 2002 The Enhanced Border Security ...further provides: “A determination by the Secretary of Homeland Security that an alien who applied for authorization to travel to the United States
ERIC Educational Resources Information Center
Jones, Robert J.; Zehner, Mark R.
1996-01-01
In late 1994, the United States Securities and Exchange Commission (SEC) issued new rules applicable to issuers of municipal securities (including school districts) concerning disclosure to the investment community. Describes how SEC's existing Rule 15c2-12 has been implemented. Discusses its purpose, jurisdiction, obligated persons, written…
Code of Federal Regulations, 2011 CFR
2011-01-01
... the United States, or money market mutual funds. Covered option transaction means any transaction... than brokers, dealers, and persons associated with a broker or dealer. Exempted securities mutual fund... mutual fund means any security issued by an investment company registered under section 8 of the...
2008-02-26
discussion, see W. STULL HOLT, TREATIES DEFEATED BY THE SENATE 212-229 (1933) (discussing events leading to the ratification of the 1907 treaty with the...U.S. Secretary of State Dean Rusk and Thai Foreign Minister Thanat Khoman issued a joint declaration in which Secretary Rusk expressed “the firm
Water Security - National and Global Issues
NASA Astrophysics Data System (ADS)
Tindall, J. A.; Campbell, A. A.; Moran, E. H.
2010-12-01
Water is fundamental to human life. Disruption of water supplies by the Water Threats and Hazards Triad (WTHT) — man-made, natural, and technological hazards — could threaten the delivery of vital human services, endanger public health and the environment, potentially cause mass casualties, and threaten population sustainability, social stability, and homeland security. Water distribution systems extend over vast areas and are therefore vulnerable to a wide spectrum of threats — from natural hazards such as large forest fires that result in runoff and debris flow that clog reservoirs, and reduce, disrupt, or contaminate water supply and quality to threats from natural, man-made, or political extremist attacks. Our research demonstrates how devising concepts and counter measures to protect water supplies will assist the public, policy makers, and planners at local, Tribal, State, and Federal levels to develop solutions for national and international water-security and sustainability issues. Water security is an issue in which the entire global community is stakeholders.
12 CFR 652.20 - Eligible non-program investments.
Code of Federal Regulations, 2014 CFR
2014-01-01
... dollars. Non-Program Investment Eligibility Criteria Table Asset class Final maturity limit NRSRO issue or... mortgage securities) fully insured or guaranteed by the United States Government or a Government agency. (2) Obligations of Government-sponsored agencies None NA None None. • Government-sponsored agency securities...
A Citizen's Guide to U.S. Foreign Policy: Election '88. Nonpartisan Briefs on 18 Key Issues.
ERIC Educational Resources Information Center
Hoepli, Nancy, Ed.; And Others
In order to make informed voting decisions citizens need background information on complex foreign policy issues facing the United States. This guide presents current issues and provides information to help citizens cast a thoughtful vote. The guide is divided into six main headings: Leadership; Security; Economic and Social Issues; Critical…
31 CFR 240.16 - Checks issued to minor payees.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 31 Money and Finance:Treasury 2 2011-07-01 2011-07-01 false Checks issued to minor payees. 240.16... ON THE UNITED STATES TREASURY Indorsement of Checks § 240.16 Checks issued to minor payees. (a) Checks in payment of principal and/or interest on U.S. securities that are issued to minors may be...
31 CFR 240.16 - Checks issued to minor payees.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Checks issued to minor payees. 240.16... ON THE UNITED STATES TREASURY Indorsement of Checks § 240.16 Checks issued to minor payees. (a) Checks in payment of principal and/or interest on U.S. securities that are issued to minors may be...
Curiac, Daniel-Ioan
2016-04-07
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues.
Privacy, confidentiality, and security in information systems of state health agencies.
O'Brien, D G; Yasnoff, W A
1999-05-01
To assess the employment and status of privacy, confidentiality, security and fair information practices in electronic information systems of U.S. state health agencies. A survey instrument was developed and administered to key contacts within the state health agencies of each of the 50 U.S. states, Puerto Rico and the District of Columbia. About a third of U.S. state health agencies have no written policies in place regarding privacy and confidentiality in electronic information systems. The doctrines of fair information practice often seemed to be ignored. One quarter of the agencies reported at least one security breach during the past two years, and 16% experienced a privacy and confidentiality related transgression. Most of the breaches were committed by personnel from within the agencies. These results raise questions about the integrity of existing privacy, confidentiality and security measures in the information systems of U.S. state health agencies. Recommendations include the development and vigorous enforcement of written privacy and confidentiality policies, increased personnel training, and expanded implementation of security measures such as encryption and system firewalls. A discussion of the current status of U.S. privacy, confidentiality and security issues is offered.
Coping With Chaos: Promoting Democracy & Regional Stability in the Post-Counterinsurgency Era
1993-04-30
effort should be located in the reconstituted Narcotics and Crime bureau directly under the new Undersecretary of State for Global Issues primarily...Rights at DoD and the Global Issues unit at the NSC. The existence of this interconnected bureaucratic architecture will help all three agencies...State where the yawning gap between security assistance and " global issues " needs to bridged. The policy planners need to wicker all of this into a new
42 CFR 435.407 - Types of acceptable documentary evidence of citizenship.
Code of Federal Regulations, 2014 CFR
2014-10-01
.... passport. The Department of State issues this. A U.S. passport does not have to be currently valid to be... issues for naturalization. (3) A Certificate of U.S. Citizenship (DHS Forms N-560 or N-561.) Department of Homeland Security issues certificates of citizenship to individuals who derive citizenship through...
42 CFR 436.407 - Types of acceptable documentary evidence of citizenship.
Code of Federal Regulations, 2014 CFR
2014-10-01
... Department of State issues this. A U.S. passport does not have to be currently valid to be accepted as... issues for naturalization. (3) A Certificate of U.S. Citizenship (DHS Forms N-560 or N-561.) Department of Homeland Security issues certificates of citizenship to individuals who derive citizenship through...
U.S. and Korea in Vietnam and the Japan-Korea Treaty: Search for Security, Prosperity and Influence
1991-05-01
never became the divisive social issue it became in the United States. There is even today an unspoken understanding that it helped the security and...effort made an immediate return untenable, but the U.S. was aware that it was a critical bilateral issue, because Japan had become important to the war...National Reconstruction (SCNR), and recommended that the emphasis of a new Korea policy should be on long-term economic, political, and social
United States Security Assistance 1977-1980: Human Rights Issues Affecting Arms Transfers.
1995-09-01
police attempted to break up the gathering, the crowd became enraged and proceeded to destroy a number of banks, cinemas , and hotels (Brown:296...According to Carter’s National Security Advisor, Zbigniew Brzezinski, the Peruvian government released over 300 prisoners in April 1977; "disappearances
Campus Security Authorities, a New Look
ERIC Educational Resources Information Center
McCauley, Terry
2012-01-01
Recent high-profile events created the need for institutions in the United States to heighten concerns about how those responsible for compliance with the Clery Act handle Campus Security Authority (CSA) issues. Not expressly but realistically those responsible for integrating this complicated set of laws within institutions have likely just been…
Curiac, Daniel-Ioan
2016-01-01
Being often deployed in remote or hostile environments, wireless sensor networks are vulnerable to various types of security attacks. A possible solution to reduce the security risks is to use directional antennas instead of omnidirectional ones or in conjunction with them. Due to their increased complexity, higher costs and larger sizes, directional antennas are not traditionally used in wireless sensor networks, but recent technology trends may support this method. This paper surveys existing state of the art approaches in the field, offering a broad perspective of the future use of directional antennas in mitigating security risks, together with new challenges and open research issues. PMID:27070601
Distance Learning: What's Holding Back This Boundless Delivery System?
ERIC Educational Resources Information Center
Bruder, Isabelle
1989-01-01
Discusses distance learning, identifies who distance learners may be, and examines issues involved in establishing distance learning systems. Topics discussed include teacher concerns, including job security and certification; curriculum concerns, including state and local requirements and cross-cultural issues; cooperative development,…
Secrecy vs. the need for ecological information: challenges to environmental activism in Russia.
Jandl, T
1998-01-01
This article identifies the lessons learned from the Nikitin case study in Russia. The Nikitin case involves the analysis of sources of radioactive contamination in several Russian counties and in the Russian Northern Fleet. Norway was interested in the issue due to proximity to the storage sites. The issue involved national security and environmental protection. It was learned that mixing national security issues with environmental issues offers dangerous and multiple challenges. Environmental groups must build relationships with a wide audience. International security policy must include the issues of globalization of trade and the spread of environmental problems into the global commons (oceans and atmosphere). The risk of an environmentally dangerous accident as a consequence of Cold War activities is greater than the risk of nuclear war. Secrecy in military affairs is not justified when there is inadequate storage of nuclear weapons and contaminated materials. In Russia, the concern is great due to their economic transition and shortages of funds for even the most basic needs, which excludes nuclear waste clean up. The Bellona Foundation studied the extent of nuclear pollution from military nuclear reactors in the Kola peninsula of northwest Russia, in 1994 and 1996. Russian security police arrested one of the report authors for alleged national security violations. A valuable lesson learned was that local Russian environmental groups needed international support. The military nuclear complex poses an enormous hazard. Limiting inspections is an unacceptable national security risk. The new Russian law on state secrets is too broad.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-15
... issues implicated by agency use of social media to support rulemaking. The Conference's consultant for... Committee on Adjudication will meet to consider a draft report and recommendations on social security... and recommendations based on legal and empirical analysis of the Social Security Administration's...
27 CFR 70.281 - Form of bond and security required.
Code of Federal Regulations, 2010 CFR
2010-04-01
..., express or telegraph money order; (v) Secured by corporate bonds or stocks, or by bonds issued by a State... of business or legal residence of the primary obligor is located; (ii) The surety must have property... which the principal place of business or legal residence of the primary obligor is located; (iv) The...
The safety and security of water supplies has come under reassessment in the past year. Issues ranging from public safety and health, ecological, and national security are under consideration. The terrorist attacks on the United States on September 11, 2001 and the subsequent del...
17 CFR 200.80f - Appendix F-Records control schedule.
Code of Federal Regulations, 2010 CFR
2010-04-01
... ORGANIZATION; CONDUCT AND ETHICS; AND INFORMATION AND REQUESTS Information and Requests § 200.80f Appendix F... in purchasing new issues of securities from underwriters 6 years. 821- Reports by registered small... state or federal laws in the purchase and sale of securities Until date of last reported action plus 10...
The Specter of Sunni Military Mobilization in Lebanon
2013-11-01
stabilization Future national security environment and forces European security issues, especially the Mediterranean littoral West Africa...5 More space for militant narratives .......................................................... 8 The Syrian war comes...their political dominance Sunni officials and elites attack the legitimacy of state institu- tions, particularly the Lebanese Army The Future
How Nation-States Craft National Security Strategy Documents
2012-10-01
state, civil society, and the individual. In the 21st century, the overall security concept is being looked at to en - compass a “country’s society as a...were very rigorous in their efforts to en - sure that the military operated within its fiscal means. Owing to the fact that the global financial crisis...institutions like think tanks or academic bodies that address issues such as human rights, democracy, and governance; civil society en - gagement; small arms
Privacy and security of patient data in the pathology laboratory.
Cucoranu, Ioan C; Parwani, Anil V; West, Andrew J; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B; Balis, Ulysses J; Tuthill, Mark J; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States.
Building Skills, Increasing Economic Vitality: A Handbook of Innovative State Policies
ERIC Educational Resources Information Center
Biswas, Radha Roy; Mills, Jack; Prince, Heath
2005-01-01
In their 2004 State of the State speeches, the nation's governors cited many issues competing for their attention and their states' resources, including health care, education, crime, and security (Nodine 2004). Among the most compelling challenges were those related to economic development and the ability of a state's workforce to meet the needs…
EU Failing FAO Challenge to Improve Global Food Security.
Smyth, Stuart J; Phillips, Peter W B; Kerr, William A
2016-07-01
The announcement that the European Union (EU) had reached an agreement allowing Member States (MS) to ban genetically modified (GM) crops confirms that the EU has chosen to ignore the food security challenge issued to the world by the Food and Agriculture Organization of the United Nations (FAO) in 2009. The FAO suggests that agricultural biotechnology has a central role in meeting the food security challenge. Copyright © 2016 Elsevier Ltd. All rights reserved.
Rep. Mica, John L. [R-FL-7
2009-09-30
House - 10/06/2009 Provisions of measure incorporated into H.R. 2200 as an amendment during House consideration on and adopted by a recorded vote of 219 yeas and 211 noes (Roll Call Vote No. 304).. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
European Security and NATO Enlargement: A View from Central Europe.
1998-04-01
8217iii 3. REPORT TYPE AND DATES COVERED Final fieport European Security and NATO Enlargement: A View from Central Europe (U) 6. AUTHOR(S) Stephen J...of views , including some not often heard, on the issues connected with NATO enlargement. 14. SUBJECT TERMS United States; NATO; post-Cold War...298-102 EUROPEAN SECURITY AND NATO ENLARGEMENT: A VIEW FROM CENTRAL EUROPE Edited by Stephen J. Blank April 1998 f"W DISTRIBUTION STATEMENT
Sen. Schumer, Charles E. [D-NY
2010-07-12
Senate - 07/15/2010 Committee on Homeland Security and Governmental Affairs referred to Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:
HIV/AIDS Securitization: Outcomes and Current Challenges.
Shadyab, Aladdin H; Hale, Braden R; Shaffer, Richard A
2017-01-01
The securitization (i.e., framing of a health issue as a security threat) of HIV/AIDS by the United Nations Security Council in 2000 changed the belief that HIV/AIDS is only a health issue. Although now accepted that HIV/AIDS represents a security threat, the consequences of securitization are still not widely established. The purpose of this paper was to present an evidence-based review of the outcomes and current challenges associated with HIV/AIDS securitization in the context of national security. We provided an overview of HIV/AIDS securitization, followed by a discussion of the impact of securitization on peacekeeping personnel and uniformed services. We also reviewed the United States Government's response to securitization and potential risks and benefits of securitization. Copyright© Bentham Science Publishers; For any queries, please email at epub@benthamscience.org.
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2014 CFR
2014-07-01
... redemption value exceeded, but was not an even multiple of $500, the owner had the option either: (1) To add... United States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds...) Computation of issue price. The total current redemption value of the eligible securities submitted for...
Protecting Commercial Space Systems: A Critical National Security Issue
1999-04-01
The Influence of Sea Power on World History: 1660-1783” (excerpt). Air Command and Staff College War Theory Coursebook (Academic Year 1999), 87- 88. 6...Publications. State of the Space Industry, 1998, 42, 49; and (2) US Census Bureau, Statistical Abstract of the United States: 1998, 1 Oct 1998, 578...College War Theory Coursebook (Academic Year 1999), 109. 2 Stubbs, Captain Bruce B., “The Coast Guard’s National Security Role in the 21st Century.” Air
ERIC Educational Resources Information Center
Relyea, Harold C.; Halchin, L. Elaine; Hogue, Henry B.; Agnew, Grace; Martin, Mairead; Schottlaender, Brian E. C.; Jackson, Mary E.
2003-01-01
Theses five reports address five special issues: the effects of the September 11 attacks on information management, including homeland security, Web site information removal, scientific and technical information, and privacy concerns; federal policy for electronic government information; digital rights management and libraries; library Web portal…
School Security Measures and Extracurricular Participation: An Exploratory Multi-Level Analysis
ERIC Educational Resources Information Center
Mowen, Thomas J.; Manierre, Matthew J.
2017-01-01
Although delinquency in US schools is near historic lows, concern over delinquency in US schools remains a pressing issue among school officials, parents, and policy-makers. Many scholars argue that the current approach to discipline in the United States is highly punitive. While some projects have assessed the effect of punitive security on…
The Challenges of Seeking Security While Respecting Privacy
NASA Astrophysics Data System (ADS)
Kantor, Paul B.; Lesk, Michael E.
Security is a concern for persons, organizations, and nations. For the individual members of organizations and nations, personal privacy is also a concern. The technologies for monitoring electronic communication are at the same time tools to protect security and threats to personal privacy. Participants in this workshop address the interrelation of personal privacy and national or societal security, from social, technical and legal perspectives. The participants represented industry, the academy and the United States Government. The issues addressed have become, if anything, even more pressing today than they were when the conference was held.
75 FR 16910 - Information Reporting Program Advisory Committee (IRPAC); Nominations
Federal Register 2010, 2011, 2012, 2013, 2014
2010-04-02
... leadership to provide recommendations on a wide range of information reporting administration issues..., insurance companies, state tax administration, colleges and universities, securities, payroll, foreign...
Water security - Nation state and international security implications
Tindall, James A.; Andrew A. Campbell,
2009-01-01
A terrorist attack such as poisoning and sabotage of the national water supply and water-quality infrastructure of the continental United States or any country, could disrupt the delivery of vital human services, threaten both public health and the environment, potentially cause mass casualties and pose grave public concern for homeland security. Most significantly, an attack on water resources would weaken social cohesion and trust in government. A threat to continuity of services is a potential threat to continuity of government since both are necessary for continuity of operations. Water infrastructure is difficult to protect, as it extends over vast areas across the U.S. and for which ownership is overwhelmingly nonfederal (approximately 85 percent). Since the 9111 attacks, federal dam operators and water and wastewater utilities have established counter measures. Similar measures have been taken in countries around the world. These include enhanced physical security, improved coordination between corporate ownership, Department of Homeland Security, and local law enforcement, and research into risk assessment and vulnerability analysis to ensure greater system safety. A key issue is the proportionate additional resources directed at public and private sector specific priorities. Agencies that have the scientific and technological ability to leverage resources, exploit integrated science approaches, focus on interdisciplinary practices, utilize informatics expertise and employ a wide use of evolving technologies should play a key role in water security and related issues.
Code of Federal Regulations, 2013 CFR
2013-01-01
... investments by member State banks. (a) From time to time the New York State Dormitory Authority offers issues... of the New York Dormitory Authority Act (N.Y. Public Authorities Law sections 1675-1690), the... the Dormitory Authority. (12 U.S.C. 24, 335) ...
Code of Federal Regulations, 2012 CFR
2012-01-01
... investments by member State banks. (a) From time to time the New York State Dormitory Authority offers issues... of the New York Dormitory Authority Act (N.Y. Public Authorities Law sections 1675-1690), the... the Dormitory Authority. (12 U.S.C. 24, 335) ...
Code of Federal Regulations, 2014 CFR
2014-01-01
... investments by member State banks. (a) From time to time the New York State Dormitory Authority offers issues... of the New York Dormitory Authority Act (N.Y. Public Authorities Law sections 1675-1690), the... the Dormitory Authority. (12 U.S.C. 24, 335) ...
Code of Federal Regulations, 2011 CFR
2011-01-01
... member State banks. (a) From time to time the New York State Dormitory Authority offers issues of bonds... of the New York Dormitory Authority Act (N.Y. Public Authorities Law sections 1675-1690), the... the Dormitory Authority. (12 U.S.C. 24, 335) ...
49 CFR 383.73 - State procedures.
Code of Federal Regulations, 2014 CFR
2014-10-01
... endorsement knowledge tests; (iv) Allow only a group-specific passenger (P) and school bus (S) endorsement and... issuing a CLP or a CDL to a person the State must verify the name, date of birth, and Social Security... the CLP, Non-domiciled CLP, CDL or Non-domiciled CDL. (n) Computer system controls. The State must...
ERIC Educational Resources Information Center
Arriola, Sonya; Murphy, Katy
2010-01-01
Undocumented students are a population defined by limitations. Their lack of legal residency and any supporting paperwork (e.g., Social Security number, government issued identification) renders them essentially invisible to the American and state governments. They cannot legally work. In many states, they cannot legally drive. After the age of…
Privacy and security of patient data in the pathology laboratory
Cucoranu, Ioan C.; Parwani, Anil V.; West, Andrew J.; Romero-Lauro, Gonzalo; Nauman, Kevin; Carter, Alexis B.; Balis, Ulysses J.; Tuthill, Mark J.; Pantanowitz, Liron
2013-01-01
Data protection and security are critical components of routine pathology practice because laboratories are legally required to securely store and transmit electronic patient data. With increasing connectivity of information systems, laboratory work-stations, and instruments themselves to the Internet, the demand to continuously protect and secure laboratory information can become a daunting task. This review addresses informatics security issues in the pathology laboratory related to passwords, biometric devices, data encryption, internet security, virtual private networks, firewalls, anti-viral software, and emergency security situations, as well as the potential impact that newer technologies such as mobile devices have on the privacy and security of electronic protected health information (ePHI). In the United States, the Health Insurance Portability and Accountability Act (HIPAA) govern the privacy and protection of medical information and health records. The HIPAA security standards final rule mandate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and security of ePHI. Importantly, security failures often lead to privacy breaches, invoking the HIPAA privacy rule as well. Therefore, this review also highlights key aspects of HIPAA and its impact on the pathology laboratory in the United States. PMID:23599904
Health and Human Services Issues. United States General Accounting Office Transition Series.
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC.
Discussing major policy, management, and program issues facing Congress and the Clinton administration in the area of health and human services, this pamphlet provides recommendations for the Department of Health and Human Services (HHS) regarding the social security system, the welfare system, preventing child abuse, and safeguarding the nation's…
Code of Federal Regulations, 2013 CFR
2013-04-01
... Commission's regulations; and (2) Public utilities pursuant to section 204 of the Federal Power Act (49 Stat... Power Act; (2) The term securities includes any note, stock, treasury stock, bond, or debenture or other... regulations under this part, with respect to such securities. (2) This part does not apply to the issue or...
Code of Federal Regulations, 2011 CFR
2011-04-01
... Commission's regulations; and (2) Public utilities pursuant to section 204 of the Federal Power Act (49 Stat... Power Act; (2) The term securities includes any note, stock, treasury stock, bond, or debenture or other... regulations under this part, with respect to such securities. (2) This part does not apply to the issue or...
Code of Federal Regulations, 2012 CFR
2012-04-01
... Commission's regulations; and (2) Public utilities pursuant to section 204 of the Federal Power Act (49 Stat... Power Act; (2) The term securities includes any note, stock, treasury stock, bond, or debenture or other... regulations under this part, with respect to such securities. (2) This part does not apply to the issue or...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Commission's regulations; and (2) Public utilities pursuant to section 204 of the Federal Power Act (49 Stat... Power Act; (2) The term securities includes any note, stock, treasury stock, bond, or debenture or other... regulations under this part, with respect to such securities. (2) This part does not apply to the issue or...
Code of Federal Regulations, 2014 CFR
2014-04-01
... Commission's regulations; and (2) Public utilities pursuant to section 204 of the Federal Power Act (49 Stat... Power Act; (2) The term securities includes any note, stock, treasury stock, bond, or debenture or other... regulations under this part, with respect to such securities. (2) This part does not apply to the issue or...
National Special Security Events
2009-03-24
issue Congress may wish to address. In FY2008, Congress appropriated $1 million for NSSE costs within the Secret Service.18 Some might argue that the...as the recent presidential inauguration. The amount appropriated could be additionally problematic considering that the Secret Service is not...authorized to reimburse state and local law enforcement entities’ overtime costs associated with NSSEs. Any security costs incurred by the Secret Service
Security Challenges in the Gulf of Guinea Sub-Region: Strategy for Nigeria
2008-06-01
Gas Fisheries Defense of Shipping Data Sea Power Functioning Ecosystem Nation-States Pollution & Misuse Criminal Activities Poaching ...region, these increased activities have created challenging security issues including increased piracy, poaching , terrorism, militant youth activities... impact its economic, social and political development. Also, the GoG’s vast sea area presents great challenges to the Nigerian nation and the
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-07
... compliant on or before May 11, 2011. Id. At the time DHS promulgated the REAL ID final rule, DHS recognized... time to ensure that the documents they issue meet the security requirements of the REAL ID Act. Without.... SUMMARY: Pursuant to the Department of Homeland Security's REAL ID regulations, States must be in full...
EMP Threats to US National Security: Congressional Responses
NASA Astrophysics Data System (ADS)
Huessy, Peter
2011-04-01
The US Congress is considering how best to respond to concerns that EMP is a real and present danger to US security. The threats come from a variety of areas: solar storms, non-nuclear EMP from man-made machines and devices; and nuclear EMP from a nuclear device exploded above CONUS or other critical areas important to the United States and its allies. Responses have to date included passage in the House of legislation to protect the electrical grid in the United States from such threats and hearings before the Homeland Security Committee. Additional efforts include examining missile defense responses, protection of the maritime domain, and hardening of US military and related civilian infrastructure. The House of Representatives has also examined what Europe, the European Union and NATO, both government and private industry, have done in these areas. Complicating matters are related issues of cyber-security and overall homeland security priorities.
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob P.; Sizemore, Brian
2017-01-01
NASA develops, runs, and maintains software systems for which security is of vital importance. Therefore, it is becoming an imperative to develop secure systems and extend the current software assurance capabilities to cover information assurance and cybersecurity concerns of NASA missions. The results presented in this report are based on the information provided in the issue tracking systems of one ground mission and one flight mission. The extracted data were used to create three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified the software bugs that are security related and classified them in specific security classes. This information was then used to create the security vulnerability profiles (i.e., to determine how, why, where, and when the security vulnerabilities were introduced) and explore the existence of common trends. The main findings of our work include:- Code related security issues dominated both the Ground and Flight mission IVV security issues, with 95 and 92, respectively. Therefore, enforcing secure coding practices and verification and validation focused on coding errors would be cost effective ways to improve mission's security. (Flight mission Developers issues dataset did not contain data in the Issue Category.)- In both the Ground and Flight mission IVV issues datasets, the majority of security issues (i.e., 91 and 85, respectively) were introduced in the Implementation phase. In most cases, the phase in which the issues were found was the same as the phase in which they were introduced. The most security related issues of the Flight mission Developers issues dataset were found during Code Implementation, Build Integration, and Build Verification; the data on the phase in which these issues were introduced were not available for this dataset.- The location of security related issues, as the location of software issues in general, followed the Pareto principle. Specifically, for all three datasets, from 86 to 88 the security related issues were located in two to four subsystems.- The severity levels of most security issues were moderate, in all three datasets.- Out of 21 primary security classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, these classes contributed from around 80 to 90 of all security issues in each dataset. This again proves the Pareto principle of uneven distribution of security issues, in this case across CWE classes, and supports the fact that addressing these dominant security classes provides the most cost efficient way to improve missions' security. The findings presented in this report uncovered the security vulnerability profiles and identified the common trends and dominant classes of security issues, which in turn can be used to select the most efficient secure design and coding best practices compiled by the part of the SARP project team associated with the NASA's Johnson Space Center. In addition, these findings provide valuable input to the NASA IVV initiative aimed at identification of the two 25 CWEs of ground and flight missions.
78 FR 50052 - Chief of Engineers Environmental Advisory Board; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... environmentally sustainable manner. Discussions and presentations during this meeting will include flow management...., drivers license, state- issued photo ID, or passport), and pass through the security screening station...
22 CFR 127.8 - Interim suspension.
Code of Federal Regulations, 2010 CFR
2010-04-01
... world peace or the security or foreign policy of the United States. The interim suspension orders... Trade Controls will issue an appropriate order disposing of the motion or petition and will promptly...
Code of Federal Regulations, 2011 CFR
2011-07-01
... revenues allocated to Gulf producing States? 219.415 Section 219.415 Mineral Resources BUREAU OF OCEAN... and royalty credits affect revenues allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or...
2009-06-02
with the Constitution of the United States.” 72 For further discussion, see W. Stull Holt, TREATIES DEFEATED BY THE SENATE 212-229 (1933) (discussing...and duration of U.S. presence within its territory. In 1962, for instance, U.S. Secretary of State Dean Rusk and Thai Foreign Minister Thanat Khoman
Changes in the Arctic: Background and Issues for Congress
2011-04-07
resources and to address socioeconomic impacts of changing patterns in the use of natural resources. Changes in the Arctic: Background and Issues for...also increasingly being viewed by some observers as a potential emerging security issue. In varying degrees, the Arctic coastal states have...by the term. Policy discussions of the Arctic can employ varying definitions of the region, and readers should bear in mind that the definition used
DefenseLink Feature: Travels with Gates
. Gates and U.S. Secretary of State Condoleezza Rice (right) discuss issues at the Kremlin in Moscow Freedom of Information Privacy & Security External Link Disclaimer Web Policy Contact Us
Dual mode vehicle and infrastructure alternatives analysis
DOT National Transportation Integrated Search
2008-04-01
The United States has a transportation challenge that requires addressing four issues simultaneously: traffic congestion, environmental pollution, safety, and energy security. A potential solution to these transportation challenges is the concept of ...
A National Security Issue: Challenges to the All-Volunteer Force
2012-02-25
Command, June 16, 2011. 25 U.S. Census Bureau, “Age and Sex in the United States: 2011,” http://www.census.gov/ population/www/socdemo/age...R. Thurman, Future Soldiers and the Quality Imperative (Fort Knox, KY: United States Army Recruiting Command, 1995), 53. 37 Lolita C. Baldor
ERIC Educational Resources Information Center
Delgadillo, Theresa
2011-01-01
The public discourse about immigration in the United States has long been fraught with xenophobia and racism. Since 9/11, moreover, the immigration issue has been firmly linked to questions of national security in the public imagination. In this recent period, the state has asserted extraordinary controls over immigrants and citizens that affect…
Information Systems, Security, and Privacy.
ERIC Educational Resources Information Center
Ware, Willis H.
1984-01-01
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
ERIC Educational Resources Information Center
Valeeva, Rania F.
2016-01-01
In this paper, I examine whether generalized trust and education, as well as social security policies of welfare state institutions matter for cross-national differences in subjective well-being (SWB), because knowledge on this issue is still lacking. For this purpose I integrated the insights of two sociological theories: Social Function…
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on Appropriations.
This document presents the transcript of a congressional hearing held before a Senate subcommittee concerning reporting requirements of the Student Right to Know and Campus Security Act of 1990. Among issues addressed is whether the definition of "campus" includes buildings used partially or completely for commercial purposes, sidewalks,…
Müthing, Jannis; Jäschke, Thomas
2017-01-01
Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. PMID:29046271
Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M
2017-10-18
Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks, leaving all other traffic vulnerable. ©Jannis Müthing, Thomas Jäschke, Christoph M Friedrich. Originally published in JMIR Mhealth and Uhealth (http://mhealth.jmir.org), 18.10.2017.
ERIC Educational Resources Information Center
McBain, Lesley
2008-01-01
The complex issues of promoting student mental health, privacy and public safety, and the balance among them, weigh on the minds of institutional leaders, educational policymakers, and local, state and federal officials. American campuses have a proud history of intellectual freedom, openness and public accessibility to their communities. However,…
International Engagement Strategy
2017-06-14
agreements and issue legal guidance on international law and intellectual property issues. ICPO will play an important role in realizing this vision and...through international cooperation under the auspices of its formal international agreements with partner states and the European Commission, as well...International Engagement Opportunities for Homeland Security Research 11 S&T maintains formal bilateral agreements that provide a framework for cooperative
19 CFR 177.7 - Situations in which no ruling will be issued.
Code of Federal Regulations, 2010 CFR
2010-04-01
....7 Section 177.7 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY... for a ruling which fails to comply with the provisions of this part. Moreover, no ruling letter will... litigation in the United States Court of International Trade. No ruling letter will be issued with respect to...
Code of Federal Regulations, 2011 CFR
2011-01-01
...; and (3) Advertisements and sales literature for individual retirement or similar accounts. Advertisements and sales literature issued by or on behalf of the bank do not describe the securities order... literature. Sales literature issued by or on behalf of the bank: (i) Does not state that the bank accepts...
Code of Federal Regulations, 2012 CFR
2012-01-01
...; and (3) Advertisements and sales literature for individual retirement or similar accounts. Advertisements and sales literature issued by or on behalf of the bank do not describe the securities order... literature. Sales literature issued by or on behalf of the bank: (i) Does not state that the bank accepts...
Code of Federal Regulations, 2013 CFR
2013-01-01
...; and (3) Advertisements and sales literature for individual retirement or similar accounts. Advertisements and sales literature issued by or on behalf of the bank do not describe the securities order... literature. Sales literature issued by or on behalf of the bank: (i) Does not state that the bank accepts...
12 CFR 390.254 - How may a subsidiary of a State savings association issue securities?
Code of Federal Regulations, 2012 CFR
2012-01-01
... days that the notice presents supervisory concerns or raises significant issues of law or policy, you... made available to the subsidiary; the percentage that such amount represents of the current book value of your assets on an unconsolidated basis; and the current book value of all such assets of the...
12 CFR 390.254 - How may a subsidiary of a State savings association issue securities?
Code of Federal Regulations, 2013 CFR
2013-01-01
... days that the notice presents supervisory concerns or raises significant issues of law or policy, you... made available to the subsidiary; the percentage that such amount represents of the current book value of your assets on an unconsolidated basis; and the current book value of all such assets of the...
12 CFR 390.254 - How may a subsidiary of a State savings association issue securities?
Code of Federal Regulations, 2014 CFR
2014-01-01
... days that the notice presents supervisory concerns or raises significant issues of law or policy, you... made available to the subsidiary; the percentage that such amount represents of the current book value of your assets on an unconsolidated basis; and the current book value of all such assets of the...
Securing Nuclear Materials: The 2010 Summit and Issues for Congress
2010-04-16
http://www.state.gov/secretary/rm/2009a/10/130806.htm. 7 Attendees include Algeria, Argentina , Armenia, Australia, Belgium, Brazil, Canada, Chile...29 The Lugar Doctrine states, “The United States will use all of its military, diplomatic and economic power—without...risks within four years; 25. Calls upon all States to manage responsibly and minimize to the greatest extent that is technically and economically
Security and health research databases: the stakeholders and questions to be addressed.
Stewart, Sara
2006-01-01
Health research database security issues abound. Issues include subject confidentiality, data ownership, data integrity and data accessibility. There are also various stakeholders in database security. Each of these stakeholders has a different set of concerns and responsibilities when dealing with security issues. There is an obvious need for training in security issues, so that these issues may be addressed and health research will move on without added obstacles based on misunderstanding security methods and technologies.
Global water risks and national security: Building resilience (Invited)
NASA Astrophysics Data System (ADS)
Pulwarty, R. S.
2013-12-01
The UN defines water security as the capacity of a population to safeguard sustainable access to adequate quantities of acceptable quality water for sustaining livelihoods, human well-being, and socio-economic development, for ensuring protection against water-borne pollution and water-related disasters, and for preserving ecosystems in a climate of peace and political stability. This definition highlights complex and interconnected challenges and underscores the centrality of water for environmental services and human aactivities. Global risks are expressed at the national level. The 2010 Quadrennial Defense Review and the 2010 National Security Strategy identify climate change as likely to trigger outcomes that will threaten U.S. security including how freshwater resources can become a security issue. Impacts will be felt on the National Security interest through water, food and energy security, and critical infrastructure. This recognition focuses the need to consider the rates of change in climate extremes, in the context of more traditional political, economic, and social indicators that inform security analyses. There is a long-standing academic debate over the extent to which resource constraints and environmental challenges lead to inter-state conflict. It is generally recognized that water resources as a security issue to date exists mainly at the substate level and has not led to physical conflict between nation states. In conflict and disaster zones, threats to water security increase through inequitable and difficult access to water supply and related services, which may aggravate existing social fragility, tensions, violence, and conflict. This paper will (1) Outline the dimensions of water security and its links to national security (2) Analyze water footprints and management risks for key basins in the US and around the world, (3) map the link between global water security and national concerns, drawing lessons from the drought of 2012 and elsewhere, and (3) Identify preventable risks, public leadership and private innovation needed for developing adaptive water resource management institutions that take advantage of climate and hydrologic information and changes. The presentation will conclude with a preliminary framework for assessing and implementing water security measures given insecure conditions introduced by a changing climate and in the context of national security.
Changes in the Arctic: Background and Issues for Congress
2010-10-15
resources and to address socioeconomic impacts of changing patterns in the use of natural resources. Changes in the Arctic: Background and Issues for...by some observers as a potential emerging security issue. In varying degrees, the Arctic coastal states have indicated a willingness to establish and...varying definitions of the region, and readers should bear in mind that the definition used in one discussion may differ from that used in another. This
The Media and National Security Decision-Making
2004-02-29
2002. Muller, Kerstin, “The CNN effect, media and global governance,” Speech by Minister of State Kerstin Muller to Open the Forum Global Issues on...time to analyze, develop and arrive at a decision is acutely abbreviated. Many factors influence this, and the increasing public awareness on global ... issues , thanks to the abundance of information, makes this a complex task. The attention and support Americans give to an issue is in direct
Parcher, Jean W.; Page, William R.
2013-01-01
Historically, international borders were located far from the major political and economic capitals of their countries and rarely received adequate planning or infrastructure development. Today, as a result of global economics and increased movement of goods between nations, border regions play a much greater role in commerce, tourism, and transportation. For example, Mexico is the second largest destination for United States exports (Woodrow Wilson Center Mexico Institute, 2009). The rapid population and economic growth along the United States–Mexican border, undocumented human border crossings, and the unique natural diversity of resources in the Borderlands present challenges for border security and environmental protection. Assessing risks and implementing sustainable growth policies to protect the environment and quality of life greatly increase in complexity when the issues cross an international border, where social services, environmental regulations, lifestyles, and cultural beliefs are unique for each country. Shared airsheds, water and biological resources, national security issues, and disaster management needs require an integrated binational approach to assess risks and develop binational management strategies.
Code of Federal Regulations, 2014 CFR
2014-07-01
... revenues allocated to Gulf producing States? 519.415 Section 519.415 Mineral Resources BUREAU OF OCEAN... affect revenues allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or royalties on leases in the...
Code of Federal Regulations, 2012 CFR
2012-07-01
... revenues allocated to Gulf producing States? 519.415 Section 519.415 Mineral Resources BUREAU OF OCEAN... affect revenues allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or royalties on leases in the...
Code of Federal Regulations, 2013 CFR
2013-07-01
... revenues allocated to Gulf producing States? 519.415 Section 519.415 Mineral Resources BUREAU OF OCEAN... affect revenues allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or royalties on leases in the...
Code of Federal Regulations, 2010 CFR
2010-07-01
... revenues allocated to Gulf producing States? 219.415 Section 219.415 Mineral Resources MINERALS MANAGEMENT... allocated to Gulf producing States? If bonus and royalty credits issued under Section 104(c) of the Gulf of Mexico Energy Security Act are used to pay bonuses or royalties on leases in the 181 Area located in the...
Quantum communication with coherent states of light
NASA Astrophysics Data System (ADS)
Khan, Imran; Elser, Dominique; Dirmeier, Thomas; Marquardt, Christoph; Leuchs, Gerd
2017-06-01
Quantum communication offers long-term security especially, but not only, relevant to government and industrial users. It is worth noting that, for the first time in the history of cryptographic encoding, we are currently in the situation that secure communication can be based on the fundamental laws of physics (information theoretical security) rather than on algorithmic security relying on the complexity of algorithms, which is periodically endangered as standard computer technology advances. On a fundamental level, the security of quantum key distribution (QKD) relies on the non-orthogonality of the quantum states used. So even coherent states are well suited for this task, the quantum states that largely describe the light generated by laser systems. Depending on whether one uses detectors resolving single or multiple photon states or detectors measuring the field quadratures, one speaks of, respectively, a discrete- or a continuous-variable description. Continuous-variable QKD with coherent states uses a technology that is very similar to the one employed in classical coherent communication systems, the backbone of today's Internet connections. Here, we review recent developments in this field in two connected regimes: (i) improving QKD equipment by implementing front-end telecom devices and (ii) research into satellite QKD for bridging long distances by building upon existing optical satellite links. This article is part of the themed issue 'Quantum technology for the 21st century'.
Quantum communication with coherent states of light.
Khan, Imran; Elser, Dominique; Dirmeier, Thomas; Marquardt, Christoph; Leuchs, Gerd
2017-08-06
Quantum communication offers long-term security especially, but not only, relevant to government and industrial users. It is worth noting that, for the first time in the history of cryptographic encoding, we are currently in the situation that secure communication can be based on the fundamental laws of physics (information theoretical security) rather than on algorithmic security relying on the complexity of algorithms, which is periodically endangered as standard computer technology advances. On a fundamental level, the security of quantum key distribution (QKD) relies on the non-orthogonality of the quantum states used. So even coherent states are well suited for this task, the quantum states that largely describe the light generated by laser systems. Depending on whether one uses detectors resolving single or multiple photon states or detectors measuring the field quadratures, one speaks of, respectively, a discrete- or a continuous-variable description. Continuous-variable QKD with coherent states uses a technology that is very similar to the one employed in classical coherent communication systems, the backbone of today's Internet connections. Here, we review recent developments in this field in two connected regimes: (i) improving QKD equipment by implementing front-end telecom devices and (ii) research into satellite QKD for bridging long distances by building upon existing optical satellite links.This article is part of the themed issue 'Quantum technology for the 21st century'. © 2017 The Author(s).
Bioterrorism Countermeasure Development: Issues in Patents and Homeland Security
2005-05-06
314.108(a) 62 See Upjohn Co. v. Kessler, 938 F. Supp. 439 (W.D. Mich. 1996). 63 See Valerie Junod , “Drug Marketing Exclusivity Under United States...Valerie Junod , Drug Marketing Exclusivity Under United States and European Union Law, 59 FOOD & DRUG L.J., 2004, 479. 99 S. 975 at § 331(e
Joint Force Quarterly. Issue 54, 3rd Quarter 2009
2009-07-01
executed, state capacity remains low, and the private sector suffers from a lack of security and weak national and provincial gover - nance. The rule of law... tourism industry reported that in 2008, 22.6 million foreign visitors, the majority from the United States, spent $13.3 billion, an increase of 3.4
Pandemic Influenza: An Analysis of State Preparedness and Response Plans
2007-09-24
RL32752, Continuity of Operations (COOP) in the Executive Branch: Issues in the 109th Congress, by R. Eric Petersen, and White House Homeland Security...23 Holmberg, S.D., Layton , C.M., Ghneim, G.S., and Wagener, D.K., “State Plans for Containment of Pandemic Influenza,” Emerging Infectious Diseases
HIV/AIDS: A Nontraditional Security Threat for AFRICOM
2008-05-22
Infectious Disease Threat, estimates, “Sub-Saharan Africa will remain the region most affected by the global infectious disease phenomenon--accounting for...nearly one-half of infectious disease-caused deaths worldwide.”24 Elbe notes that these estimates were provided by the U.S. Defense Intelligence...national security of those states because, “military organizations are anchors of for Economics and Global Issues, NIE 99-17D, “The Global Infectiou
Internet Governance and National Security
2012-01-01
the conflict created by headline- grabbing exploits of ad hoc hacker networks or nation-state-inspired cor porate espionage.5 Malicious actors add...governance of critical Internet re sources and their impact on US national security are often overlooked. Foreign efforts to alter the technical...crime, espio nage, and other forms of cyber conflict rather than on the issues related to governance of critical Internet resources, development of
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 6 Domestic Security 1 2012-01-01 2012-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE... the screening threshold quantity by security issue. (a) General. In calculating whether a facility...
Valuation of financial models with non-linear state spaces
NASA Astrophysics Data System (ADS)
Webber, Nick
2001-02-01
A common assumption in valuation models for derivative securities is that the underlying state variables take values in a linear state space. We discuss numerical implementation issues in an interest rate model with a simple non-linear state space, formulating and comparing Monte Carlo, finite difference and lattice numerical solution methods. We conclude that, at least in low dimensional spaces, non-linear interest rate models may be viable.
Code of Federal Regulations, 2013 CFR
2013-04-01
... account; and (3) Advertisements and sales literature for individual retirement or similar accounts. Advertisements and sales literature issued by or on behalf of the bank do not describe the securities order... literature. Sales literature issued by or on behalf of the bank: (i) Does not state that the bank accepts...
Code of Federal Regulations, 2011 CFR
2011-04-01
... account; and (3) Advertisements and sales literature for individual retirement or similar accounts. Advertisements and sales literature issued by or on behalf of the bank do not describe the securities order... literature. Sales literature issued by or on behalf of the bank: (i) Does not state that the bank accepts...
Code of Federal Regulations, 2012 CFR
2012-04-01
... account; and (3) Advertisements and sales literature for individual retirement or similar accounts. Advertisements and sales literature issued by or on behalf of the bank do not describe the securities order... literature. Sales literature issued by or on behalf of the bank: (i) Does not state that the bank accepts...
Code of Federal Regulations, 2014 CFR
2014-04-01
... account; and (3) Advertisements and sales literature for individual retirement or similar accounts. Advertisements and sales literature issued by or on behalf of the bank do not describe the securities order... literature. Sales literature issued by or on behalf of the bank: (i) Does not state that the bank accepts...
Code of Federal Regulations, 2010 CFR
2010-04-01
... account; and (3) Advertisements and sales literature for individual retirement or similar accounts. Advertisements and sales literature issued by or on behalf of the bank do not describe the securities order... literature. Sales literature issued by or on behalf of the bank: (i) Does not state that the bank accepts...
Digital telephony analysis model and issues
NASA Astrophysics Data System (ADS)
Keuthan, Lynn M.
1995-09-01
Experts in the fields of digital telephony and communications security have stated the need for an analytical tool for evaluating complex issues. Some important policy issues discussed by experts recently include implementing digital wire-taps, implementation of the 'Clipper Chip', required registration of encryption/decryption keys, and export control of cryptographic equipment. Associated with the implementation of these policies are direct costs resulting from implementation, indirect cost benefits from implementation, and indirect costs resulting from the risks of implementation or factors reducing cost benefits. Presented herein is a model for analyzing digital telephony policies and systems and their associated direct costs and indirect benefit and risk factors. In order to present the structure of the model, issues of national importance and business-related issues are discussed. The various factors impacting the implementation of the associated communications systems and communications security are summarized, and various implementation tradeoffs are compared based on economic benefits/impact. The importance of the issues addressed herein, as well as other digital telephony issues, has greatly increased with the enormous increases in communication system connectivity due to the advance of the National Information Infrastructure.
Collective multipartite Einstein-Podolsky-Rosen steering: more secure optical networks.
Wang, Meng; Gong, Qihuang; He, Qiongyi
2014-12-01
Collective multipartite Einstein-Podolsky-Rosen (EPR) steering is a type of quantum correlation shared among N parties, where the EPR paradox of one party can only be realized by performing local measurements on all the remaining N-1 parties. We formalize the collective tripartite steering in terms of local hidden state model and give the steering inequalities that act as signatures and suggest how to optimize collective tripartite steering in specific optical schemes. The special entangled states with property of collective multipartite steering may have potential applications in ultra-secure multiuser communication networks where the issue of trust is critical.
Söderbaum, P; Tropp, H
2004-01-01
Efforts to link and balance national water policies, local water action and national security issues are discussed. There needs to be greater clarity of water roles, rights and responsibilities among national stakeholders as well as between states. In some cases, insufficient attention has been paid to local concerns and, in balancing national and local actions, it is necessary to address decentralization in the context of a transboundary state. There is a strong need for enhanced stakeholder participation in the formulation and implementation of national and local water management plans.
DOT National Transportation Integrated Search
1996-09-01
While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...
Panel Analyzes Pakistan's Internal Water Concerns
NASA Astrophysics Data System (ADS)
Showstack, Randy
2013-06-01
Although transboundary water issues between Pakistan and neighboring countries may be exciting and interesting, Pakistan's real water and security nexus is at the local level, according to Daanish Mustafa, coauthor of a new report, "Understanding Pakistan's Water-Security Nexus." Mustafa, a reader in politics and environment at King's College, London, U.K., was a panelist at a 30 May forum in Washington, D. C., sponsored by the United States Institute of Peace, which published the report.
Biometric Identifiers and Border Security: 9/11 Commission Recommendations and Related Issues
2005-02-07
joints, and knuckles, has been used for about 30 years to control access to secure facilities such as nuclear power plants. Facial recognition analyzes...this end, however, DOS has also begun phasing in the use of facial recognition technologies with visa and passport photos, but these technologies are...party, have approved interoperable biometric standards, and the baseline biometric will be facial recognition . Member states will also have the option
Food Security (CSL Issue Paper, Volume 14-09, September 2009)
2009-09-01
Security Analyst in the Operations and Gaming Division of CSL. Cadet Jason Delousa is a senior at the United State Military Academy. This paper is...cotton, oil palm, beef, dairy, poultry and fisheries products as strategic commodities at the continental level.”32 Sustainability of these cash...Increased incomes, such as in Asia, generally lead to higher consumption of meat and hence, increased demand for cereal as livestock feed. (Source
2003-09-01
infrastructure, and providing consequence management and mitigation of man-made and natural disasters. The United States Army, Pacifi c (USARPAC), the Offi...Terrorism, Disaster Response and Consequence Management , and Medical Aspects of Environmental Security. The conference brought together military and...consequence management in maintaining governmental legitimacy, and examine salient military roles in preventing, responding to, and mitigating natural
2010-02-17
create a single set of cyberlaws and procedures internationally in order to insure that there is no safe harbor for cyber criminals .”55 PUTTING IT ALL...TOGETHER – OPERATIONAL EXAMPLES Cyber criminals would include state and non-state actors threatening our security. Assuming all of the previous
Federal Register 2010, 2011, 2012, 2013, 2014
2012-05-29
... International Law (ACPIL)--Online Dispute Resolution (ODR) Study Group The Office of Private International Law, Office of the Legal Adviser, Department of State hereby gives notice that the ACPIL Online Dispute... through May 25, 2012, and will specifically address security issues relating to use of the ODR rules...
Incentive Issues in Information Security Management
ERIC Educational Resources Information Center
Lee, Chul Ho
2012-01-01
This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…
Understanding food security issues in remote Western Australian Indigenous communities.
Pollard, Christina M; Nyaradi, Anett; Lester, Matthew; Sauer, Kay
2014-08-01
Food insecurity in remote Western Australian (WA) Indigenous communities. This study explored remote community store managers' views on issues related to improving food security in order to inform health policy. A census of all remote WA Indigenous community store managers was conducted in 2010. Telephone interviews sought managers' perceptions of community food insecurity, problems with their store, and potential policy options for improving the supply, accessibility, affordability and consumption of nutritious foods. Descriptive analyses were conducted using SPSS for Windows version 17.0. Managers stated that freight costs and irregular deliveries contributed to high prices and a limited range of foods. Poor store infrastructure, compromised cold chain logistics, and commonly occurring power outages affected food quality. Half of the managers said there was hunger in their community because people did not have enough money to buy food. The role of nutritionists beyond a clinical and educational role was not understood. Food security interventions in remote communities need to take into consideration issues such as freight costs, transport and low demand for nutritious foods. Store managers provide important local knowledge regarding the development and implementation of food security interventions. SO WHAT? Agencies acting to address the issue of food insecurity in remote WA Indigenous communities should heed the advice of community store managers that high food prices, poor quality and limited availability are mainly due to transport inefficiencies and freight costs. Improving healthy food affordability in communities where high unemployment and low household income abound is fundamental to improving food security, yet presents a significant challenge.
44 CFR 79.3 - Responsibilities.
Code of Federal Regulations, 2012 CFR
2012-10-01
... SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION GRANTS § 79.3...-related hazard mitigation programs and grants, including: (1) Issue program implementation procedures, as... governments regarding the mitigation and grants management process; (5) Review and approve State, Indian...
78 FR 41995 - Submission for OMB Review; Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-12
... of United States Savings Bonds/Notes Involved in a Chain Letter Scheme. Form: PD F 2966. Abstract... purchased in a chain letter scheme and used to identify the securities involved and to issue a refund of the...
A computer science approach to managing security in health care.
Asirelli, P; Braccini, G; Caramella, D; Coco, A; Fabbrini, F
2002-09-01
The security of electronic medical information is very important for health care organisations, which have to ensure confidentiality, integrity and availability of the information provided. This paper will briefly outline the legal measures adopted by the European Community, Italy and the United States to regulate the use and disclosure of medical records. It will then go on to highlight how information technology can help to address these issues with special reference to the management of organisation policies. To this end, we will present a modelling example for the security policy of a radiological department.
Cyber-Physical System Security of a Power Grid: State-of-the-Art
Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing
2016-07-14
Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less
Cyber-Physical System Security of a Power Grid: State-of-the-Art
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sun, Chih -Che; Liu, Chen -Ching; Xie, Jing
Here, as part of the smart grid development, more and more technologies are developed and deployed on the power grid to enhance the system reliability. A primary purpose of the smart grid is to significantly increase the capability of computer-based remote control and automation. As a result, the level of connectivity has become much higher, and cyber security also becomes a potential threat to the cyber-physical systems (CPSs). In this paper, a survey of the state-of-the-art is conducted on the cyber security of the power grid concerning issues of: the structure of CPSs in a smart grid; cyber vulnerability assessment;more » cyber protection systems; and testbeds of a CPS. At Washington State University (WSU), the Smart City Testbed (SCT) has been developed to provide a platform to test, analyze and validate defense mechanisms against potential cyber intrusions. A test case is provided in this paper to demonstrate how a testbed helps the study of cyber security and the anomaly detection system (ADS) for substations.« less
Is Seeing Believing? Training Users on Information Security: Evidence from Java Applets
ERIC Educational Resources Information Center
Ayyagari, Ramakrishna; Figueroa, Norilyz
2017-01-01
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
2005-03-31
What We Don’t Know . . . . . . . . . . . . . . 506 The United States Response: The Biodefense Shield . . . . . . . 508 Going Forward: Improving... Going Forward: A Different Model . . . . . . . . . . . . . . . . . . . . . . 524 Protecting our Borders: The Department of Homeland Security...headquarters are felt only lightly. We understand the limits of organizational change, and many of our recommendations go beyond organizational issues and
The United Kingdom: Issues for the United States
2007-07-16
of its EU partners than to the United States. For example, like other EU member states, Britain places great emphasis on multilateral... the prospects for the future of the U.S.-UK partnership, especially in the unfolding Brown era. It also describes UK views on political, security...delivery systems for its nuclear warheads since 1963. During the Cold War, the UK served as a vital base for U.S.
47 CFR 0.61 - Functions of the Bureau.
Code of Federal Regulations, 2010 CFR
2010-10-01
... those relating to rates, technical standards, customer service, ownership, competition to cable systems... federal-state/local regulatory relationships. This includes: acting, after Commission assumption of... security, emergency management, disaster management, and related issues. [67 FR 13217, Mar. 21, 2002, as...
47 CFR 0.61 - Functions of the Bureau.
Code of Federal Regulations, 2014 CFR
2014-10-01
... those relating to rates, technical standards, customer service, ownership, competition to cable systems... federal-state/local regulatory relationships. This includes: acting, after Commission assumption of... security, emergency management, disaster management, and related issues. [67 FR 13217, Mar. 21, 2002, as...
47 CFR 0.61 - Functions of the Bureau.
Code of Federal Regulations, 2013 CFR
2013-10-01
... those relating to rates, technical standards, customer service, ownership, competition to cable systems... federal-state/local regulatory relationships. This includes: acting, after Commission assumption of... security, emergency management, disaster management, and related issues. [67 FR 13217, Mar. 21, 2002, as...
47 CFR 0.61 - Functions of the Bureau.
Code of Federal Regulations, 2012 CFR
2012-10-01
... those relating to rates, technical standards, customer service, ownership, competition to cable systems... federal-state/local regulatory relationships. This includes: acting, after Commission assumption of... security, emergency management, disaster management, and related issues. [67 FR 13217, Mar. 21, 2002, as...
47 CFR 0.61 - Functions of the Bureau.
Code of Federal Regulations, 2011 CFR
2011-10-01
... those relating to rates, technical standards, customer service, ownership, competition to cable systems... federal-state/local regulatory relationships. This includes: acting, after Commission assumption of... security, emergency management, disaster management, and related issues. [67 FR 13217, Mar. 21, 2002, as...
NASA Astrophysics Data System (ADS)
Nair, Nirmal-Kumar
As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.
2006-03-01
Crime_Trends_2005.pdf (accessed August 3, 2005). Consejo de Seguridad Publica , “Programa de Mediano Plazo 2004 - 2009: Seguridad Publica ,” http...international Southwest border. The issue of illegal human smuggling is not new to the United States- Mexico border or to law enforcement agencies...Operation Gatekeeper; Operation Hold the Line; Operation Stonegarden; Tucson Sector; US Border Patrol; US- Mexico border. 16. PRICE CODE 17. SECURITY
2006-02-01
specifics of the Acheson-Lilienthal proposal was J. Robert Oppenheimer , wartime scientific director of Los Alamos , a key adviser to the Interim Committee...series of the United States Air Force Institute for National Security Studies (INSS). It presents a major history and analysis of over 70 years of...Soviets had a veto), not to the General Assembly . The joint communiqué issued by the Big Three foreign ministers in Moscow on December 27, 1945
Private Security Contractors in Iraq and Afghanistan: Legal Issues
2010-01-07
involving Blackwater Worldwide private security guards on contract with the State Department, who reportedly opened fire in the crowded traffic circle in the...Background and Analysis, by Moshe Schwartz. 2 See James Risen and Mark Mazzetti, Blackwater Guards Tied to Secret C.I.A. Raids, NY TIMES, December 10...0360 (RMU), slip op. (D.D.C, .Dec. 31, 2009). 6 See Iraq: U.S. Blackwater Case Dismissal “Unacceptable,” REUTERS, Jan. 1, 2010. 7 See Iraq to
2001-06-01
reiteration of the most dominant feature of the post-Cold War global order the emergence of ethnic and religious issues as major themes of state and...security. Considerations such as historical roots and legacy, ethnic identities, civilization linkages, colonial experiences, geographic location, and...extremely complex in nature. A common phenomenon during the Cold War was the tendency of the armed forces to intervene when ethnic differences arose. Thus
ERIC Educational Resources Information Center
Congress of the U.S., Washington, DC. Senate Committee on Finance.
This transcript is from the third in a series of hearings before the Senate Subcommittee on Social Security and Family Policy focusing on whether the present welfare system should be reformed or replaced. A series of public officials, child and family advocates, and other interested parties testified on the issue of enforcement of child support…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-25
... Document issued under 46 U.S.C., chapter 73, or a transportation security card issued under section 70105.... Merchant Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued... Mariner's Document issued under 46 U.S.C. chapter 73, or a transportation security card issued under...
Shimada, Stephanie L; Petrakis, Beth Ann; Rothendler, James A; Zirkle, Maryan; Zhao, Shibei; Feng, Hua; Fix, Gemmae M; Ozkaynak, Mustafa; Martin, Tracey; Johnson, Sharon A; Tulu, Bengisu; Gordon, Howard S; Simon, Steven R; Woods, Susan S
2017-09-01
We sought to understand how patients and primary care teams use secure messaging (SM) to communicate with one another by analyzing secure message threads from 2 Department of Veterans Affairs facilities. We coded 1000 threads of SM communication sampled from 40 primary care teams. Most threads (94.5%) were initiated by patients (90.4%) or caregivers (4.1%); only 5.5% were initiated by primary care team members proactively reaching out to patients. Medication renewals and refills (47.2%), scheduling requests (17.6%), medication issues (12.9%), and health issues (12.7%) were the most common patient-initiated requests, followed by referrals (7.0%), administrative issues (6.5%), test results (5.4%), test issues (5.2%), informing messages (4.9%), comments about the patient portal or SM (4.1%), appreciation (3.9%), self-reported data (2.8%), life issues (1.5%), and complaints (1.5%). Very few messages were clinically urgent (0.7%) or contained other potentially challenging content. Message threads were mostly short (2.7 messages), comprising an average of 1.35 discrete content types. A substantial proportion of issues (24.2%) did not show any evidence of being resolved through SM. Time to response and extent of resolution via SM varied by message content. Proactive SM use by teams varied, but was most often for test results (32.7%), medication-related issues (21.8%), medication renewals (16.4%), or scheduling issues (18.2%). The majority of messages were transactional and initiated by patients or caregivers. Not all content categories were fully addressed over SM. Further education and training for both patients and clinical teams could improve the quality and efficiency of SM communication. Published by Oxford University Press on behalf of the American Medical Informatics Association 2017. This work is written by US Government employees and is in the public domain in the United States.
30 CFR 256.52 - Bond requirements for an oil and gas or sulphur lease.
Code of Federal Regulations, 2011 CFR
2011-07-01
... Gulf of Mexico and the area offshore the Atlantic Coast. (2) The area offshore the Pacific Coast States... offshore the Atlantic Coast is included in the Gulf of Mexico. Areawide bonds issued in the Gulf of Mexico... to the United States under a bond or alternative form of security maintained under this section, the...
ERIC Educational Resources Information Center
McLain, Douglas, Jr.
Six presentations, an introduction, and a summary discussion are included in this publication, which focuses on the various complex factors involved in the negotiation of arms control agreements with the Soviet Union. Titles of the six presentations are: (1) Critical Issues in the United States-Soviet Relationship; (2) Basic Elements of Strategic…
Code of Federal Regulations, 2010 CFR
2010-10-01
... DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS REQUIREMENTS RELATING TO HEALTH INSURANCE COVERAGE Qualified State Long-Term Care Insurance Partnerships: Reporting Requirements... Social Security Act, (Act) which requires the issuer of a long-term care insurance policy issued under a...
Code of Federal Regulations, 2012 CFR
2012-10-01
... DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS REQUIREMENTS RELATING TO HEALTH INSURANCE COVERAGE Qualified State Long-Term Care Insurance Partnerships: Reporting Requirements... Social Security Act, (Act) which requires the issuer of a long-term care insurance policy issued under a...
Code of Federal Regulations, 2014 CFR
2014-10-01
... Department of Health and Human Services REQUIREMENTS RELATING TO HEALTH CARE ACCESS REQUIREMENTS RELATING TO HEALTH INSURANCE COVERAGE Qualified State Long-Term Care Insurance Partnerships: Reporting Requirements... Social Security Act, (Act) which requires the issuer of a long-term care insurance policy issued under a...
Code of Federal Regulations, 2013 CFR
2013-10-01
... DEPARTMENT OF HEALTH AND HUMAN SERVICES REQUIREMENTS RELATING TO HEALTH CARE ACCESS REQUIREMENTS RELATING TO HEALTH INSURANCE COVERAGE Qualified State Long-Term Care Insurance Partnerships: Reporting Requirements... Social Security Act, (Act) which requires the issuer of a long-term care insurance policy issued under a...
The Army Strategy for the Environment: Sustain the Mission, Secure the Future
2010-01-01
ecological degradation, economic decline, political upheaval, and disputes over precious and sometimes scarce natural resources are evolving into global ... issues that influence how the United States must respond and interact – through political, economic, and when necessary, military engagement
[Important issues of biological safety].
Onishchenko, G G
2007-01-01
The problem of biological security raises alarm due to the real growth of biological threats. Biological security includes a wide scope of problems, the solution of which becomes a part of national security as a necessary condition for the constant development of the country. A number of pathogens, such as human immunodeficiency virus, exotic Ebola and Lassa viruses causing hemorrhagic fever,rotaviruses causing acute intestinal diseases, etc. were first discovered in the last century. Terrorist actions committed in the USA in 2001 using the anthrax pathogen made the problem of biological danger even more important. In Russian Federation, biological threats are counteracted through the united state policy being a part of general state security policy. The biological Security legislation of Russian Federation is chiefly based on the 1992 Federal Law on Security. On the basis of cumulated experience, the President of Russia ratified Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond on 4 December, 2003. The document determines the main directions and stages of the state development in the area of chemical and biological security. The Federal target program Russian Federation's National Program for Chemical and Biological Security is being developed, and its development is to be completed soon in order to perfect the national system for biological security and fulfill Basics of Russian Federation's State Policy for Chemical and Biological Security for the Period through 2010 and Beyond, ratified by the President. The new global strategy for control over infectious diseases, presented in the materials of Saint Petersburg summit of the Group of Eight, as well as the substantive part of its elements in Sanitary International Standards, are to a large degree an acknowledgement of the Russian Federation's experience and the algorithm for fighting extremely dangerous infections. This Russia's experience has resulted in the following global achievements: smallpox elimination in the USSR (1936); the USSR's suggestions on the program of smallpox elimination in the world and 2 billion doses of the vaccine transferred to the possession of the WHO (since 1958); the global elimination of the disease (1980); effective control over avian influenza at the epizootic stage, recognized internationally at Beijing International Congress, 17-18 January, 2006.
17 CFR 240.3a12-10 - Exemption of certain securities issued by the Resolution Funding Corporation.
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities issued by the Resolution Funding Corporation. 240.3a12-10 Section 240.3a12-10 Commodity and... Exemptions § 240.3a12-10 Exemption of certain securities issued by the Resolution Funding Corporation. Securities that are issued by the Resolution Funding Corporation pursuant to section 21B(f) of the Federal...
Building Community Resilience to Disasters: A Way Forward to Enhance National Health Security.
Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S
2011-01-01
Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation.
Security Implications of Physical Design Attributes in the Emergency Department.
Pati, Debajyoti; Pati, Sipra; Harvey, Thomas E
2016-07-01
Security, a subset of safety, is equally important in the efficient delivery of patient care. The emergency department (ED) is susceptible to violence creating concerns for the safety and security of patients, staff, and visitors and for the safe and efficient delivery of care. Although there is an implicit and growing recognition of the role of the physical environment, interventions typically have been at the microlevel. The objective of this study was to identify physical design attributes that potentially influence safety and efficiency of ED operations. An exploratory, qualitative research design was adopted to examine the efficiency and safety correlates of ED physical design attributes. The study comprised a multimeasure approach involving multidisciplinary gaming, semistructured interviews, and touring interviews of frontline staff in four EDs at three hospital systems across three states. Five macro physical design attributes (issues that need to be addressed at the design stage and expensive to rectify once built) emerged from the data as factors substantially associated with security issues. They are design issues pertaining to (a) the entry zone, (b) traffic management, (c) patient room clustering, (d) centralization versus decentralization, and (e) provisions for special populations. Data from this study suggest that ED security concerns are generally associated with three sources: (a) gang-related violence, (b) dissatisfied patients, and (c) behavioral health patients. Study data show that physical design has an important role in addressing the above-mentioned concerns. Implications for ED design are outlined in the article. © The Author(s) 2016.
Wouters, P K
2004-01-01
The beneficial use of the world's transboundary waters raises difficult issues for drainage basin security on most parts of the globe. International law provides that each transboundary watercourse State is entitled to, and obliged to ensure, an "equitable and reasonable use" of these shared waters. The IWLRI developed and tested a Legal Assessment Model (LAM) through the work of interdisciplinary teams working in three different transboundary situations--China (upstream), Mozambique (downstream) and Palestine (shared groundwater). The LAM provides a tool for transboundary watercourse States to use in the preparation of their national water strategy for use at the national and international levels. The model should now be tested at the basin level, with a view to assisting to accomplish the peaceful and rational use of transboundary waters in line with the governing rule of international law and thereby to facilitate the overall policy objective of drainage basin security.
49 CFR 1554.103 - Security Directives.
Code of Federal Regulations, 2014 CFR
2014-10-01
... necessary to respond to a threat assessment or to a specific threat against civil aviation, TSA issues a..., DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT REPAIR STATION SECURITY Security Measures... each Security Directive TSA issues to the repair station within the time prescribed. Each repair...
Tolma, Eleni; John, Robert; Garner, Jane
2007-01-01
Food insecurity in the United States is a major public health issue. The main objective of this study was to evaluate the availability and quality of printed materials addressing food security targeted to special populations by the United States Department of Agriculture (USDA). Nutrition education resources addressing food security available from USDA websites were selected for analysis. Not applicable. The review team consisted of project staff (n = 6), two of who were fluent in Spanish. Selection criteria were established to identify the food-security materials, and a group of reviewers assessed the quality of each publication both quantitatively and qualitatively. A consensus meeting among the reviewers was held to make final determinations of the quality of the materials. The quantitative data analysis consisted of basic descriptive statistics. Among the 27 materials initially identified, 20 were either irrelevant or of low relevance to food security. Moreover, very few of them were intended for minority populations. The quality of most of the materials ranged from "average" to "good." Some of the major weaknesses include readability level, lack of cultural relevance, and inadequate coverage of food insecurity. Very few materials on food insecurity are of high quality. In the development of such materials, emphasis should be given to the readability level, content, and cultural relevance.
ERIC Educational Resources Information Center
Commission on Security and Cooperation in Europe, Washington, DC.
The Commission on Security and Cooperation in Europe (CSCE) monitors and encourages human rights compliance by signatories of the Helsinki Final Act of 1975. Language pertaining to migrant workers is found in all major CSCE documents, and the examination of migrant farmworker issues represents part of the Commission's ongoing review of U.S.…
2010-01-01
culture shock” that soldiers experienced as “the anxiety and physical and emotional discomfort that can occur when a person moves to an unfa- miliar...Afghanistan. Don‟t Believe it.” Newsweek, 14 December 2009, 48. Jalali, Ali A. “The Future of Security Institutions.” In Warfare Studies AY10 Coursebook ...62-69. Rubin, Barnett R. “The Transformation of the Afghan State.” In Warfare Studies AY10 Coursebook , edited by Sharon McBride, 351-356. Maxwell
The vulnerable do-gooders: security strategies of German aid agencies.
Schneiker, Andrea
2013-04-01
Humanitarian and development agencies have confronted growing insecurity in some of the regions in which they work over the course of the past decade. Consequently, aid agencies are changing their approach to security issues. Compared to aid agencies from other countries, especially the United Kingdom and the United States, German aid agencies have been relatively slow to adopt security measures. In addition, the security measures they have selected differ from one agency to another, even in comparable security contexts. The literature on organisational learning helps to explain these differences. The findings show that external and internal organisational factors influence an aid agency's choice of a particular security measure. The different responses of German aid agencies to the changing security environment demonstrate that security measures are not only influenced by an organisation's identity but also can be a way for them to demonstrate their identity and thereby distinguish themselves from other actors that deliver aid. © 2013 The Author(s). Journal compilation © Overseas Development Institute, 2013.
Ntasis, Efthymios; Maniatis, Theofanis A; Nikita, Konstantina S
2003-01-01
A secure framework is described for real-time tele-collaboration on Virtual Simulation procedure of Radiation Treatment Planning. An integrated approach is followed clustering the security issues faced by the system into organizational issues, security issues over the LAN and security issues over the LAN-to-LAN connection. The design and the implementation of the security services are performed according to the identified security requirements, along with the need for real time communication between the collaborating health care professionals. A detailed description of the implementation is given, presenting a solution, which can directly be tailored to other tele-collaboration services in the field of health care. The pilot study of the proposed security components proves the feasibility of the secure environment, and the consistency with the high performance demands of the application.
7 CFR 1469.6 - Enrollment criteria and selection process.
Code of Federal Regulations, 2014 CFR
2014-01-01
... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION SECURITY PROGRAM... ground water quality to degradation; (ii) Potential of soil to degradation; (iii) Potential of grazing land to degradation; (iv) State or national conservation and environmental issues e.g., location of air...
7 CFR 1469.6 - Enrollment criteria and selection process.
Code of Federal Regulations, 2012 CFR
2012-01-01
... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION SECURITY PROGRAM... ground water quality to degradation; (ii) Potential of soil to degradation; (iii) Potential of grazing land to degradation; (iv) State or national conservation and environmental issues e.g., location of air...
7 CFR 1469.6 - Enrollment criteria and selection process.
Code of Federal Regulations, 2013 CFR
2013-01-01
... CORPORATION, DEPARTMENT OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION SECURITY PROGRAM... ground water quality to degradation; (ii) Potential of soil to degradation; (iii) Potential of grazing land to degradation; (iv) State or national conservation and environmental issues e.g., location of air...
75 FR 5372 - Proposed Collection: Comment Request
Federal Register 2010, 2011, 2012, 2013, 2014
2010-02-02
... DEPARTMENT OF THE TREASURY Bureau of the Public Debt Proposed Collection: Comment Request ACTION... Bureau of the Public Debt within the Department of the Treasury is soliciting comments concerning the Subscription For Purchase and Issue of U.S. Treasury Securities, State and Local Government Series. DATES...
75 FR 60457 - Sunshine Act Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-30
... EXPORT-IMPORT BANK OF THE UNITED STATES Sunshine Act Meeting ACTION: Notice of a Partially Open... Avenue, NW., Washington, DC 20571. Open Agenda Item: PEFCO Secured Note Issues Resolutions. Public Participation: The meeting will be open to public participation for Item No. 1 only. Further Information: For...
Night Owl: Maryland's After-Hours Reference Service.
ERIC Educational Resources Information Center
Duke, Deborah C.
1994-01-01
Discusses "Night Owl," a Maryland public library's after hours telephone reference service. Issues include project start-up, user profiles, types of questions, volume, after hours reference accessibility, security, costs, service limits, publicity, staffing, and employee turnover. Similar services in other states are cited. (Contains six…
Code of Federal Regulations, 2010 CFR
2010-04-01
... statements relating to securities to be issued in certain business combination transactions. 230.488 Section... REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies § 230.488 Effective date of registration statements relating to securities to be issued in certain business combination...
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Minimum concentration by security issue. 27.204 Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by...
6 CFR 13.6 - Prerequisites for issuing a Complaint.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Prerequisites for issuing a Complaint. 13.6 Section 13.6 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.6 Prerequisites for issuing a Complaint. (a) The Reviewing Official may issue a...
Tort Suits Against Federal Contractors: An Overview of the Legal Issues
2011-04-07
which has subsets of its own, such as negligent misrepresentation and the doctrine of “informed consent” in medical malpractice . Broadly speaking...for failure to perform). There is also a possibility that the government could assert the state secrets privilege, thereby effectively preventing the...see CRS Report R41741, The State Secrets Privilege: Preventing the Disclosure of Sensitive National Security Information During Civil Litigation
Russian Political, Economic, and Security Issues and U.S. Interests
2008-07-28
energy company. Khodorkovski criticized some of Putin’s actions , financed anti-Putin political parties, and hinted that he might enter politics in...have hoped for a leading role in a unified state during Yeltsin’s decline. Lukashenko unconstitutionally removed the parliamentary opposition in 1996...Estonia’s actions . This was accompanied by extensive cyber attacks against Estonian government and commercial websites. The Russian state railway
1997-03-01
extraregional sponsor of Alianza para el Desarrollo Sostenible (Sustainable Development Alliance - ALIDES), along with United States and Canada. ALIDES is...more stable the government the better the country will be able to solve its environmental problems. 42 Glossary ALIDES Alianza para el Desarrollo ... Sostenible (Sustainable Development Alliance) C Centigrade CFCs Chlorofluorocarbons BECC Border Environment Cooperation Commission BNC Binational
Assessing Causality in a Complex Security Environment
2015-01-01
social sciences that could genuinely benefit those students. Causality is one of these critical issues. Causality has many definitions, but we might...protests (Ivan Bandura ) Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated...relatively simple theory of what leads to a stable deter- rent relationship between two states. Mearsheimer argued that when State A fields a
Changing Homeland Security: The Year in Review - 2008
2009-01-01
new opportunities for terrorist safe havens. The specter of homegrown terrorism has not abated. Naturalized citizens of Somali descent traveled to...34 • The Nature of Homeland Security: Now a Second Tier Policy Issue? • Organizing for Homeland Security: Possible Futures, Emerging Issues • The...emerging definitions of the homeland security mission space in 2009. The Nature of Homeland Security: Now a Second Tier Policy Issue? Has the bar
31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?
Code of Federal Regulations, 2010 CFR
2010-07-01
... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...
Regulation of X-Ray Security Scanners in Michigan.
Parry, Donald E
2016-02-01
In January of 2013 the Transportation Security Administration (TSA) ordered the removal of x-ray security scanners from airports by June of 2013. Since that time several of these scanners have been purchased at a reduced cost by various state and county governments for use in screening individuals entering or leaving their facilities. To address this issue the Radiation Safety Section of the State of Michigan drafted a set of registration conditions for facilities to follow when using these security scanners. Inspection procedures and measurement protocols were developed to estimate the dose to screened individuals. Inspections were performed on nine of the 16 registered backscatter scanners in the state and the one transmission scanner. The average estimated effective dose to screened individuals was ∼11 nSv for a two view scan from a backscatter system. The effective dose was 0.446 μSv, 0.330 μSv, and 0.150 μSv for a transmission system operated in the high, medium, and low dose modes, respectively. The limit suggested in the new registration condition is 0.25 μSv for a general use system and 10 μSv for a limited use system.
77 FR 72278 - Sale and Issue of Marketable Book-Entry Treasury Bills, Notes, and Bonds
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-05
... whether it would be more important to issue a new floating rate security each month. Maturities: We intend.... SUMMARY: The Department of the Treasury (``Treasury'') intends to issue a new type of marketable security... security. We also invite other comments relevant to the issuance of this new security. DATES: Submit...
Unemployment Insurance. Maintaining the Foundation of Economic Security.
ERIC Educational Resources Information Center
Perspective: Essays and Reviews of Issues in Employment Security and Employment and Training Programs, 1985
1985-01-01
This issue of an annual journal contains 18 essays on unemployment insurance (UI) and employment and training programs. Part 1, "Historical Perspective," contains the following papers: "Reflections on Wisconsin and Unemployment Insurance" (Wilbur J. Cohen); "Outstanding Ideas Form UI's Foundation" (Richard Wagner); "One State's Experience: 1939"…
17 CFR 250.52 - Exemption of issue and sale of certain securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... business of the subsidiary company; and (2) The interest rates and maturity dates of any debt security... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of issue and sale of certain securities. 250.52 Section 250.52 Commodity and Securities Exchanges SECURITIES AND EXCHANGE...
State-of-the-art in biosafety and biosecurity in European countries.
Bielecka, Anna; Mohammadi, Ali Akbar
2014-06-01
The terms biosafety and biosecurity are widely used in different concepts and refer not only to protection of human beings and their surrounding environment against hazardous biological agent, but also to global disarmament of weapons of mass destruction. As a result, the biosafety and biosecurity issues should be considered interdisciplinary based on multilateral agreements against proliferation of biological weapons, public health and environmental protection. This publication presents information on both, international and national biosafety and biosecurity legislation. Status of national implementation of the Biological and Toxin Weapons Convention, penalization issues and measures to account for and secure production, use, storage of particularly dangerous pathogens or activities involving humans, plants and animals where infection may pose a risk have been analyzed. Safety and security measures in laboratories have been studied. Moreover, dual-use technology and measures of secure transport of biohazard materials have been also taken into account. In addition, genetic engineering regulations, biosecurity activities in laboratories and code of conducts have been investigated, as well.
6 CFR 27.204 - Minimum concentration by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...
Manufacturing Accomplices: ICT Use in Securing the Safety State at Airports
NASA Astrophysics Data System (ADS)
Østerlie, Thomas; Asak, Ole Martin; Pettersen, Ole Georg; Tronhus, Håvard
Based on a study of ICT use at an airport security checkpoint, this paper explores a possible explanation to the paradox that travelers find existing airport security measures inadequate while at the same time believing air travel to be sufficiently secure. We pursue this explanation by showing that, for the security checkpoint to function properly in relation to the overall function of the airport, travelers have to be enrolled in a particular program of action. They are then locked into this program through sanctions. Travelers are forced into participating in a system many of them find ethically and morally objectionable. Yet, active participation makes it difficult for them to object to the moral and ethical issues of their actions without damning themselves. Our explanation of the security paradox is, therefore, that while travelers remain critical of airport security, they avoid damning themselves by criticizing the system in terms of its own logic. They have been made accomplices.
Web Server Security on Open Source Environments
NASA Astrophysics Data System (ADS)
Gkoutzelis, Dimitrios X.; Sardis, Manolis S.
Administering critical resources has never been more difficult that it is today. In a changing world of software innovation where major changes occur on a daily basis, it is crucial for the webmasters and server administrators to shield their data against an unknown arsenal of attacks in the hands of their attackers. Up until now this kind of defense was a privilege of the few, out-budgeted and low cost solutions let the defender vulnerable to the uprising of innovating attacking methods. Luckily, the digital revolution of the past decade left its mark, changing the way we face security forever: open source infrastructure today covers all the prerequisites for a secure web environment in a way we could never imagine fifteen years ago. Online security of large corporations, military and government bodies is more and more handled by open source application thus driving the technological trend of the 21st century in adopting open solutions to E-Commerce and privacy issues. This paper describes substantial security precautions in facing privacy and authentication issues in a totally open source web environment. Our goal is to state and face the most known problems in data handling and consequently propose the most appealing techniques to face these challenges through an open solution.
ERIC Educational Resources Information Center
Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas
2007-01-01
This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…
ERIC Educational Resources Information Center
Ross, Jane L.
This statement by the associate director of Income Security Issues of the Department of Health, Education and Human Services Division addresses the Congressional welfare reform goal of self-sufficiency for welfare mothers through employment. It analyzes the problems of the current welfare subsidy system by examining the effect of child care…
A guide to organizing joint ventures with physicians.
Peters, G R
1986-12-01
Catholic health care facilities must consider the business and legal risks, canon law, and other constraints when planning a joint venture with physicians. Participants should first establish goals and compatibility, then determine the venture's type (property, service), form ("true," lease, contract), and structure (corporation, partnership, joint property ownership, trust). The administrator must decide whether the facility will participate directly in the venture or form a separate organization. Participants must determine their relationships with the venture, choosing among many options. The administrator should consider whether a venture raises any canon law issues, especially regarding ecclesiastical and secular assets, approval by the local bishop or Holy See, and need for consultation. Other pertinent legal issues include: Fraud and abuse. The venture should not appear as compensation to induce referrals. Physician referrals. Many states prohibit or restrict referrals by physician participants. Antitrust law. Participants may be liable for actions constituting on antitrust violation. Securities low. Organizers must clarify Securities and Exchange Commission registration exemptions and observe state "blue sky" laws. Tax issues. Catholic health care facilities must consider such factors as tax-exempt status, unrelated business income, taxable subsidiaries, and public charity status. Other considerations include tax ramifications for physicians; tax shelter registration; certificate of need (CON), licensing, and building standards; effects on reimbursement and pension plans; organizational and bond documents; corporate medical practice and fee-splitting questions; and labor and contractual issues.
Iran’s Economic Conditions: U.S. Policy Issues
2010-04-22
trade and financial isolation. Iran’s economy is highly dependent on the production and export of crude oil to finance government spending, and...January 2010, the Iranian parliament approved a subsidy reform plan that would cut government subsidies on fuel and other goods and services...a central focus of U.S. national security policy. The United States has designated the Iranian government as a state sponsor of terrorism. The
Hunger, ethics and the right to food.
Mishra, Srijit
2012-01-01
The management of hunger has to look into the issues of availability, accessibility and adequacy of food supply. From an ethical perspective, this paper argues in favour of the right to food. But, for this to become viable, the state has to come up with an appropriate and effective bill on food and nutrition security, address the issue of inadequate provisioning of storage space by state agencies leading to rotting of food grains--a criminal waste when people are dying of hunger; and rely on local level institutions involving the community, that complement the administrative structure to identify the poor and reduce exclusion and inclusion errors.
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 6 Domestic Security 1 2014-01-01 2014-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 6 Domestic Security 1 2011-01-01 2011-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 6 Domestic Security 1 2013-01-01 2013-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
6 CFR 27.203 - Calculating the screening threshold quantity by security issue.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Calculating the screening threshold quantity by security issue. 27.203 Section 27.203 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating the screening threshold quantity by...
77 FR 13657 - American Capital, Ltd., et al.; Notice of Application
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-07
... lawyers, a certificate of service. Hearing requests should state the nature of the writer's interest, the... entrepreneurial risks of securities-related businesses and (b) to prevent potential conflicts of interest and... the AC Subs does not raise the issues regarding conflicts of interest and reciprocal practices that...
Issues for Engagement: Asian Perspectives on Transnational Security Challenges
2010-01-01
transshipped drugs include thailand, china, north Korea and canada for heroin; the united states and spain for ecstasy; Iran and south africa for marijuana and...shifted to synthetic drugs, and drug usage in malaysia followed suit. today, drug users in malaysia are overcrowding the prisons. Increases in the number
Legal Issues & Education Technology: A School Leader's Guide.
ERIC Educational Resources Information Center
National School Boards Association, Alexandria, VA. Council of School Attorneys.
Rapid development of new technologies has outpaced the development of related law, leaving educators in doubt about the management of copyright, privacy, liability, and security. A key provision of facilitating a healthy and safe environment for technology use is the school district's "Acceptable Use Policy" (AUP), which states that use…
Questioning the New Right's Diagnosis of Social Ills.
ERIC Educational Resources Information Center
Roberts, Clark G.
1981-01-01
States that the indifference of public policy to human rights issues is illustrated by severe budget cuts in essential program areas such as the National Institute for Mental Health, the Legal Services Corporation, school lunches, social security, and education for the handicapped. Considers strategies for minimizing destructive effects of current…
Security/Life Safety: A Need for Change.
ERIC Educational Resources Information Center
Ellsworth, Douglas
2003-01-01
In response to legislation, colleges and universities in several states must prepare to install sprinkler systems. Four basic issues an engineering study should examine include: whether the existing water service has the size, capacity, and pressure to support a sprinkler system; whether the protected facility will have to comply with more…
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2010 CFR
2010-07-01
... States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds. Series E.... The total current redemption value of the eligible securities submitted for exchange in any one transaction was required to be $500 or more. If the current redemption value was an even multiple of $500...
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2013 CFR
2013-07-01
... States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds. Series E.... The total current redemption value of the eligible securities submitted for exchange in any one transaction was required to be $500 or more. If the current redemption value was an even multiple of $500...
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2011 CFR
2011-07-01
... States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds. Series E.... The total current redemption value of the eligible securities submitted for exchange in any one transaction was required to be $500 or more. If the current redemption value was an even multiple of $500...
31 CFR 352.7 - Issues on exchange.
Code of Federal Regulations, 2012 CFR
2012-07-01
... States Savings Notes (Freedom Shares) at their current redemption values for Series HH bonds. Series E.... The total current redemption value of the eligible securities submitted for exchange in any one transaction was required to be $500 or more. If the current redemption value was an even multiple of $500...
Issues and Innovations in Foreign Language Education. Fastback 222.
ERIC Educational Resources Information Center
Benevento, Jacqueline
Studies indicate that American students have an inadequate understanding of world affairs, with implications for United States national security, business interests in foreign markets, and education in general, and specific recommendations have been made for the improvement of foreign language instruction. Foreign language education in the 1980s…
Armenia, Azerbaijan, and Georgia: Security Issues and Implications for U.S. Interests
2010-03-11
that the United States is one of several powers in the South Caucasus that, in parallel with the uncompromising stances of opposing ultra -nationalist...Azerbaijan International Oil Corporation (AIOC), formed to exploit the Azeri-Chirag- deepwater Gunashli (ACG) oil and gas fields. In 1995, Heydar Aliyev
The looming retirement crisis.
Walker, D M
1997-06-01
A retirement crisis looms in the United States due to a number of recent and emerging trends that affect government retirement programs, employer- and union-sponsored retirement benefits and personal savings arrangements. The crisis can be averted, but only with well-thought-out action on a number of issues, particularly Social Security and Medicare reform.
33 CFR 174.29 - Temporary certificate of number.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 33 Navigation and Navigable Waters 2 2012-07-01 2012-07-01 false Temporary certificate of number. 174.29 Section 174.29 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY....29 Temporary certificate of number. A State may issue a temporary certificate of number that is...
33 CFR 174.29 - Temporary certificate of number.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 33 Navigation and Navigable Waters 2 2014-07-01 2014-07-01 false Temporary certificate of number. 174.29 Section 174.29 Navigation and Navigable Waters COAST GUARD, DEPARTMENT OF HOMELAND SECURITY....29 Temporary certificate of number. A State may issue a temporary certificate of number that is...
Employing Youth in Farm Occupations. Special Paper No. 26.
ERIC Educational Resources Information Center
Bobbitt, J. Frank; Shapley, Allen E.
Federal and State of Michigan regulations related to employing youth in farm occupations are presented in the document. Issues such as minimum wage, minimum age, hazardous occupations regulations, and compulsory education requirements are covered as well as a legal definition of agriculture, social security and income tax regulations, and…
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2012 CFR
2012-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2013 CFR
2013-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2011 CFR
2011-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit Security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal Issuer means...
17 CFR 270.2a-7 - Money market funds.
Code of Federal Regulations, 2014 CFR
2014-04-01
... Security) issued by a Special Purpose Entity (as defined in this paragraph), substantially all of the...) Conduit security means a security issued by a Municipal Issuer (as defined in this paragraph) involving an..., which arrangement or agreement provides for or secures repayment of the security. Municipal issuer means...
17 CFR 450.4 - Custodial holdings of government securities.
Code of Federal Regulations, 2010 CFR
2010-04-01
... appropriate regulatory agency that expressly govern securities lending practices. (b)(1) Except as otherwise... security (or the amount of each issue of a government security issued in book-entry form) held for the.... (d) Counts of government securities held for customers in both definitive and book-entry form shall...
Information Security Management - Part Of The Integrated Management System
NASA Astrophysics Data System (ADS)
Manea, Constantin Adrian
2015-07-01
The international management standards allow their integrated approach, thereby combining aspects of particular importance to the activity of any organization, from the quality management systems or the environmental management of the information security systems or the business continuity management systems. Although there is no national or international regulation, nor a defined standard for the Integrated Management System, the need to implement an integrated system occurs within the organization, which feels the opportunity to integrate the management components into a cohesive system, in agreement with the purpose and mission publicly stated. The issues relating to information security in the organization, from the perspective of the management system, raise serious questions to any organization in the current context of electronic information, reason for which we consider not only appropriate but necessary to promote and implement an Integrated Management System Quality - Environment - Health and Operational Security - Information Security
An unusual kind of complex synchronizations and its applications in secure communications
NASA Astrophysics Data System (ADS)
Mahmoud, Emad E.
2017-11-01
In this paper, we talk about the meaning of complex anti-syncrhonization (CAS) of hyperchaotic nonlinear frameworks comprehensive complex variables and indeterminate parameters. This sort of synchronization can break down just for complex nonlinear frameworks. The CAS contains or fuses two sorts of synchronizations (complete synchronization and anti-synchronization). In the CAS the attractors of the master and slave frameworks are moving opposite or orthogonal to each other with a similar form; this phenomenon does not exist in the literature. Upon confirmation of the Lyapunov function and a versatile control strategy, a plan is made to play out the CAS of two indistinguishable hyperchaotic attractors of these frameworks. The adequacy of the obtained results is shown by a simulation case. Numerical issues are plotted to decide state variables, synchronization errors, modules errors, and phases errors of those hyperchaotic attractors after synchronization to determine that the CAS is accomplished. The above outcomes will present the possible establishment to the secure communication applications. The CAS of hyperchaotic complex frameworks in which a state variable of the master framework synchronizes with an alternate state variable of the slave framework is an encouraging kind of synchronization as it contributes fantastic security in secure communications. Amid this secure communications, the synchronization between transmitter and collector is shut and message signs are recouped. The encryption and reclamation of the signs are reproduced numerically.
Optical benchmarking of security document readers for automated border control
NASA Astrophysics Data System (ADS)
Valentín, Kristián.; Wild, Peter; Å tolc, Svorad; Daubner, Franz; Clabian, Markus
2016-10-01
Authentication and optical verification of travel documents upon crossing borders is of utmost importance for national security. Understanding the workflow and different approaches to ICAO 9303 travel document scanning in passport readers, as well as highlighting normalization issues and designing new methods to achieve better harmonization across inspection devices are key steps for the development of more effective and efficient next- generation passport inspection. This paper presents a survey of state-of-the-art document inspection systems, showcasing results of a document reader challenge investigating 9 devices with regards to optical characteristics.
Code of Federal Regulations, 2010 CFR
2010-04-01
... securities issued by persons engaged in securities related businesses. 270.12d3-1 Section 270.12d3-1... in securities related businesses. (a) Notwithstanding section 12(d)(3) of the Act, a registered... securities related business, the determination required by paragraph (b) of this section shall be made as...
Security issues in healthcare applications using wireless medical sensor networks: a survey.
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
Kumar, Pardeep; Lee, Hoon-Jae
2012-01-01
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs. PMID:22368458
The Ninth National Space Symposium
NASA Astrophysics Data System (ADS)
Lipskin, Beth Ann; Patterson, Sara; Brescia, David A.; Burk, Donna; Flannery, Jack; St. John, Pat; Zimkas, Chuck
Proceedings of the Ninth National Space Symposium held 13-16 April 1993 by the United States Space Foundation are presented. Presentations made at the symposium are included. Topics discussed include: Change, Challenge and Opportunity; Washington Insiders: National Space Policy and Budget Issues; Civil Space: a Vision for the Future; Space Power for an Expanded Vision; Unparalled Launch Vehicle Propulsion Capabilities; National Security Space Issues; Perspectives on the Air Force in Space; Future Technology: Space Propulsion, Earth Observation and International Cooperation; Achieving Efficient Space Transportation; the Future in Space Exploration; Kids, Parents and Teachers are into Space; and Public Congressional Forum on Space - International Space Issues.
Tejero, Antonio; de la Torre, Isabel
2012-10-01
E-Health systems are experiencing an impulse in these last years, when many medical agencies began to include digital solutions into their platforms. Electronic Health Records (EHRs) are one of the most important improvements, being in its most part a patient-oriented tool. To achieve a completely operational EHR platform, security and privacy problems have to be resolved, due to the importance of the data included within these records. But given all the different methods to address security and privacy, they still remain in most cases as an open issue. This paper studies existing and proposed solutions included in different scenarios, in order to offer an overview of the current state in EHR systems. Bibliographic material has been obtained mainly from MEDLINE and SCOPUS sources, and over 30 publications have been analyzed. Many EHR platforms are being developed, but most of them present weaknesses when they are opened to the public. These architectures gain significance when they cover all the requisites related to security and privacy.
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-04-05
Strategy: Authorities, Changes, Issues for Congress Congressional Research Service 3 reverse the spread of nuclear and biological weapons and...secure nuclear materials; advance peace, security, and opportunity in the greater Middle East; invest in the capacity of strong and capable...and norms on issues ranging from maritime security to trade and human rights.” 6 On Russia, the document says, “... we will continue to impose
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-03-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-06-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
2008-01-01
TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit...on this issue was ambigu- ous through mid-2007 and that additional guidance to reservists and to state UI offices and employees might be useful.4...2006b). The guidance contained in UIPL No. 27-06, issued in August 2006, is correct. DoL is revising the UCX Handbook to conform to the guidance
Formulation of US international energy policies
NASA Astrophysics Data System (ADS)
1980-09-01
To find out how the United States develops international energy policy, GAO reviewed five major energy issues covering the period from early 1977 through 1979. The issues are: vulnerabilities to petroleum supply interruptions; long term national security strategy on imported oil prices; export of U.S. oil and gas production equipment and technology to the Soviety Union; World Bank initiatives to assist in financing oil and gas exploration and development in oil-importing developing countries; and the role of gas imports relative to the nation's future sources of gas.
Cyber security issues in online games
NASA Astrophysics Data System (ADS)
Zhao, Chen
2018-04-01
With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.
Chung, Ryoa
2017-03-01
In this article, I want to show that the securitization of health issues in the name of national interests led to the militarization of health care in the context of the war against terrorism. However, the connection between health and security also gave way to the emergence of the notion of human security, thus, converging with the human right to health approach and the cosmopolitan discourse on global health. These two perspectives on the relation between health and security lead to conflicting imperatives in the current state of counter-terrorism operations. I argue that when the securitization of health concerns in the name of national security conflicts with the provision of health care in the name of universal human rights, the higher moral end must trump the prudential one. Moreover, it is a duty to promote the human right to health when liberal democracies in foreign policies directly violate this moral ideal in the name of national security.
Central Asia’s Security: Issues and Implications for U.S. Interests
2009-02-25
Asian countries also seek assistance through regional and international organizations, including the World Bank, International Monetary Fund ( IMF ...market in Bishkek in December 2002, one at a currency exchange outlet in Osh in southern Kyrgyzstan in May 2003, and one in Bishkek that targeted...serious threat to democratization and economic growth in all the states. The increasing amount of foreign currency entering the states as the result of
Code of Federal Regulations, 2014 CFR
2014-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2011 CFR
2011-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2013 CFR
2013-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2012 CFR
2012-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2010 CFR
2010-04-01
... the issuer of such security issues any class of security, or takes other corporate action, with the... issues any class of security, or takes other corporate action, with the effect of nullifying, restricting... by section 19(b) of the Act, specifying what types of securities issuances and other corporate...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-16
... purchase fixed income securities issued by U.S. or foreign corporations \\6\\ or financial institutions... also may purchase securities issued or guaranteed by the U.S. Government or foreign governments... (``CMOs'').\\8\\ The Fund may purchase or sell securities on a when issued, delayed delivery or forward...
75 FR 34989 - Board of Visitors, United States Military Academy (USMA)
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-21
... issues. DATES: Thursday, July 8, 2010, at 9 a.m.-11 a.m. ADDRESSES: Building 600 (Taylor Hall... security screening. 4. Location: Building 600 (Taylor Hall), Superintendent's Conference Room. 5. Purpose... (MASG), 646 Swift Road, West Point, NY 10996-1905 or faxed to the Designated Federal Officer (DFO) at...
Bioterrorism Countermeasure Development: Issues in Patents and Homeland Security
2006-11-27
314.108(a) 62 See Upjohn Co. v. Kessler, 938 F. Supp. 439 (W.D. Mich. 1996). 63 See Valerie Junod , “Drug Marketing Exclusivity Under United...the competitor’s application. See Valerie Junod , Drug Marketing Exclusivity Under United States and European Union Law, 59 FOOD & DRUG L.J., 2004, 479
Grief Counseling Groups in a Medium-Security Prison
ERIC Educational Resources Information Center
Olson, Margaret J.; McEwen, Margaret A.
2004-01-01
The authors discuss their facilitation of four grief counseling groups with male inmates in a state prison over a two-year period. Worden's Tasks of Mourning were used as a guide for the group process. Disenfranchised grief and gender and cultural issues in grieving are explored. Catalytic exercises are described, and written feedback from inmates…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-28
... filed with the Commission an interpretation on customer protection obligations relating to the marketing... MSRB has worked with CSPN and individual states on, among other issues, disclosure principles and best practices, in order to better inform and protect investors.\\9\\ The disclosure principles cover a variety of...
Naval War College Review. Volume 63, Number 2, Spring 2010
2010-01-01
coast of Somalia is a result of the absence of gover - nance on land projected out to sea, the unremedied collapse of the Somali state will be an...vis its own internal security issues. With lucrative foreign investments, a tourism industry shaken by electoral violence two years ago, and almost
76 FR 48101 - Petition for Approval of Alternate; Odometer Disclosure Requirements
Federal Register 2010, 2011, 2012, 2013, 2014
2011-08-08
... power of attorney. In addition, Florida's proposed program would use different mechanisms to document... licensing of vehicles, for use in any State, unless the title issued to the transferee is printed using a... permit the use of a secure power of attorney for purposes of odometer mileage disclosure in circumstances...
Collective Approach to Complex Food System Issues, the Case of the Ohio State University
ERIC Educational Resources Information Center
Fox, Julie
2017-01-01
Urban universities are uniquely positioned to make powerful and lasting contributions to the grand challenge of food security. To better understand the various dimensions related to the university's role in food systems, this case study explores intentional linkages, significant developments, natural tensions, and emerging impacts at the Ohio…
ERIC Educational Resources Information Center
New Mexico Public Education Department, 2006
2006-01-01
Safety in New Mexico's schools is one of the most important issues facing our communities. Every school and school district in the state make it a priority to identify and implement ways to increase the safety, security and integrity of students, teachers, staff, parents and visitors at our schools on a daily basis. Safety is critical for…
26 CFR 31.3402(q)-1 - Extension of withholding to certain gambling winnings.
Code of Federal Regulations, 2010 CFR
2010-04-01
... the time at which the deposit and inclusion on Form 941 of these taxes is to be made, the withholding... name, address, and employer identification number of the payer; (ii) The name, address, and social... issuing State, social security account number of voter registration number and jurisdiction, furnished the...
Council of Ontario Universities Working Paper Series, 2001-2002.
ERIC Educational Resources Information Center
Forcese, Dennis; Oosthuizen, Patrick; Aubrey, Jocelyn B.
2002-01-01
Papers in this volume are the first working papers produced by the Council of Ontario Universities. Issue 1, "The Role and State of Ontario Graduate Education" by Dennis Forcese, advocates the reinforcement of graduate education in Ontario institutions to maintain the overall quality of the institutions and to secure the future. The paper outlines…
Securing Our Dance Heritage: Issues in the Documentation and Preservation of Dance.
ERIC Educational Resources Information Center
Johnson, Catherine J.; Snyder, Allegra Fuller
The great research collections of the United States have resulted, in part, from a long and productive collaboration among scholars, librarians, and archivists. This booklet focuses on the documentation of, access to, and preservation of dance heritage. It discusses the cultural and intellectual value of dance and articulates what elements of…
"Balancing Open Doors and National Security"
ERIC Educational Resources Information Center
Branch-Brioso, Karen
2009-01-01
While the number of exchange visas for international students and professors is up overall, the post-Sept. 11 decline continues for many majority-Muslim countries. Last November, the U.S. Department of State heralded a record high number of visas issued to international students and exchange visitors. A report by the Institute of International…
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-26
... International Law (ACPIL)--Online Dispute Resolution (ODR) Study Group The Office of the Assistant Legal Adviser... guidelines and minimum requirements for online dispute resolution providers and arbitrators, substantive... that the working group is addressing is the identification of security issues relating to use of the...
Renewable Energy Education in India
ERIC Educational Resources Information Center
Bajpai, Shrish; Kidwai, Naimur Rahman
2017-01-01
The issue of renewable energy sources that have great potential to give solutions to the longstanding energy problems of India has been considered. It has been stated that renewable energy sources are an important part of India's plan to increase energy security and provide new generation with ample job opportunities. India's plans to move towards…
33 CFR 401.26 - Security for tolls.
Code of Federal Regulations, 2010 CFR
2010-07-01
... as issued by the Treasury Board of Canada; and (ii) Meet financial soundness requirements as may be... with the Manager of negotiable bonds of the Government of the United States or the Government of Canada; or (4) A letter of guarantee to the Manager given by an institution referred to in paragraph (a)(2...
Practical issues in quantum-key-distribution postprocessing
NASA Astrophysics Data System (ADS)
Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.
2010-01-01
Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.
Strategic planning for national security: Lessons from business experience. Interim report
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bracken, P.
1990-02-01
United States defense planning is at a crossroads and it is therefore useful to review not only discrete issues, but even basic concepts of strategic planning. This Note reviews concepts used in the business world to build insights about how to view current and prospective problems, opportunities, and choices. The author draws upon the business literature for both ideas and metaphors. He observes that U.S. national security planning could profit greatly from an approach that distinguishes among core, environmental, and hedging strategies, and that considers security analogs to such business concepts as defining the business, dealing with new competitors, controllingmore » the intensity of competition, entry and exit barriers, and the need to redeploy assets and restructure the organization. He then relates these concepts to specific problems of national security interest.« less
Science and Technology Resources on the Internet: Computer Security.
ERIC Educational Resources Information Center
Kinkus, Jane F.
2002-01-01
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
School Violence: Physical Security.
ERIC Educational Resources Information Center
Utah State Office of Education, Salt Lake City.
This booklet provides an overview of security technology product areas that might be appropriate and affordable for school applications. Topics cover security concepts and operational issues; security issues when designing for new schools; the role of maintenance; video camera use; walk-through metal detectors; duress alarm devices; and a partial…
State of the Art in Trust and Reputation Models in P2P networks
NASA Astrophysics Data System (ADS)
Mármol, Félix Gómez; Pérez, Gregorio Martínez
Ensuring security in a distributed environment such as P2P networks is a critical issue nowadays. Nevertheless, it is in those kind of scenarios in which entities can enter or leave the community whenever they want, where traditional mboxsecurity schemes can not always be applied. Specifically, the use of a PKI (Public Key Infrastructure) may be unacceptable within highly distributed systems. Therefore, modeling concepts like trust and reputation may result very helpful and useful when trying to gain a certain level of security and confidence among inter-operating entities. Thus, this chapter presents a review of some of the most representative trust and reputation models for P2P networks, discussing their main characteristics and also their weaknesses and deficiencies. Open issues and challenges associated with them will be also covered.
Green Secure Processors: Towards Power-Efficient Secure Processor Design
NASA Astrophysics Data System (ADS)
Chhabra, Siddhartha; Solihin, Yan
With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.
Survey of cyber security issues in smart grids
NASA Astrophysics Data System (ADS)
Chen, Thomas M.
2010-04-01
The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.
Transportation Security: Issues for the 111th Congress
2009-05-15
results of covert testing of airport security checkpoints demonstrating deficiencies in detecting improvised explosives and incendiary devices...34 A key issue in the debate over aviation security immediately following September 11, 2001, was whether airport security screeners should be...intentional wrongdoing on the part of airport security screeners, whether they be federal or private. Nonetheless, while the pilot program airports
Cooperative monitoring and its role in regional security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Biringer, K.; Olsen, J.; Lincoln, R.
1997-03-01
Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technicalmore » expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.« less
Code of Federal Regulations, 2012 CFR
2012-07-01
... government and international agencies and foreign central banks. In their accounts, depository institutions... BUREAU OF THE PUBLIC DEBT SALE AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS... Direct®—into which we issue marketable Treasury securities. We maintain and transfer securities in these...
Federal Agency biodefense funding, FY2011-FY2012.
Franco, Crystal; Sell, Tara Kirk
2011-06-01
Since 2001, the United States government has spent substantial resources on preparing the nation against a bioterrorist attack. Earlier articles in this series have analyzed civilian biodefense funding by the federal government for fiscal years (FY) 2001 through proposed funding for FY2011. This article updates those figures with budgeted amounts for FY2012, specifically analyzing the budgets and allocations for biodefense at the Departments of Health and Human Services, Defense, Homeland Security, Agriculture, Commerce, and State; the Environmental Protection Agency; and the National Science Foundation. This article also includes an updated assessment of the proportion of biodefense funding provided for programs that address multiple scientific, public health, healthcare, national security, and international security issues in addition to biodefense. The FY2012 federal budget for civilian biodefense totals $6.42 billion. Of that total, $5.78 billion (90%) is budgeted for programs that have both biodefense and nonbiodefense goals and applications, and $637.6 million (10%) is budgeted for programs that have objectives solely related to biodefense.
Federal agency biodefense funding, FY2013-FY2014.
Sell, Tara Kirk; Watson, Matthew
2013-09-01
Since 2001, the United States government has spent substantial resources on preparing the nation against a bioterrorist attack. Earlier articles in this series have analyzed civilian biodefense funding by the federal government for fiscal years (FY) 2001 through proposed funding for FY2013. This article updates those figures with budgeted amounts for FY2014, specifically analyzing the budgets and allocations for biodefense at the Departments of Health and Human Services, Defense, Homeland Security, Agriculture, Commerce, Veterans Affairs, and State; the Environmental Protection Agency; and the National Science Foundation. This article also includes an updated assessment of the proportion of biodefense funding provided for programs that address multiple scientific, public health, healthcare, national security, and international security issues in addition to biodefense. The FY2014 federal budget for civilian biodefense totals $6.69 billion. Of that total, $5.86 billion (88%) is budgeted for programs that have both biodefense and nonbiodefense goals and applications, and $835 million (12%) is budgeted for programs that have objectives solely related to biodefense.
Federal agency biodefense funding, FY2010-FY2011.
Franco, Crystal; Sell, Tara Kirk
2010-06-01
Since 2001, the United States government has spent substantial resources on preparing the nation against a bioterrorist attack. Earlier articles in this series have analyzed civilian biodefense funding by the federal government for fiscal years (FY) 2001 through FY2010. This article updates those figures with budgeted amounts for FY2011, specifically analyzing the budgets and allocations for biodefense at the Departments of Health and Human Services, Defense, Homeland Security, Agriculture, Commerce, and State; the Environmental Protection Agency; and the National Science Foundation. This article also includes an updated assessment of the proportion of biodefense funding provided for programs that address multiple public health, healthcare, national security, and international security issues in addition to biodefense. The FY2011 federal budget for civilian biodefense totals $6.48 billion. Of that total, $5.90 billion (91%) is budgeted for programs that have both biodefense and nonbiodefense goals and applications, and $577.9 million (9%) is budgeted for programs that deal strictly with biodefense.
Federal Agency Biodefense Funding, FY2013-FY2014
Watson, Matthew
2013-01-01
Since 2001, the United States government has spent substantial resources on preparing the nation against a bioterrorist attack. Earlier articles in this series have analyzed civilian biodefense funding by the federal government for fiscal years (FY) 2001 through proposed funding for FY2013. This article updates those figures with budgeted amounts for FY2014, specifically analyzing the budgets and allocations for biodefense at the Departments of Health and Human Services, Defense, Homeland Security, Agriculture, Commerce, Veterans Affairs, and State; the Environmental Protection Agency; and the National Science Foundation. This article also includes an updated assessment of the proportion of biodefense funding provided for programs that address multiple scientific, public health, healthcare, national security, and international security issues in addition to biodefense. The FY2014 federal budget for civilian biodefense totals $6.69 billion. Of that total, $5.86 billion (88%) is budgeted for programs that have both biodefense and nonbiodefense goals and applications, and $835 million (12%) is budgeted for programs that have objectives solely related to biodefense. PMID:23906009
Building Community Resilience to Disasters
Chandra, Anita; Acosta, Joie; Howard, Stefanie; Uscher-Pines, Lori; Williams, Malcolm; Yeung, Douglas; Garnett, Jeffrey; Meredith, Lisa S.
2011-01-01
Abstract Community resilience, or the sustained ability of a community to withstand and recover from adversity, has become a key policy issue at federal, state, and local levels, including in the National Health Security Strategy. Because resources are limited in the wake of an emergency, it is increasingly recognized that resilience is critical to a community's ability to reduce long recovery periods after an emergency. This article shares details of a report that provides a roadmap for federal, state, and local leaders who are developing plans to enhance community resilience for health security threats and describes options for building community resilience in key areas. Based on findings from a literature review and a series of community and regional focus groups, the authors provide a definition of community resilience in the context of national health security and a set of eight levers and five core components for building resilience. They then describe suggested activities that communities are pursuing and may want to strengthen for community resilience, and they identify challenges to implementation. PMID:28083162
State of the Art of Network Security Perspectives in Cloud Computing
NASA Astrophysics Data System (ADS)
Oh, Tae Hwan; Lim, Shinyoung; Choi, Young B.; Park, Kwang-Roh; Lee, Heejo; Choi, Hyunsang
Cloud computing is now regarded as one of social phenomenon that satisfy customers' needs. It is possible that the customers' needs and the primary principle of economy - gain maximum benefits from minimum investment - reflects realization of cloud computing. We are living in the connected society with flood of information and without connected computers to the Internet, our activities and work of daily living will be impossible. Cloud computing is able to provide customers with custom-tailored features of application software and user's environment based on the customer's needs by adopting on-demand outsourcing of computing resources through the Internet. It also provides cloud computing users with high-end computing power and expensive application software package, and accordingly the users will access their data and the application software where they are located at the remote system. As the cloud computing system is connected to the Internet, network security issues of cloud computing are considered as mandatory prior to real world service. In this paper, survey and issues on the network security in cloud computing are discussed from the perspective of real world service environments.
Biometrics and international migration.
Redpath, Jillyanne
2007-01-01
This paper will focus on the impact of the rapid expansion in the use of biometric systems in migration management on the rights of individuals; it seeks to highlight legal issues for consideration in implementing such systems, taking as the starting point that the security interests of the state and the rights of the individual are not, and should not be, mutually exclusive. The first part of this paper briefly describes the type of biometric applications available, how biometric systems function, and those used in migration management. The second part examines the potential offered by biometrics for greater security in migration management, and focuses on developments in the use of biometrics as a result of September 11. The third part discusses the impact of the use of biometrics in the management of migration on the individual's right to privacy and ability to move freely and lawfully. The paper highlights the increasing need for domestic and international frameworks to govern the use of biometric applications in the migration/security context, and proposes a number of issues that such frameworks could address.
Web Services Security - Implementation and Evaluation Issues
NASA Astrophysics Data System (ADS)
Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis
Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.
A ROK (Republic of Korea) Perspective on Korean Security and Desirable Roles for the United States.
1988-03-23
World War II, the United States and the Soviet Union agreed to divide responsiblity for disarming the Japanese forces still in Korea. The line of...from the U.S. while reducing those from Japan. But any significant change, such as lowering import tariffs or removing *monopoly protection, will...1988, has said that it will promote increased democratization with the resolution of a number of outstanding political issues, political- social
2006-06-01
solely towards domestic issues.39 However, shortly after coming to power, Marcos’ successor, President Corazon Aquino, found the readiness of the AFP...and Eileen Guerrero. Corazon Aquino and the Brushfire Revolution. (Baton Rouge: Louisiana State University Press, 1995): p. 201. 46 De Castro. “The...Strategic Readjustment on Asia- Pacific Security, 2005. Reid, Robert and Eileen Guerrero. Corazon Aquino and the Brushfire Revolution. Baton
Vietnam, the United States, and Japan in the South China Sea
2014-10-01
Asia Pacific Center for Security Studies VIETNAM, THE UNITED STATES, AND JAPAN IN THE SOUTH CHINA SEA Dr. Alexander L. Vuving Paper for...since 1988. The standoff also served as a litmus test to identify who will side with whom in this conflict. While most of the world remained neutral...these actors relate to the South China Sea issue. This paper will focus on the three status quo powers; particularly, I will examine the strategies of
2008-12-01
ICE Office of Investigations uses its legal authority to investigate issues such as immigration crime , human rights violations, and human smuggling...communities. Crimes committed by foreign nationals — many exploited by terrorists — pose ideological, legal and resource challenges to state and local...umbrella of the Special Agent In Charge (SAC) in Denver , Colorado . Utah ICE OI falls under the supervisory umbrella of the Assistant Special Agent In
Starting Strong: Talent-based Branching of Newly Commissioned U.S. Army Officers
2016-04-01
i The United States Army War College U.S. ARMY WAR COLLEGE CENTER for STRATEGIC LEADERSHIP The United States Army War College educates and develops...Army War College is to produce graduates who are skilled critical thinkers and complex problem solvers. Concurrently, it is our duty to the U.S. Army...Army War College and is the strategic-level study agent for issues related to national security and military strategy with emphasis on geostrategic
Code of Federal Regulations, 2010 CFR
2010-04-01
... registration of securities issued in business combination transactions by investment companies and business development companies. 239.23 Section 239.23 Commodity and Securities Exchanges SECURITIES AND EXCHANGE... companies and business development companies. This form shall be used by a registered investment company or...
76 FR 34920 - Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies
Federal Register 2010, 2011, 2012, 2013, 2014
2011-06-15
... SECURITIES AND EXCHANGE COMMISSION 17 CFR Parts 230, 240 and 260 [Release Nos. 33-9222; 34-64639; 39-2474; File No. S7-22-11] RIN 3235-AL16 Exemptions for Security-Based Swaps Issued by Certain Clearing Agencies AGENCY: Securities and Exchange Commission. ACTION: Proposed rules. SUMMARY: We are...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-07-18
... Important Notice of the availability of the comparison service for when-issued corporate securities.\\5\\ \\5... scheduled to be implemented for corporate when-issued securities and NSCC would submit a rule filing to the... SECURITIES AND EXCHANGE COMMISSION [Release No. 34-69980; File No. SR-NSCC-2013-09] Self...
Health-based Provisional Advisory Levels (PALs) for homeland security.
Adeshina, Femi; Sonich-Mullin, Cynthia; Ross, Robert H; Wood, Carol S
2009-12-01
The Homeland Security Presidential Directive #8 (HSPD-8) for National Emergency Preparedness was issued to " establish policies to strengthen the preparedness of the United States to prevent and respond to threatened or actual domestic terrorist attacks, major disasters, and other emergencies by requiring a national domestic all- hazards preparedness goal. "In response to HSPD-8 and HSPD-22 (classified) on Domestic Chemical Defense, the US Environmental Protection Agency (US EPA) National Homeland Security Research Center (NHSRC) is developing health-based Provisional Advisory Levels (PALs) for priority chemicals (including chemical warfare agents, pesticides, and toxic industrial chemicals) in air and drinking water. PALs are temporary values that will neither be promulgated, nor be formally issued as regulatory guidance. They are intended to be used at the discretion of risk managers in emergency situations. The PAL Program provides advisory exposure levels for chemical agents to assist in emergency planning and response decision-making, and to aid in making informed risk management decisions for evacuation, temporary re-entry into affected areas, and resumed-use of infrastructure, such as water resources. These risk management decisions may be made at the federal, state, and local levels. Three exposure levels (PAL 1, PAL 2, and PAL 3), distinguished by severity of toxic effects, are developed for 24-hour, 30-day, 90-day, and 2-year durations for potential exposure to drinking water and ambient air by the general public. Developed PALs are evaluated both by a US EPA working group, and an external multidisciplinary panel to ensure scientific credibility and wide acceptance. In this Special Issue publication, we present background information on the PAL program, the methodology used in deriving PALs, and the technical support documents for the derivation of PALs for acrylonitrile, hydrogen sulfide, and phosgene.
Kaiser, Michelle L; Cafer, Anne
2018-01-01
The United States is facing two interconnected social and public health crises of severe obesity and food insecurity within the social-ecological environment. Marginalized groups experience the highest rates and the greatest impacts in terms of morbidity, mortality, and financial burdens. Consequences include experiencing multimorbidities, mental health issues, and decreased quality of life. Food pantries have served as spaces to obtain food to meet household needs, but for some, food pantries have become long-term solutions. We surveyed 2,634 people who accessed pantries in 2005, 2010, and 2013 across 32 counties in a Midwest state. The authors sought to understand to what extent does length of time using a food pantry, food security status, income sources, use of federal food benefits, visiting a doctor, and demographic variables increase odds of severe obesity. More than 14% were severely obese; those who were long-term food pantry users and very low food secure were 1.732 times more likely to be severely obese. Receiving Disability/Supplemental Security Income, seeing a doctor in the last year, being female, and older age reduced the odds of severe obesity. Discussion includes implications for social workers who interact with groups likely to experience very low food security and severe obesity at different systems levels.
Leisering, L
2002-08-01
The article reconstructs the changes in provision for old age since the 19th century with regard to the ensuing change in intergenerational relationships. The first finding is a broadening of the arenas of provision for old age, a historical cumulation of family (which is still relevant), welfare state and, increasingly, private provision in financial markets, adding up to a 'welfare mix' in old age. This implies a complexification of intergenerational relationships. The second finding is an ambivalent qualitative change: on the one hand relationships between generations become more anonymous and disembedded from primary social relationships; on the other hand they are politicized (they become a public issue) and remoralized. This ambivalence applies to bureaucratic provision for old age in the welfare state, i.e., to social insurance. The main thesis is that--contrary to neoliberal belief--private old-age security in global financial markets cannot be seen as individualistic and moral-free but constitutes an anonymous exchange relationship between generations on financial markets that also raises issues of intergenerational justice. We can expect that these abstract relationships between generations will be politicized and remoralized as a consequence. Welfare state and financial markets offer solutions to problems of previous forms of provision for old age but they also produce new problems of intergenerational relationships.
Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar
NASA Astrophysics Data System (ADS)
Botel, Gabriel
This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in human security rarely applied in this context. This includes a brief review of human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar's hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.
Code of Federal Regulations, 2010 CFR
2010-10-01
... Certificate of Inspection required under § 153.900 for a United States ship to carry a hazardous material or... Certificate of Inspection or Certificate of Compliance. 153.15 Section 153.15 Shipping COAST GUARD, DEPARTMENT OF HOMELAND SECURITY (CONTINUED) CERTAIN BULK DANGEROUS CARGOES SHIPS CARRYING BULK LIQUID, LIQUEFIED...
Higher Education's "Accountability" Imperative: How the University System of Maryland Responded
ERIC Educational Resources Information Center
Kirwan, William E.
2007-01-01
A crucial national dialogue is under way about higher education and its role in securing America's future. Last fall, a blue-ribbon panel on higher education, established by Secretary of Education Margaret Spellings, issued a report expressing concerns that the United States could be losing its status as the world leader in postsecondary…
Federal Register 2010, 2011, 2012, 2013, 2014
2011-07-11
...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0... gasification research priorities of USDA and the Department of Energy at the State and regional levels. With... Economics. Purpose The objectives of the Sun Grant Program are to enhance national energy security through...
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-19
... option class (a ``Post-Halt Notification'') following a regulatory halt, trading pause or market-wide trading halt. Currently, the Exchange's Trading Operations staff at the MIAX Help Desk issues a Post-Halt...(a). The Post-Halt Notification states the time at which trading in the option class or classes is...
KIDS COUNT in Michigan 1994 Data Book: County Profiles of Child and Family Well-Being.
ERIC Educational Resources Information Center
Kids Count in Michigan, Lansing.
This Michigan Kids Count data book for 1994 describes the condition of children in each of Michigan's 83 counties. The first part of the report presents discussions of economic security, housing, child care, education, and health care, addressing the state and national experience for families and children, critical issues, and policies and…
Trends that will affect your future ... The illness profit industry and national security.
Schwartz, Stephan A
2009-01-01
The SchwartzReport tracks emerging trends that will affect the world, particularly the United States. For EXPLORE, it focuses on matters of health in the broadest sense of that term, including medical issues, changes in the biosphere, technology, and policy considerations, all of which will shape our culture and our lives.
The Role of Informal Science in the State Education Agenda. Issue Brief
ERIC Educational Resources Information Center
Thomasian, John
2012-01-01
Many governors have launched initiatives to raise student proficiency in math and science and encourage youth to pursue careers in STEM fields (i.e., science, technology, engineering, and math). Individuals with strong STEM skills play vital roles in technological innovation and economic growth and are rewarded with more secure jobs and higher…
Federal Register 2010, 2011, 2012, 2013, 2014
2012-09-21
... International Law (ACPIL)--Online Dispute Resolution (ODR) Study Group The Office of the Assistant Legal Adviser... UNCITRAL ODR Working Group, scheduled for November 5-9 in Vienna, and will specifically address security issues relating to the use of the ODR Rules, including measures to address the risk of fraud involving...
Arizonans on Edge...So Why Not Involved? AZ Views. Volume 2, Issue 1
ERIC Educational Resources Information Center
Morrison Institute for Public Policy, Arizona State University, 2009
2009-01-01
What a difference a year makes. In June 2008, "AZ Views" reported that "Arizonans have a strong sense of job security, despite the national economic slump and the state's budget crisis." That is no longer true, as this edition of "AZ Views" shows, and Arizona's economic situation arguably is the best example of the…
ERIC Educational Resources Information Center
Grush, Mary
2009-01-01
As colleges and universities rely more heavily on software as a service (SaaS), they're putting more critical data in the cloud. What are the security issues, and how are cloud providers responding? "Campus Technology" ("CT") went to three higher ed SaaS vendors--Google, IBM, and TopSchool--and asked them to share their thoughts about the state of…
Carbon sequestration potential of poplar energy crops in the Midwest, USA
R.S. Jr. Zalesny; W.L. Headlee; R.B. Hall; D.R. Coyle
2010-01-01
Energy use and climate change mitigation are closely linked via ecological, social, and economic factors, including carbon management. Energy supply is a key 21st century National security issue for the United States; identifying and developing woody feedstocks for transportation fuels and combined heat and power operations are a crucial component of the future...
Foreign and Domestic Policy Belief Structures in the U.S. and British Publics
ERIC Educational Resources Information Center
Jenkins-Smith, Hank C.; Mitchell, Neil J.; Herron, Kerry G.
2004-01-01
Scholars have made little progress in exploring the degree to which research on belief structures among Americans may be generalizable to other political systems and geopolitical contexts. The distribution and structure of mass beliefs related to nuclear security, missile defenses, and nuclear energy issues in the United States and Great Britain…
Funding Homeland Security Programs at the State Level: A Multiple Policy Analysis
2014-12-01
none is conclusively appropriate to address this funding issue. 84 Art Swift, “For First Time, Americans Favor Legalizing Marijuana ,” Gallup...Swift, Art. “For First Time, Americans Favor Legalizing Marijuana .” Gallup Politics. October 22, 2013. http://www.gallup.com/poll/165539/first-time...LEGALIZATION AND TAXATION OF RECREATIONAL MARIJUANA USE ........................................................................................58 D
Humanitarian assistance and disaster relief: changing the face of defense.
Laraby, Patrick R; Bourdeaux, Margaret; Casscells, S Ward; Smith, David J; Lawry, Lynn
2009-01-01
The US Department of Defense (DOD) is evolving to meet new security challenges in the twenty-first century. Today's challenges result from growing political, environmental, and economic instability in important areas of the globe that threaten national and global security. Immediate outreach to foreign nations in times of violent instability or natural disaster fosters security and stability both for the affected country and for the United States. Foreign humanitarian assistance (FHA) is a rapidly evolving military mission that addresses conflict prevention, conflict, postconflict, and natural disasters. With DOD's extensive global medical resources, it is often uniquely qualified to execute a critical role in relief and/or public health efforts. When and how the American military will act in FHA and disaster relief is a still evolving doctrine with three issues deserving particular attention: aligning operations with host government leadership, preserving humanitarian space, and tailoring the US military's unique resources to the specific political and medical situation at hand. The DOD's response to a large-scale earthquake in Peru suggests useful approaches to these three issues, provides a template for future FHA mission, and points to strategic decisions and operational capabilities that need further development to establish the FHA mission firmly within DOD's repertoire of security engagement activities.
Secure access control and large scale robust representation for online multimedia event detection.
Liu, Changyu; Lu, Bin; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches.
Security implications and governance of cognitive neuroscience.
Kosal, Margaret E; Huang, Jonathan Y
2015-01-01
In recent years, significant efforts have been made toward elucidating the potential of the human brain. Spanning fields as disparate as psychology, biomedicine, computer science, mathematics, electrical engineering, and chemistry, research venturing into the growing domains of cognitive neuroscience and brain research has become fundamentally interdisciplinary. Among the most interesting and consequential applications to international security are the military and defense community's interests in the potential of cognitive neuroscience findings and technologies. In the United States, multiple governmental agencies are actively pursuing such endeavors, including the Department of Defense, which has invested over $3 billion in the last decade to conduct research on defense-related innovations. This study explores governance and security issues surrounding cognitive neuroscience research with regard to potential security-related applications and reports scientists' views on the role of researchers in these areas through a survey of over 200 active cognitive neuroscientists.
Monitoring of continuous-variable quantum key distribution system in real environment.
Liu, Weiqi; Peng, Jinye; Huang, Peng; Huang, Duan; Zeng, Guihua
2017-08-07
How to guarantee the practical security of continuous-variable quantum key distribution (CVQKD) system has been an important issue in the quantum cryptography applications. In contrast to the previous practical security strategies, which focus on the intercept-resend attack or the Gaussian attack, we investigate the practical security strategy based on a general attack, i.e., an arbitrated individual attack or collective attack on the system by Eve in this paper. The low bound of intensity disturbance of the local oscillator signal for eavesdropper successfully concealing herself is obtained, considering all noises can be used by Eve in the practical environment. Furthermore, we obtain an optimal monitoring condition for the practical CVQKD system so that legitimate communicators can monitor the general attack in real-time. As examples, practical security of two special systems, i.e., the Gaussian modulated coherent state CVQKD system and the middle-based CVQKD system, are investigated under the intercept-resend attacks.
Climate Change and Risks to National Security
NASA Astrophysics Data System (ADS)
Titley, D.
2017-12-01
Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.
Better Safe than Sorry: Panic Buttons as a Security Measure in an Academic Medical Library
ERIC Educational Resources Information Center
McMullen, Karen D.; Kane, Laura Townsend
2008-01-01
In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…
Code of Federal Regulations, 2010 CFR
2010-04-01
... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form S-4, for the registration of securities issued in business combination transactions. 239.25 Section 239.25 Commodity and... business combination transactions. This form may be used for registration under the Securities Act of 1933...
Close the Gate, Lock the Windows, Bolt the Doors: Securing Library Computers. Online Treasures
ERIC Educational Resources Information Center
Balas, Janet
2005-01-01
This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…
The U.S. Navy Littoral Combat Ship: Current Issues and How to Employ It in the Future
2012-03-07
Ship: NIA Curr-ent Issues and How to Deploy It in the Future 5b. GRANT NUMBER N/A 5c. PROGRAM ELEMENT NUMBER N/A 6. AUTHORCSl 5d. PROJECT NUMBER...Lieutenant Commander Gregory M Zimmerman, United States Navy N/A 5e. TASK NUMBER N/A 5f. WORK UNIT NUMBER NIA 7. PERFORMING ORGANIZATION NAME(S...Launch Module, MH-60R helicopter, UAV (Fire Scout), Mission Package Application Software Module, and the optional Maritime Security Module. 27 LCS can
Food and nutrition security in the Hindu Kush Himalayan region.
Rasul, Golam; Hussain, Abid; Mahapatra, Bidhubhusan; Dangol, Narendra
2018-01-01
The status of food and nutrition security and its underlying factors in the Hindu-Kush Himalayan (HKH) region is investigated. In this region, one third to a half of children (<5 years of age) suffer from stunting, with the incidence of wasting and under-weight also being very high. The prevalence of stunting, wasting and under-weight in children is particularly high in some mountain areas such as Meghalaya state in India, the western mountains and far-western hills of Nepal, Balochistan province in Pakistan, eastern Afghanistan, and Chin state in Myanmar. Food habits in the HKH region are changing. This has led to a deterioration in traditional mountain food systems with a decline in agrobiodiversity. Factors such as high poverty and low dietary energy intakes, a lack of hygienic environments, inadequate nutritional knowledge, and climate change and environmental degradation are also influencing food and nutrition security in the HKH region. To achieve sustainable food and nutrition security in the mountains, this study suggests a multi-sectoral integrated approach with consideration of nutritional aspects in all development processes dealing with economic, social, agricultural and public health issues. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.
Halperin-Kaddari, Ruth; Yadgar, Yaacov
2010-01-01
This article argues that one of the many "idiosyncrasies" of the Israeli case, namely Israel's continuing, violent conflict with its Arab neighbours, is of highly influential relevance to the issue of gender relations. Viewed by many Israeli Jews as a struggle for the very existence of the Jewish state, the Arab-Israeli conflict has overshadowed most other civil and social issues, rendering them "secondary" to the primary concern of securing the safe existence of the state. This has pushed such pressing issues as gender equality and women's rights aside, thus allowing for the perpetuation of discriminatory, sometimes rather repressive treatment of women in Israel. The most blatant expression of this is the turning of the struggle for civil marriage and divorce into a non-issue. Following a short introduction of the relevant political context, we discuss women's positivist and legal status, then conclude with an analysis of the women's movement, highlighting the emergence of religious feminism.
Framing health and foreign policy: lessons for global health diplomacy.
Labonté, Ronald; Gagnon, Michelle L
2010-08-22
Global health financing has increased dramatically in recent years, indicative of a rise in health as a foreign policy issue. Several governments have issued specific foreign policy statements on global health and a new term, global health diplomacy, has been coined to describe the processes by which state and non-state actors engage to position health issues more prominently in foreign policy decision-making. Their ability to do so is important to advancing international cooperation in health. In this paper we review the arguments for health in foreign policy that inform global health diplomacy. These are organized into six policy frames: security, development, global public goods, trade, human rights and ethical/moral reasoning. Each of these frames has implications for how global health as a foreign policy issue is conceptualized. Differing arguments within and between these policy frames, while overlapping, can also be contradictory. This raises an important question about which arguments prevail in actual state decision-making. This question is addressed through an analysis of policy or policy-related documents and academic literature pertinent to each policy framing with some assessment of policy practice. The reference point for this analysis is the explicit goal of improving global health equity. This goal has increasing national traction within national public health discourse and decision-making and, through the Millennium Development Goals and other multilateral reports and declarations, is entering global health policy discussion. Initial findings support conventional international relations theory that most states, even when committed to health as a foreign policy goal, still make decisions primarily on the basis of the 'high politics' of national security and economic material interests. Development, human rights and ethical/moral arguments for global health assistance, the traditional 'low politics' of foreign policy, are present in discourse but do not appear to dominate practice. While political momentum for health as a foreign policy goal persists, the framing of this goal remains a contested issue. The analysis offered in this article may prove helpful to those engaged in global health diplomacy or in efforts to have global governance across a range of sectoral interests pay more attention to health equity impacts.
Framing health and foreign policy: lessons for global health diplomacy
2010-01-01
Global health financing has increased dramatically in recent years, indicative of a rise in health as a foreign policy issue. Several governments have issued specific foreign policy statements on global health and a new term, global health diplomacy, has been coined to describe the processes by which state and non-state actors engage to position health issues more prominently in foreign policy decision-making. Their ability to do so is important to advancing international cooperation in health. In this paper we review the arguments for health in foreign policy that inform global health diplomacy. These are organized into six policy frames: security, development, global public goods, trade, human rights and ethical/moral reasoning. Each of these frames has implications for how global health as a foreign policy issue is conceptualized. Differing arguments within and between these policy frames, while overlapping, can also be contradictory. This raises an important question about which arguments prevail in actual state decision-making. This question is addressed through an analysis of policy or policy-related documents and academic literature pertinent to each policy framing with some assessment of policy practice. The reference point for this analysis is the explicit goal of improving global health equity. This goal has increasing national traction within national public health discourse and decision-making and, through the Millennium Development Goals and other multilateral reports and declarations, is entering global health policy discussion. Initial findings support conventional international relations theory that most states, even when committed to health as a foreign policy goal, still make decisions primarily on the basis of the 'high politics' of national security and economic material interests. Development, human rights and ethical/moral arguments for global health assistance, the traditional 'low politics' of foreign policy, are present in discourse but do not appear to dominate practice. While political momentum for health as a foreign policy goal persists, the framing of this goal remains a contested issue. The analysis offered in this article may prove helpful to those engaged in global health diplomacy or in efforts to have global governance across a range of sectoral interests pay more attention to health equity impacts. PMID:20727211
Israel: Background and Relations with the United States
2006-07-26
grant of 15% of an investment of up to $3.5 billion or $525 million to secure the deal. In May 2006, prominent U.S. investor Warren Buffet announced...President Bush noted the need to take into account changed “realities on the ground, including already existing major Israeli population centers,” (i.e...Issues Military Sales. Israel accounts for about 10% of the world’s defense exports, totaling $3.5 billion in 2004. The United States and Israel have
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-01
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack. PMID:26751443
Design and Development of Layered Security: Future Enhancements and Directions in Transmission.
Shahzad, Aamir; Lee, Malrey; Kim, Suntae; Kim, Kangmin; Choi, Jae-Young; Cho, Younghwa; Lee, Keun-Kwang
2016-01-06
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities. Numerous end-to-end security mechanisms have been proposed for the resolution of SCADA-system security issues, but due to insecure real-time protocol use and the reliance upon open protocols during Internet-based communication, these SCADA systems can still be compromised by security challenges. This study reviews the security challenges and issues that are commonly raised during SCADA/protocol transmissions and proposes a secure distributed-network protocol version 3 (DNP3) design, and the implementation of the security solution using a cryptography mechanism. Due to the insecurities found within SCADA protocols, the new development consists of a DNP3 protocol that has been designed as a part of the SCADA system, and the cryptographically derived security is deployed within the application layer as a part of the DNP3 stack.
Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security
NASA Astrophysics Data System (ADS)
Mahmadi, FN; Zaaba, ZF; Osman, A.
2016-11-01
Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Not Available
This report contains papers on the following topics: NREN Security Issues: Policies and Technologies; Layer Wars: Protect the Internet with Network Layer Security; Electronic Commission Management; Workflow 2000 - Electronic Document Authorization in Practice; Security Issues of a UNIX PEM Implementation; Implementing Privacy Enhanced Mail on VMS; Distributed Public Key Certificate Management; Protecting the Integrity of Privacy-enhanced Electronic Mail; Practical Authorization in Large Heterogeneous Distributed Systems; Security Issues in the Truffles File System; Issues surrounding the use of Cryptographic Algorithms and Smart Card Applications; Smart Card Augmentation of Kerberos; and An Overview of the Advanced Smart Card Access Control System.more » Selected papers were processed separately for inclusion in the Energy Science and Technology Database.« less
For telehealth to succeed, privacy and security risks must be identified and addressed.
Hall, Joseph L; McGraw, Deven
2014-02-01
The success of telehealth could be undermined if serious privacy and security risks are not addressed. For example, sensors that are located in a patient's home or that interface with the patient's body to detect safety issues or medical emergencies may inadvertently transmit sensitive information about household activities. Similarly, routine data transmissions from an app or medical device, such as an insulin pump, may be shared with third-party advertisers. Without adequate security and privacy protections for underlying telehealth data and systems, providers and patients will lack trust in the use of telehealth solutions. Although some federal and state guidelines for telehealth security and privacy have been established, many gaps remain. No federal agency currently has authority to enact privacy and security requirements to cover the telehealth ecosystem. This article examines privacy risks and security threats to telehealth applications and summarizes the extent to which technical controls and federal law adequately address these risks. We argue for a comprehensive federal regulatory framework for telehealth, developed and enforced by a single federal entity, the Federal Trade Commission, to bolster trust and fully realize the benefits of telehealth.
de Gramatica, Martina; Massacci, Fabio; Shim, Woohyun; Turhan, Uğur; Williams, Julian
2017-02-01
We analyze the issue of agency costs in aviation security by combining results from a quantitative economic model with a qualitative study based on semi-structured interviews. Our model extends previous principal-agent models by combining the traditional fixed and varying monetary responses to physical and cognitive effort with nonmonetary welfare and potentially transferable value of employees' own human capital. To provide empirical evidence for the tradeoffs identified in the quantitative model, we have undertaken an extensive interview process with regulators, airport managers, security personnel, and those tasked with training security personnel from an airport operating in a relatively high-risk state, Turkey. Our results indicate that the effectiveness of additional training depends on the mix of "transferable skills" and "emotional" buy-in of the security agents. Principals need to identify on which side of a critical tipping point their agents are to ensure that additional training, with attached expectations of the burden of work, aligns the incentives of employees with the principals' own objectives. © 2016 Society for Risk Analysis.
Bernat, Debra H; Lenk, Kathleen M; Nelson, Toben F; Winters, Ken C; Toomey, Traci L
2014-08-01
Campus police and security personnel are often the first to respond to alcohol-related incidents on campus. The purpose of this study is to examine how campus law enforcement and security respond to alcohol-related incidents, and how consequences and communication differ based on characteristics of the incident. Directors of campus police/security from 343 colleges across the United States completed a survey regarding usual practice following serious, underage, and less serious alcohol incidents on and off campus. Campus law enforcement and security most commonly reported contacting campus officials. A minority reported issuing citations and referring students to the health center. Enforcement actions were more commonly reported for serious and underage incidents than for less serious incidents. Large (vs. small) colleges, public (vs. private) colleges, and those located in small (vs. large) towns more consistently reported taking actions against drinkers. Understanding how campus police and security respond to alcohol-related incidents is essential for reducing alcohol-related problems on college campuses. Copyright © 2014 by the Research Society on Alcoholism.
1987-04-01
security deposit action is described in the regulation as follows: h. Security Deposits (DACF and DACA ). (1) Issue. PCS moves create financial hardships...General Wickham, The Army Chief of Staff, specified a philosophy toward the family in the Army Family White Paper. General Wickham’s action was in...security deposits arose. 1 The Army’s action to the issue of security deposits will be thoroughly discussed in this paper. The Army’s action comes now
Measurement-Device-Independent Quantum Cryptography
NASA Astrophysics Data System (ADS)
Tang, Zhiyuan
Quantum key distribution (QKD) enables two legitimate parties to share a secret key even in the presence of an eavesdropper. The unconditional security of QKD is based on the fundamental laws of quantum physics. Original security proofs of QKD are based on a few assumptions, e.g., perfect single photon sources and perfect single-photon detectors. However, practical implementations of QKD systems do not fully comply with such assumptions due to technical limitations. The gap between theory and implementations leads to security loopholes in most QKD systems, and several attacks have been launched on sophisticated QKD systems. Particularly, the detectors have been found to be the most vulnerable part of QKD. Much effort has been put to build side-channel-free QKD systems. Solutions such as security patches and device-independent QKD have been proposed. However, the former are normally ad-hoc, and cannot close unidentified loopholes. The latter, while having the advantages of removing all assumptions on devices, is impractical to implement today. Measurement-device-independent QKD (MDI-QKD) turns out to be a promising solution to the security problem of QKD. In MDI-QKD, all security loopholes, including those yet-to-be discovered, have been removed from the detectors, the most critical part in QKD. In this thesis, we investigate issues related to the practical implementation and security of MDI-QKD. We first present a demonstration of polarization-encoding MDI-QKD. Taking finite key effect into account, we achieve a secret key rate of 0.005 bit per second (bps) over 10 km spooled telecom fiber, and a 1600-bit key is distributed. This work, together with other demonstrations, shows the practicality of MDI-QKD. Next we investigate a critical assumption of MDI-QKD: perfect state preparation. We apply the loss-tolerant QKD protocol and adapt it to MDI-QKD to quantify information leakage due to imperfect state preparation. We then present an experimental demonstration of MDI-QKD over 10 km and 40 km of spooled fiber, which for the first time considers the impact of inaccurate polarization state preparation on the secret key rate. This would not have been possible under previous security proofs, given the same amount of state preparation flaws.
Inter-organizational future proof EHR systems. A review of the security and privacy related issues.
van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan
2009-03-01
Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.
The role of space related non-governmental organizations (NGOs) in capacity building
NASA Astrophysics Data System (ADS)
Lukaszczyk, A.; Williamson, R.
2010-02-01
Non-governmental organizations (NGOs) play a unique role in international affairs, providing access to resources, expertise, and assistance to supplement State resources. Sometimes the diplomatic skills and unofficial access of NGOs to policymakers through Track Two diplomacy can move a previously stalled critical issue forward and assist policymakers from different countries to find common ground outside official channels. Because they work outside of official channels, they are not bound by State policy that may inhibit negotiations between States. Some also have a convening power that sometimes makes it possible for State representatives to meet discipline experts and each other for informal discussions on issues of mutual interest. Finally, NGOs can draw attention to issues that may be overlooked or avoided by State organizations. This paper examines the ways in which NGOs can assist in building scientific, technical, educational, and legal and policy expertise related to space and Earth science, technology and governance of space activities. In particular, it will explore and analyze the ways in which organizations such as the Space Generation Advisory Council, EURISY, the Planetary Society and Secure World Foundation contribute to building capacity in developing countries.
Code of Federal Regulations, 2012 CFR
2012-04-01
... 17 Commodity and Securities Exchanges 2 2012-04-01 2012-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 17 Commodity and Securities Exchanges 2 2013-04-01 2013-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... aggregate principal amount, par value, or book value of the securities as carried by the registrant, or the...
Local Area Network (LAN) Compatibility Issues
1991-09-01
September, 1991 Thesis Advisor: Dr. Norman Schneidewind Approved for public release; distribution is unlimited 92 303s246 Unclassified SECURITY ...CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE Ia. REPORT SECURITY CLASSIFICATION 1 b. RESTRICTIVE MARKINGS unclassified 2a. SECURITY CLASSIFICATION...Work UiNt ACCeLUOn Number 11. TITLE (Include Security Classification) LOCAL AREA NETWORK (LAN) COMPATIBILITY ISSUES 12. PERSONAL AUTHOR(S) Rita V
Safeguarding patient privacy in electronic healthcare in the USA: the legal view.
Walsh, Diana; Passerini, Katia; Varshney, Upkar; Fjermestad, Jerry
2008-01-01
The conflict between the sweeping power of technology to access and assemble personal information and the ongoing concern about our privacy and security is ever increasing. While we gradually need higher electronic access to medical information, issues relating to patient privacy and reducing vulnerability to security breaches surmount. In this paper, we take a legal perspective and examine the existing patchwork of laws and obligations governing health information in the USA. The study finds that as Electronic Medical Records (EMRs) increase in scope and dissemination, privacy protections gradually decrease due to the shortcomings in the legal system. The contributions of this paper are (1) an overview of the legal EMR issues in the USA, and (2) the identification of the unresolved legal issues and how these will escalate when health information is transmitted over wireless networks. More specifically, the paper discusses federal and state government regulations such as the Electronic Communications Privacy Act, the Health Insurance Portability and Accountability Act (HIPAA) and judicial intervention. Based on the legal overview, the unresolved challenges are identified and suggestions for future research are included.
Iris Cryptography for Security Purpose
NASA Astrophysics Data System (ADS)
Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.
2018-04-01
In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.
The nature of international health security.
Chiu, Ya-Wen; Weng, Yi-Hao; Su, Yi-Yuan; Huang, Ching-Yi; Chang, Ya-Chen; Kuo, Ken N
2009-01-01
Health issues occasionally intersect security issues. Health security has been viewed as an essential part of human security. Policymakers and health professionals, however, do not share a common definition of health security. This article aims to characterize the notions of health security in order to clarify what constitutes the nexus of health and security. The concept of health security has evolved over time so that it encompasses many entities. Analyzing the health reports of four multilateral organizations (the United Nations, World Health Organization, Asia-Pacific Economic Cooperation, and the European Union) produced eight categories of most significant relevance to contemporary health security, allowing comparison of the definitions. The four categories are: emerging diseases; global infectious disease; deliberate release of chemical and biological materials; violence, conflict, and humanitarian emergencies. Two other categories of common concern are natural disasters and environmental change, as well as chemical and radioactive accidents. The final two categories, food insecurity and poverty, are discussed less frequently. Nevertheless, food security is emerging as an increasingly important issue in public health. Health security is the first line of defence against health emergencies. As globalization brings more complexities, dealing with the increased scale and extent of health security will require greater international effort and political support.
NASA Astrophysics Data System (ADS)
Meyerstein, Mike; Cha, Inhyok; Shah, Yogendra
The Third Generation Partnership Project (3GPP) standardisation group currently discusses advanced applications of mobile networks such as Machine-to-Machine (M2M) communication. Several security issues arise in these contexts which warrant a fresh look at mobile networks’ security foundations, resting on smart cards. This paper contributes a security/efficiency analysis to this discussion and highlights the role of trusted platform technology to approach these issues.
A Teacher Fears for Kids over Freshly Ambushed Gay Rights
ERIC Educational Resources Information Center
Morris, Bonnie J.
2005-01-01
In this article, the author talks about the passing of new laws forbidding gay marriage or legal recognition of same-sex unions in the United States and the impact of the gay rights issue on students. Across the nation, faculty who enjoy secure academic appointments, work with caring colleagues, and reside in university towns are subject to new…
Children Who Lose Their Parents to HIV/AIDS: Agency Guidelines for Adoptive and Kinship Placement.
ERIC Educational Resources Information Center
Merkel-Holguin, Lisa
Across the United States and world, children who lose their parents to HIV/AIDS are one of the fasted emerging groups affected by this epidemic. Increasingly, child welfare and family service agencies are helping infected parents to secure legal and permanent care arrangements for their children. These guidelines address the issues of placing…
ERIC Educational Resources Information Center
Freeman, Richard B.
2006-01-01
There is widespread concern that the United States faces a problem in maintaining its position as the scientific and technological leader in the world and that loss of leadership threatens future economic well-being and national security. Business, science, and education groups have issued reports that highlight the value to the country of…
Doing Windows: Non-Traditional Military Responses to Complex Emergencies
1997-09-01
achieving civil stability and durable peace in states embroiled in complex emergencies. A complex emergency is one which draws every sector of society ...a stable, civil society ? The project involved three distinct phases. First, we conducted an extensive literature review to frame the issues used in...Pursue sustainable security through prevention, mitigation, and preparedness Integrate existing capacities of all elements of society
CTC Sentinel. Volume 7, Issue 3
2014-03-01
foreign fighting, including Finland . In March 2014, the Finnish Security and Intelligence Service (FSIS) stated that over 30 individuals had...hardened jihadists returning to Finland from Syria.5 This article examines the factors that may have contributed to Finnish Muslim participation...Violent Extremism in Finland – Situation Overview 2/2013,” Finland Ministry of the Interior, August 26, 2013. The reports do not clarify whether
75 FR 881 - Meeting of Advisory Committee on International Communications and Information Policy
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-06
... development issues, international spectrum requirements and harmonization, cyber-security, and data protection... will discuss key issues of importance to U.S. communications policy interests including future... Bureau of Diplomatic Security to enhance the Department's security by tracking visitor traffic and to...
The 2015 National Security Strategy: Authorities, Changes, Issues for Congress
2016-02-26
climate change ; ensure access to shared spaces (expanding cyberspace and including outer space and air and maritime security); and increase global...hand, one could conclude that these, along with confronting climate change , convey both a wider range of national security challenges in terms of...The 2015 National Security Strategy: Authorities, Changes , Issues for Congress Nathan J. Lucas, Coordinator Section Research Manager Kathleen
Fact Sheet: National Space Policy. Appendix F-2
NASA Technical Reports Server (NTRS)
1996-01-01
For over three decades, the United States has led the world in the exploration and use of outer space. Our achievements in space have inspired a generation of Americans and people throughout the world. We will maintain this leadership role by supporting a strong, stable, and balanced national space program that serves our goals in national security, foreign policy, economic growth, environmental stewardship, and scientific and technical excellence. Access to and use of space are central for preserving peace and protecting US national security as well as civil and commercial interests. The United States will pursue greater levels of partnership and cooperation in national and international space activities and work with other nations to ensure the continued exploration and use of outer space for peaceful purposes. The goals of the US space program are to: (a) Enhance knowledge of the Earth, the solar system, and the universe through human and robotic exploration; (b) Strengthen and maintain the national security of the United States; (c) Enhance the economic competitiveness and scientific and technical capabilities of the United States; (d) Encourage State, local, and private sector investment in, and use of, space technologies; (e) Promote international cooperation to further US domestic, national security, and foreign policies. The United States is committed to the exploration and use of outer space by all nations for peaceful purposes and for the benefit of all humanity. "Peaceful purposes" allow defense and intelligence-related activities in pursuit of national security and other goals. The United States rejects any claims to sovereignty by any nation over outer space or celestial bodies, or any portion thereof, and rejects any limitations on the fundamental right of sovereign nations to acquire data from space. The United States considers the space systems of any nation to be national property with the right of passage through and operations in space without interference. Purposeful interference with space systems shall be viewed as an infringement on sovereign rights. The US Government will maintain and coordinate separate national security and civil space systems where differing needs dictate. All actions undertaken by agencies and departments in implementing the national space policy shall be consistent with US law, regulations, national security requirements, foreign policy, international obligations, and nonproliferation policy. The National Science and Technology Council (NSTC) is the principal forum for resolving issues related to national space policy. As appropriate, the NSTC and NSC will co-chair policy process. This policy will be implemented within the overall resource and policy guidance provided by the President.
Operating in the Gray Zone: An Alternative Paradigm for U.S. Military Strategy
2016-04-01
labeling, or re-labeling, may have been to draw the attention of busy policymakers to rapidly emerging security issues , it has evolved into something... issues affecting the national security community. The Peacekeeping and Stability Operations Institute provides subject matter expertise, technical...SSI) is part of the U.S. Army War College and is the strategic-level study agent for issues related to national security and military strategy with
Training and information technology issue, 2005
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agnihotri, Newal
The focus of the May-June issue is on training and information technology. Major articles/reports in this issue include: Communicating effectively, by Alain Bucaille, AREVA; Reputation management, by Susan Brisset, Bruce Power; Contol room and HSI modernization guidance, by Joseph Naser, EPRI; How far are we from public acceptance, by Jennifer A. Biedscheid and Murthy Devarakonda, Washington TRU Solutions LLC; Spent fuel management options, by Brent W. Dixon and Steven J. Piet, Idaho National Laboratory; Industry Awards; A secure energy future for America, by George W. Bush, President, United States of America; Vision of the future of nuclear energy, by Annemore » Lauvergeon, AREVA; and, Plant profile: strategy for transition to digital, TXU Power.« less
Security, protection, and control of power systems with large-scale wind power penetration
NASA Astrophysics Data System (ADS)
Acharya, Naresh
As the number of wind generation facilities in the utility system is fast increasing, many issues associated with their integration into the power system are beginning to emerge. Of the various issues, this dissertation deals with the development of new concepts and computational methods to handle the transmission issues and voltage issues caused by large-scale integration of wind turbines. This dissertation also formulates a probabilistic framework for the steady-state security assessment of wind power incorporating the forecast uncertainty and correlation. Transmission issues are mainly related to the overloading of transmission lines, when all the wind power generated cannot be delivered in full due to prior outage conditions. To deal with this problem, a method to curtail the wind turbine outputs through Energy Management System facilities in the on-line operational environment is proposed. The proposed method, which is based on linear optimization, sends the calculated control signals via the Supervisory Control and Data Acquisition system to wind farm controllers. The necessary ramping of the wind farm outputs is implemented either by the appropriate blade pitch angle control at the turbine level or by switching a certain number of turbines. The curtailment strategy is tested with an equivalent system model of MidAmerican Energy Company. The results show that the line overload in high wind areas can be alleviated by controlling the outputs of the wind farms step-by-step over an allowable period of time. A low voltage event during a system fault can cause a large number of wind turbines to trip, depending on voltages at the wind turbine terminals during the fault and the under-voltage protection setting of wind turbines. As a result, an N-1 contingency may evolve into an N-(K+1) contingency, where K is the number of wind farms tripped due to low voltage conditions. Losing a large amount of wind power following a line contingency might lead to system instabilities. It is important for the system operator to be aware of such limiting events during system operation and be prepared to take proper control actions. This can be achieved by incorporating the wind farm tripping status for each contingency as part of the static security assessment. A methodology to calculate voltages at the wind farm buses during a worst case line fault is proposed, which, along with the protection settings of wind turbines, can be used to determine the tripping of wind farms. The proposed algorithm is implemented in MATLAB and tested with MidAmerican Energy reduced network. The result shows that a large amount of wind capacity can be tripped due to a fault in the lines. Therefore, the technique will find its application in the static security assessment where each line fault can be associated with the tripping of wind farms as determined from the proposed method. A probabilistic framework to handle the uncertainty in day-ahead forecast error in order to correctly assess the steady-state security of the power system is presented. Stochastic simulations are conducted by means of Latin hypercube sampling along with the consideration of correlations. The correlation is calculated from the historical distribution of wind power forecast errors. The results from the deterministic simulation based on point forecast and the stochastic simulation show that security assessment based solely on deterministic simulations can lead to incorrect assessment of system security. With stochastic simulations, each outcome can be assigned a probability and the decision regarding control actions can be made based on the associated probability.
The Campus Executive's Role in Security and Liability Issues.
ERIC Educational Resources Information Center
Bromley, Max; Territo, Leonard
1986-01-01
Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)
What is the current state of the science of Cyber defense?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hurd, Alan J.
My overall sense of the cyber defense field is one of an adolescent discipline currently bogged down in a cloud of issues, the most iconic of which is the great diversity of approaches that are being aggregated to form a coherent field. Because my own expertise is complex systems and materials physics research, I have limited direct experience in cyber security sciences except as a user of secure networks and computing resources. However, in producing this report, I have found with certainty that there exists no calculus for cyber risk assessment, mitigation, and response, although some hopeful precepts toward thismore » end are emerging.« less
Managing Campus Security: Issues for Police Officers at Public Institutions.
ERIC Educational Resources Information Center
Dwyer, William O.; And Others
1994-01-01
To maximize the effectiveness of their campus security systems while minimizing the institution's exposure to liability, campus administrators must understand the legal context in which their police or security personnel are operating as agents of authority. Some of these policy and behavior issues are explained. (MSE)
ERIC Educational Resources Information Center
Bete, Tim, Ed.
1998-01-01
Presents the opinions of four security experts on the issue of guns in schools. The experts respond to the following questions: will schools ever be free of weapons; will card access systems become common in public schools; will metal detectors solve school security problems; and will students ever be issued bullet-proof vests along with…
Midwives as drivers of reproductive health commodity security in Kaduna State, Nigeria
Alayande, Audu; Mamman-Daura, Fatima; Adedeji, Olanike; Muhammad, Ado Zakari
2016-01-01
Abstract Objectives: The significant improvement in the contraceptive prevalence rate in Kaduna State, Nigeria, from 8.4% in 2008 to 18.5% in 2013 is a notable achievement. This article analyses the role of midwives as drivers of reproductive health commodity security (RHCS) and their impact on contraceptive use in Kaduna State. Methods: The United Nations Population Fund (UNFPA) supported the bimonthly review resupply meetings facilitated by midwives at State and local government area (LGA) levels. The midwives deliver contraception to the LGAs for onward distribution to 6974 of the 25,000 health facilities across the country according to usage data from the previous 2 months. They also collect requisition, issue and resupply form data from the previous 2 months. Results: The active participation of midwives at the bimonthly meetings improved data timeliness by 23% and data completeness by 50% in 1 year. Only one health facility ran out of intrauterine devices and only 17% reported running out of female condoms. The total number of contraceptives issued increased from 31,866 in 2012 to 177,828 in 2013, resulting in a couple–year protection increase from 3408 in 2012 to 102,207 in 2013. Conclusions: Creation of increased demand and engagement of midwives in providing family planning services, especially long-acting contraceptive methods, coupled with the removal of cost to the user and the strengthening of the supply chain have been major factors in more than doubling the contraceptive prevalence rate. PMID:26909871
Quality and security - They work together
NASA Technical Reports Server (NTRS)
Carr, Richard; Tynan, Marie; Davis, Russell
1991-01-01
This paper describes the importance of considering computer security as part of software quality assurance practice. The intended audience is primarily those professionals involved in the design, development, and quality assurance of software. Many issues are raised which point to the need ultimately for integration of quality assurance and computer security disciplines. To address some of the issues raised, the NASA Automated Information Security program is presented as a model which may be used for improving interactions between the quality assurance and computer security community of professionals.
Sun-Burned: Space Weather's Impact on United States National Security
NASA Astrophysics Data System (ADS)
Stebbins, B.
2014-12-01
The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.
Code of Federal Regulations, 2014 CFR
2014-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2011 CFR
2011-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2012 CFR
2012-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Code of Federal Regulations, 2013 CFR
2013-01-01
...; guidelines for obligations issued for university and housing purposes. (a) Investment quality. An obligation issued for housing, university, or dormitory purposes is a Type II security only if it: (1) Qualifies as... issued for university and housing purposes. 1.130 Section 1.130 Banks and Banking COMPTROLLER OF THE...
Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.
Latif, Rabia; Abbas, Haider; Assar, Saïd
2014-11-01
Wireless Body Area Networks (WBANs) have emerged as a promising technology that has shown enormous potential in improving the quality of healthcare, and has thus found a broad range of medical applications from ubiquitous health monitoring to emergency medical response systems. The huge amount of highly sensitive data collected and generated by WBAN nodes requires an ascendable and secure storage and processing infrastructure. Given the limited resources of WBAN nodes for storage and processing, the integration of WBANs and cloud computing may provide a powerful solution. However, despite the benefits of cloud-assisted WBAN, several security issues and challenges remain. Among these, data availability is the most nagging security issue. The most serious threat to data availability is a distributed denial of service (DDoS) attack that directly affects the all-time availability of a patient's data. The existing solutions for standalone WBANs and sensor networks are not applicable in the cloud. The purpose of this review paper is to identify the most threatening types of DDoS attacks affecting the availability of a cloud-assisted WBAN and review the state-of-the-art detection mechanisms for the identified DDoS attacks.
NASA Astrophysics Data System (ADS)
Liu, Shu-Fan; Chueh, Hao-En; Liao, Kuo-Hsiung
According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.
DOD Security Cooperation: An Overview of Authorities and Issues
2016-08-23
Cooperation: An Overview of Authorities and Issues Congressional Research Service 13 DOD funds six Regional Centers for Security Studies , which...Expenses Necessary for Theater Security Cooperation.” Another Senate proposal would revamp DOD’s five regional centers for security studies (10 U.S.C...184) by eliminating two that are located in Washington, DC (the Africa Center for Strategic Studies and the Near East South Asia Center for Strategic
Carr, Zhanat
2010-06-01
In response to the changing global environment and emerging new issues related to health security, the World Health Organization (WHO) is putting in place new tools for collective defense, such as the revised International Health Regulations (IHR) (2005). The new framework puts additional responsibilities on both Member States and WHO itself in order to effectively implement the IHR (2005) and react effectively in case of public health emergency events of any nature. Since its establishment in 1987, the Radiation Emergency Medical Preparedness and Assistance Network of WHO (WHO-REMPAN) has become an important asset for the organization's capacity to respond to radiation emergencies and to assist its Member States to strengthen their own response capacities. The paper describes in detail the framework for the WHO's role in preparedness and response to radiation emergencies, including Emergency Conventions and IHR (2005), and how the WHO-REMPAN, through its activities (i.e., technical guidelines development, training, education, research, and information sharing), provides a significant contribution to the organization's program of work towards achievement of the global health security goal.
[Case study: school meals' management in Santiago de Cali and Bogota].
Díaz, Mónica del Pilar; Montoya, Iván A; Montoya, Luz A
2011-10-01
This research was aimed at ascertaining the state's role regarding hunger and how it manages to combat this matter; a food security program in two Colombian cities was thus assessed (i.e. school meals' provision in Cali and Bogota). A qualitative approach was adopted; documentary analysis, participant observation and in-depth interviews with various actors for both selected cases were used as data collection techniques. It was found that several measures taken in this area were not covered by regulatory principles aimed at covering all the dimensions of food security. Serious weaknesses in school meals' management in Cali were associated with a weak environment regarding the fight against hunger. School meals' management in Bogotá was aimed at recognizing the right to food as being supported by an institutional process where the issue of reducing hunger has become a firm purpose. School meals' program management was associated with the characteristics of its product, thereby affecting the program and the population's food and nutritional status; state management thus becomes another dimension of food security.
NASA Astrophysics Data System (ADS)
Gunda, T.; Hornberger, G. M.
2017-12-01
Concerns over water resources have evolved over time, from physical availability to economic access and recently, to a more comprehensive study of "water security," which is inherently interdisciplinary because a secure water system is influenced by and affects both physical and social components. The concept of water security carries connotations of both an adequate supply of water as well as water that meets certain quality standards. Although the term "water security" has many interpretations in the literature, the research field has not yet developed a synthetic analysis of water security as both a quantity (availability) and quality (contamination) issue. Using qualitative comparative and multi-regression analyses, we evaluate the primary physical and social factors influencing U.S. states' water security from a quantity perspective and from a quality perspective. Water system characteristics are collated from academic and government sources and include access/use, governance, and sociodemographic, and ecosystem metrics. Our analysis indicates differences in variables driving availability and contamination concerns; for example, climate is a more significant determinant in water quantity-based security analyses than in water quality-based security analyses. We will also discuss coevolution of system traits and the merits of constructing a robust water security index based on the relative importance of metrics from our analyses. These insights will improve understanding of the complex interactions between quantity and quality aspects and thus, overall security of water systems.
Code of Federal Regulations, 2010 CFR
2010-04-01
... positions in the specific security issue: (1) Cash/immediate net settled positions; (2) Net when-issued... appropriate for monitoring the impact of concentrations of positions in Treasury securities. (h) “Reportable...
Comment on "Dynamic quantum secret sharing"
NASA Astrophysics Data System (ADS)
Liao, Ci-Hong; Yang, Chun-Wei; Hwang, Tzonelish
2013-10-01
Hsu et al. (Quantum Inf Process 12:331-344,2013) proposed a dynamic quantum secret sharing (DQSS) protocol using the entanglement swapping of Bell states for an agent to easily join (or leave) the system. In 2013, Wang and Li (Quantum Inf Process 12(5):1991-1997, 2013) proposed a collusion attack on Hsu et al.'s DQSS protocol. Nevertheless, this study points out a new security issue on Hsu et al.'s DQSS protocol regarding to the honesty of a revoked agent. Without considering this issue, the DQSS protocol could be failed to provide secret sharing function.
A Semantic Based Policy Management Framework for Cloud Computing Environments
ERIC Educational Resources Information Center
Takabi, Hassan
2013-01-01
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Code of Federal Regulations, 2010 CFR
2010-01-01
... is important to note that a mutual fund or employee benefit plan that is diversified for purposes of... 3(3) of the Employee Retirement Income Security Act of 1974, 29 U.S.C. 1002(3), and that has more... means a person who issues or proposes to issue any security, or has any outstanding security which it...
Reviews on Security Issues and Challenges in Cloud Computing
NASA Astrophysics Data System (ADS)
An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.
2016-11-01
Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.
Public Health in Serbia through the Lens of Security: A Review Article
ROKVIĆ, Vanja; JEFTIĆ, Zoran; AJZENHAMER, Vladimir
2016-01-01
Background: In recent years, the concept of health security has received an international dimension. However, despite evident links between health and security the concept of health security is not used in either academic or political discourse in Serbia. It comes as no surprise then that even though the issue of security challenges is present in Serbian legislation, it has not been incorporated into the National Security Strategy, by which health threats would be recognized as one of contemporary security priorities. Methods: The method applied is descriptive and analytical, in keeping with social studies research methodology and the aims of this study. Results: The 20th and the 21st century in Serbia have both been marked by events indicating a clear link between health and security. The most telling example of this connection is the events of the 1990s, namely civil wars, sanctions and the NATO bombing. The results of our research show that poor health conditions, an increasing number of reemerging diseases and pandemics of new diseases can have serious implications for the functioning of the state and devastating consequences for its population. What is most at risk are people’s lives, capability for work, the entire economy and the capacities of the army and overall national security. Conclusion: The results of this study indicate an inextricable link between health and security and the necessity of viewing health through the lens of health security and incorporating it as such into the National Security Strategy. PMID:27957458
Public Health in Serbia through the Lens of Security: A Review Article.
Rokvić, Vanja; Jeftić, Zoran; Ajzenhamer, Vladimir
2016-09-01
In recent years, the concept of health security has received an international dimension. However, despite evident links between health and security the concept of health security is not used in either academic or political discourse in Serbia. It comes as no surprise then that even though the issue of security challenges is present in Serbian legislation, it has not been incorporated into the National Security Strategy, by which health threats would be recognized as one of contemporary security priorities. The method applied is descriptive and analytical, in keeping with social studies research methodology and the aims of this study. The 20 th and the 21 st century in Serbia have both been marked by events indicating a clear link between health and security. The most telling example of this connection is the events of the 1990s, namely civil wars, sanctions and the NATO bombing. The results of our research show that poor health conditions, an increasing number of reemerging diseases and pandemics of new diseases can have serious implications for the functioning of the state and devastating consequences for its population. What is most at risk are people's lives, capability for work, the entire economy and the capacities of the army and overall national security. The results of this study indicate an inextricable link between health and security and the necessity of viewing health through the lens of health security and incorporating it as such into the National Security Strategy.
Smart Grid Communications Security Project, U.S. Department of Energy
DOE Office of Scientific and Technical Information (OSTI.GOV)
Barnes, Frank
There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) Thismore » report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.« less
Secure Access Control and Large Scale Robust Representation for Online Multimedia Event Detection
Liu, Changyu; Li, Huiling
2014-01-01
We developed an online multimedia event detection (MED) system. However, there are a secure access control issue and a large scale robust representation issue when we want to integrate traditional event detection algorithms into the online environment. For the first issue, we proposed a tree proxy-based and service-oriented access control (TPSAC) model based on the traditional role based access control model. Verification experiments were conducted on the CloudSim simulation platform, and the results showed that the TPSAC model is suitable for the access control of dynamic online environments. For the second issue, inspired by the object-bank scene descriptor, we proposed a 1000-object-bank (1000OBK) event descriptor. Feature vectors of the 1000OBK were extracted from response pyramids of 1000 generic object detectors which were trained on standard annotated image datasets, such as the ImageNet dataset. A spatial bag of words tiling approach was then adopted to encode these feature vectors for bridging the gap between the objects and events. Furthermore, we performed experiments in the context of event classification on the challenging TRECVID MED 2012 dataset, and the results showed that the robust 1000OBK event descriptor outperforms the state-of-the-art approaches. PMID:25147840
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2010 CFR
2010-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2010-04-01 2010-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2014 CFR
2014-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2014-04-01 2014-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2011 CFR
2011-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2011-04-01 2011-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2012 CFR
2012-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2012-04-01 2012-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
17 CFR 3.63 - Service of order issued by an Administrative Law Judge or the Commission.
Code of Federal Regulations, 2013 CFR
2013-04-01
... order issued by an Administrative Law Judge or the Commission. A copy of any order issued pursuant to... 17 Commodity and Securities Exchanges 1 2013-04-01 2013-04-01 false Service of order issued by an Administrative Law Judge or the Commission. 3.63 Section 3.63 Commodity and Securities Exchanges COMMODITY...
Deaths in the Desert: The Human Rights Crisis on the U.S.--Mexico Border
ERIC Educational Resources Information Center
Androff, David K.; Tavassoli, Kyoko Y.
2012-01-01
Many would acknowledge that immigration is a major issue in the United States and that immigration reform should be a priority. However, there is little attention to the human rights crisis on the U.S.-Mexican border. As a result of tightened border security since 1994, it is estimated that over 5,000 migrants have died in the Sonoran desert. The…
ERIC Educational Resources Information Center
Ai, Amy L.; Carrigan, Lynn T.
2007-01-01
Cardiovascular disease (CVD) is on the rise in the aging population of the United States. Heart disease is the leading cause of death, hospital bed use, and social security disability. Enhancing knowledge about CVD may improve social work's professional role in the health care system. This article focuses on a pressing CVD-related issue that needs…
International Food Aid Programs: Background and Issues
2010-02-03
D. Ho Analyst in Agricultural Policy Charles E. Hanrahan Senior Specialist in Agricultural Policy February 3, 2010 Congressional Research Service...U.S. Treasury. 10 In United States agricultural policy , “monetization” is a P.L. 480 provision (Section 203) first included in the Food Security Act...Contact Information Melissa D. Ho Analyst in Agricultural Policy mho@crs.loc.gov, 7-5342 Charles E. Hanrahan Senior Specialist in Agricultural
Homeland Security Lessons for the United States
2004-06-01
international standard for AML / CFT practices is set by the forty Recommendations of the Financial Action Task Force, or FATF, an inter-governmental...to foster sound AML / CFT practices. Singapore has a strong tradition for rigorous supervision of financial institutions. The two aspects of this...supervisory process with regards to AML / CFT are: issuing detailed guidelines to financial institutions, setting out their obligations with respect to
Measuring Stability and Security in Iraq
2009-12-01
tackle the country’s corruption problem. The KRG recently issued a white paper outlining elements of a new strategy for good gover - nance, in part to...Iraq. The State Board of Tourism (SBT) hosted several tourist groups during this reporting 16 January 29, 2010 period. This year Iraq will...coordi- nated tours for the first American tourism company, Advantage Travel and Tours. Additionally, 27 signed investment licenses totaling $2
Southwest Border Violence: Issues in Identifying and Measuring Spillover Violence
2010-08-24
Spillover Violence Kristin M. Finklea, Coordinator Analyst in Domestic Security Jennifer E. Lake Section Research Manager Celinda Franco...States, Mexican DTOs have formed relationships with U.S. street gangs, prison gangs, and outlaw motorcycle gangs.36 Although these gangs have historically... motorcycle gangs who distribute and sell drugs, aid in smuggling drugs, and enforce the collection of drug proceeds.56 To date, reports from law
Making the Merida Initiative Work
2012-03-14
crack down on Mexican drug cartels through enhanced border security. The plan calls for additional personnel, increased intelligence capability and...Pentagon official.35 William Wechsler , Deputy Assistant Secretary of Defense for Counter-narcotics and Global Threats, testified to the Senate Armed...indirect support to units of the Mexican armed forces with counter-narco terrorism missions‖.36 Wechsler also stated, this is an emerging issue for DoD
2007-04-12
Hausa-Fulani, the southwestern Yoruba , and the southeastern Ibo have traditionally been the most politically active and dominant. Almost half of the...Adamawa State in the January elections, was chosen by the PDP as the running mate of Obasanjo, a Yoruba from southwestern Nigeria. The APP and AD...nominated Chief Olu Falae, a Yoruba , as their joint candidate for president. A former Nigerian security chief and a northerner, Chief Umaru Shinakfi, was
Russian Political, Economic, and Security Issues and U.S. Interests
2007-01-18
polonium 210 from Moscow, through Germany, to London, apparently carried by one of the Russians Litvinenko met November 1. Russian authorities deny...radio under tight state control and virtually eliminated effective political opposition. Federal forces have suppressed large-scale military resistance...Russia’s needs — food and food processing, oil and gas extraction technology, computers, communications, transportation, and investment capital — are
2010-09-01
the proposed NSI implementation (PM-ISE, 2008). The ISE reported, in October 2009, that the Los Angeles Police Department ( LAPD ) ISE...position of the Department of Defense or the U.S. Government. IRB Protocol number ________________. 12a. DISTRIBUTION / AVAILABILITY STATEMENT...critical, priority issue for all levels of government. The consensus of all three categories of literature was that government information sharing
1992-06-01
Boards) Security, Privacy, and Freedom of Speech Issues 4.1.2 Understand the relationships between information processing and collection and...to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) Security, Privacy, and Freedom of Speech Issues 69 4.1.3 Understand the...Communication one-to-one (e-mail) °o° one-to-many (Mailing and discussion Lists) ... Many-to-Many (Bulletin Boards) oo Security, Privacy, and Freedom of Speech Issues
Family Economic Security Policies and Child and Family Health.
Spencer, Rachael A; Komro, Kelli A
2017-03-01
In this review, we examine the effects of family economic security policies (i.e., minimum wage, earned income tax credit, unemployment insurance, Temporary Assistance to Needy Families) on child and family health outcomes, summarize policy generosity across states in the USA, and discuss directions and possibilities for future research. This manuscript is an update to a review article that was published in 2014. Millions of Americans are affected by family economic security policies each year, many of whom are the most vulnerable in society. There is increasing evidence that these policies impact health outcomes and behaviors of adults and children. Further, research indicates that, overall, policies which are more restrictive are associated with poorer health behaviors and outcomes; however, the strength of the evidence differs across each of the four policies. There is significant diversity in state-level policies, and it is plausible that these policy variations are contributing to health disparities across and within states. Despite increasing evidence of the relationship between economic policies and health, there continues to be limited attention to this issue. State policy variations offer a valuable opportunity for scientists to conduct natural experiments and contribute to evidence linking social policy effects to family and child well-being. The mounting evidence will help to guide future research and policy making for evolving toward a more nurturing society for family and child health and well-being.
Family Economic Security Policies and Child and Family Health
Spencer, Rachael A.; Komro, Kelli A.
2017-01-01
In this review we examine the effects of family economic security policies (i.e., minimum wage, Earned Income Tax Credit, unemployment insurance, Temporary Assistance to Needy Families) on child and family health outcomes, summarize policy generosity across states in the U.S., and discuss directions and possibilities for future research. This manuscript is an update to a review article that was published in 2014. Millions of Americans are affected by family economic security policies each year, many of whom are the most vulnerable in society. There is increasing evidence that these policies impact health outcomes and behaviors of adults and children. Further, research indicates that, overall, policies which are more restrictive are associated with poorer health behaviors and outcomes; however, the strength of the evidence differs across each of the four policies. There is significant diversity in state-level policies and it is plausible that these policy variations are contributing to health disparities across and within states. Despite increasing evidence of the relationship between economic policies and health, there continues to be limited attention to this issue. State policy variations offer a valuable opportunity for scientists to conduct natural experiments and contribute to evidence linking social policy effects to family and child wellbeing. The mounting evidence will help to guide future research and policy making for evolving toward a more nurturing society for family and child health and wellbeing. PMID:28176020
Administrator Highlights U.S.-Georgian Nuclear Security Cooperation in Tbilisi
Thomas D'Agostino
2017-12-09
NNSA Administrator Thomas D'Agostino highlighted the strong U.S.-Georgian cooperation on nuclear security issues during a day-long visit to the Republic of Georgia in mid-June. He briefed the media at availability at the Tbilisi airport. In April 2009, President Obama outlined an ambitious agenda to secure vulnerable nuclear material around the world within four years, calling the danger of a terrorist acquiring nuclear weapons "the most immediate and extreme threat to global security." In this year's State of the Union, he called the threat of nuclear weapons, "the greatest danger to the American people." In order to meet that challenge, the President's FY2011 Budget Request includes close to $2.7 billion for the National Nuclear Security Administration's Defense Nuclear Nonproliferation program -- an increase of 25.7 percent over FY2010. Included in that request is NNSA's Second Line of Defense (SLD) program, which works around the world to strengthen the capability of foreign governments to deter, detect, and interdict illicit trafficking in nuclear and other radioactive materials across international borders and through the global maritime shipping system.
Administrator Highlights U.S.-Georgian Nuclear Security Cooperation in Tbilisi
DOE Office of Scientific and Technical Information (OSTI.GOV)
Thomas D'Agostino
2010-07-16
NNSA Administrator Thomas D'Agostino highlighted the strong U.S.-Georgian cooperation on nuclear security issues during a day-long visit to the Republic of Georgia in mid-June. He briefed the media at availability at the Tbilisi airport. In April 2009, President Obama outlined an ambitious agenda to secure vulnerable nuclear material around the world within four years, calling the danger of a terrorist acquiring nuclear weapons "the most immediate and extreme threat to global security." In this year's State of the Union, he called the threat of nuclear weapons, "the greatest danger to the American people." In order to meet that challenge, themore » President's FY2011 Budget Request includes close to $2.7 billion for the National Nuclear Security Administration's Defense Nuclear Nonproliferation program -- an increase of 25.7 percent over FY2010. Included in that request is NNSA's Second Line of Defense (SLD) program, which works around the world to strengthen the capability of foreign governments to deter, detect, and interdict illicit trafficking in nuclear and other radioactive materials across international borders and through the global maritime shipping system.« less
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2014 CFR
2014-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2011 CFR
2011-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2012 CFR
2012-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
49 CFR 1542.303 - Security Directives and Information Circulars.
Code of Federal Regulations, 2013 CFR
2013-10-01
...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRPORT SECURITY... Information Circular to notify airport operators of security concerns. When TSA determines that additional... aviation, TSA issues a Security Directive setting forth mandatory measures. (b) Each airport operator must...
ERIC Educational Resources Information Center
Nilsen, Sigurd R.
Coordination between Temporary Assistance for Needy Families (TANF)-related programs and Workforce Investment Act of 1998 (WIA)'s one-stop centers increased since spring 2000, when WIA was first implemented. Nearly all states reported some coordination between the programs at either the state or the local level. Most often, coordination took one…
ERIC Educational Resources Information Center
Nilsen, Sigurd R.
The General Accounting Office assessed the extent to which states were coordinating their Temporary Assistance for Needy Families (TANF) services with their one-stop centers. Data were gathered through the following activities: (1) an autumn 2001 survey of workforce development agency officials in all 50 states and a similar survey conducted in…
ERIC Educational Resources Information Center
General Accounting Office, Washington, DC. Health, Education, and Human Services Div.
Research on effectiveness of welfare-to-work approaches shows programs that combine approaches--job search assistance and education and training--have better employment and earnings outcomes than either approach alone. Consistent with findings and the work focus of the Personal Responsibility and Work Opportunity Reconciliation Act, states have…
Effect of source tampering in the security of quantum cryptography
NASA Astrophysics Data System (ADS)
Sun, Shi-Hai; Xu, Feihu; Jiang, Mu-Sheng; Ma, Xiang-Chun; Lo, Hoi-Kwong; Liang, Lin-Mei
2015-08-01
The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV) quantum communication protocols (e.g., QKD, quantum coin tossing, weak-coherent-state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.
Study on Cloud Security Based on Trust Spanning Tree Protocol
NASA Astrophysics Data System (ADS)
Lai, Yingxu; Liu, Zenghui; Pan, Qiuyue; Liu, Jing
2015-09-01
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
Code of Federal Regulations, 2011 CFR
2011-04-01
... 17 Commodity and Securities Exchanges 2 2011-04-01 2011-04-01 false Financial statements of affiliates whose securities collateralize an issue registered or being registered. 210.3-16 Section 210.3-16... constitute a substantial portion of collateral if the aggregate principal amount, par value, or book value of...
Code of Federal Regulations, 2010 CFR
2010-04-01
... Electrification Administration. (a) Exemption. Any public utility company which is a subsidiary company of a... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of public utility subsidiaries as to certain securities issued to the Rural Electrification Administration. 250.47 Section 250.47...
ERIC Educational Resources Information Center
Schultz, Christopher
2012-01-01
Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…
Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria
ERIC Educational Resources Information Center
Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel
2013-01-01
Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2013 CFR
2013-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2010 CFR
2010-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2011 CFR
2011-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2014 CFR
2014-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
31 CFR 306.25 - Presentation and surrender.
Code of Federal Regulations, 2012 CFR
2012-07-01
... satisfactory proof of ownership. (Form PD 1071 may be used.) A security shall be considered to be overdue after the lapse of the following periods of time from its face maturity: (1) One month for securities issued for a term of 1 year or less. (2) Three months for securities issued for a term of more than 1 year...
Code of Federal Regulations, 2010 CFR
2010-04-01
... to certain employee benefit plans. 230.416 Section 230.416 Commodity and Securities Exchanges... provisions and interests to be issued pursuant to certain employee benefit plans. (a) If a registration... pursuant to an employee benefit plan, including interests in such plan that constitute separate securities...
Making Our Buildings Safer: Security Management and Equipment Issues.
ERIC Educational Resources Information Center
Clark, James H.
1997-01-01
Discusses three major components of library security: physical security of the environment; operating procedures for library staff, the public, and security personnel; and a contract security force (or campus security in academic institutions.) Topics include risk management; maintenance; appropriate technology, including security systems and…
Global Health and Foreign Policy
Feldbaum, Harley; Lee, Kelley; Michaud, Joshua
2010-01-01
Health has long been intertwined with the foreign policies of states. In recent years, however, global health issues have risen to the highest levels of international politics and have become accepted as legitimate issues in foreign policy. This elevated political priority is in many ways a welcome development for proponents of global health, and it has resulted in increased funding for and attention to select global health issues. However, there has been less examination of the tensions that characterize the relationship between global health and foreign policy and of the potential effects of linking global health efforts with the foreign-policy interests of states. In this paper, the authors review the relationship between global health and foreign policy by examining the roles of health across 4 major components of foreign policy: aid, trade, diplomacy, and national security. For each of these aspects of foreign policy, the authors review current and historical issues and discuss how foreign-policy interests have aided or impeded global health efforts. The increasing relevance of global health to foreign policy holds both opportunities and dangers for global efforts to improve health. PMID:20423936
Global health and foreign policy.
Feldbaum, Harley; Lee, Kelley; Michaud, Joshua
2010-01-01
Health has long been intertwined with the foreign policies of states. In recent years, however, global health issues have risen to the highest levels of international politics and have become accepted as legitimate issues in foreign policy. This elevated political priority is in many ways a welcome development for proponents of global health, and it has resulted in increased funding for and attention to select global health issues. However, there has been less examination of the tensions that characterize the relationship between global health and foreign policy and of the potential effects of linking global health efforts with the foreign-policy interests of states. In this paper, the authors review the relationship between global health and foreign policy by examining the roles of health across 4 major components of foreign policy: aid, trade, diplomacy, and national security. For each of these aspects of foreign policy, the authors review current and historical issues and discuss how foreign-policy interests have aided or impeded global health efforts. The increasing relevance of global health to foreign policy holds both opportunities and dangers for global efforts to improve health.
Boulos, Maged N Kamel; Curtis, Andrew J; Abdelmalik, Philip
2009-07-20
This paper offers a state-of-the-art overview of the intertwined privacy, confidentiality, and security issues that are commonly encountered in health research involving disaggregate geographic data about individuals. Key definitions are provided, along with some examples of actual and potential security and confidentiality breaches and related incidents that captured mainstream media and public interest in recent months and years. The paper then goes on to present a brief survey of the research literature on location privacy/confidentiality concerns and on privacy-preserving solutions in conventional health research and beyond, touching on the emerging privacy issues associated with online consumer geoinformatics and location-based services. The 'missing ring' (in many treatments of the topic) of data security is also discussed. Personal information and privacy legislations in two countries, Canada and the UK, are covered, as well as some examples of recent research projects and events about the subject. Select highlights from a June 2009 URISA (Urban and Regional Information Systems Association) workshop entitled 'Protecting Privacy and Confidentiality of Geographic Data in Health Research' are then presented. The paper concludes by briefly charting the complexity of the domain and the many challenges associated with it, and proposing a novel, 'one stop shop' case-based reasoning framework to streamline the provision of clear and individualised guidance for the design and approval of new research projects (involving geographical identifiers about individuals), including crisp recommendations on which specific privacy-preserving solutions and approaches would be suitable in each case.
Boulos, Maged N Kamel; Curtis, Andrew J; AbdelMalik, Philip
2009-01-01
This paper offers a state-of-the-art overview of the intertwined privacy, confidentiality, and security issues that are commonly encountered in health research involving disaggregate geographic data about individuals. Key definitions are provided, along with some examples of actual and potential security and confidentiality breaches and related incidents that captured mainstream media and public interest in recent months and years. The paper then goes on to present a brief survey of the research literature on location privacy/confidentiality concerns and on privacy-preserving solutions in conventional health research and beyond, touching on the emerging privacy issues associated with online consumer geoinformatics and location-based services. The 'missing ring' (in many treatments of the topic) of data security is also discussed. Personal information and privacy legislations in two countries, Canada and the UK, are covered, as well as some examples of recent research projects and events about the subject. Select highlights from a June 2009 URISA (Urban and Regional Information Systems Association) workshop entitled 'Protecting Privacy and Confidentiality of Geographic Data in Health Research' are then presented. The paper concludes by briefly charting the complexity of the domain and the many challenges associated with it, and proposing a novel, 'one stop shop' case-based reasoning framework to streamline the provision of clear and individualised guidance for the design and approval of new research projects (involving geographical identifiers about individuals), including crisp recommendations on which specific privacy-preserving solutions and approaches would be suitable in each case. PMID:19619311
Public perspectives on nuclear security. US national security surveys, 1993--1997
DOE Office of Scientific and Technical Information (OSTI.GOV)
Herron, K.G.; Jenkins-Smith, H.C.
This is the third report in a series of studies to examine how US attitudes about nuclear security are evolving in the post-Cold War era and to identify trends in public perceptions and preferences relevant to the evolution of US nuclear security policy. It presents findings from three surveys: a nationwide telephone survey of randomly selected members of the US general public; a written survey of randomly selected members of American Men and Women of Science; and a written survey of randomly selected state legislators from all fifty US states. Key areas of investigation included nuclear security, cooperation between USmore » and Russian scientists about nuclear issues, vulnerabilities of critical US infrastructures and responsibilities for their protection, and broad areas of US national science policy. While international and US national security were seen to be slowly improving, the primary nuclear threat to the US was perceived to have shifted from Russia to China. Support was found for nuclear arms control measures, including mutual reductions in stockpiles. However, respondents were pessimistic about eliminating nuclear armaments, and nuclear deterrence continued to be highly values. Participants favored decreasing funding f/or developing and testing new nuclear weapons, but supported increased investments in nuclear weapons infrastructure. Strong concerns were expressed about nuclear proliferation and the potential for nuclear terrorism. Support was evident for US scientific cooperation with Russia to strengthen security of Russian nuclear assets. Elite and general public perceptions of external and domestic nuclear weapons risks and external and domestic nuclear weapons benefits were statistically significantly related to nuclear weapons policy options and investment preferences. Demographic variables and individual belief systems were systematically related both to risk and benefit perceptions and to policy and spending preferences.« less
Hearn,, Paul P.
2009-01-01
Federal, State, and local government agencies in the United States face a broad range of issues on a daily basis. Among these are natural hazard mitigation, homeland security, emergency response, economic and community development, water supply, and health and safety services. The U.S. Geological Survey (USGS) helps decision makers address these issues by providing natural hazard assessments, information on energy, mineral, water and biological resources, maps, and other geospatial information. Increasingly, decision makers at all levels are challenged not by the lack of information, but by the absence of effective tools to synthesize the large volume of data available, and to utilize the data to frame policy options in a straightforward and understandable manner. While geographic information system (GIS) technology has been widely applied to this end, systems with the necessary analytical power have been usable only by trained operators. The USGS is addressing the need for more accessible, manageable data tools by developing a suite of Web-based geospatial applications that will incorporate USGS and cooperating partner data into the decision making process for a variety of critical issues. Examples of Web-based geospatial tools being used to address societal issues follow.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-10-02
... Collection Surrounding the Sale and Issue of Marketable Book-Entry Securities ACTION: Notice and request for... Department of the Treasury is soliciting comments concerning the Sale and Issue of Marketable Book-Entry... Marketable Book-Entry Securities. OMB Number: 1535-0112. Abstract: The information is requested to ensure...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.5 Section 320.5... SECURITIES Pass-Through Type Securities § 320.5 Securities. (a) Instruments. Securities issued pursuant to the provisions of this subpart must be modified pass-through securities, that provide for payment...
Stranded cost securitization: Analytical considerations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Abbott, S.
1997-10-01
Securitization is a promising financing approach by which utilities may recover their stranded costs while lowering their cost of capital, permitting them to offer rate reductions to customers. However, there are important issues to analyze before determining that securitization will be an attractive option for bondholders. To facilitate the transition to a competitive electric market, numerous state legislatures have passed or are considering legislation that, while mandating competition, allows utilities to recover their stranded costs through the imposition of a competitive transition fee. To accommodate securitization of revenues from the fees, statutes typically designate as a property right the futuremore » revenues from these fees and the utility may sell, assign, or transfer the rights to a financing vehicle. Securities may be issued by a trust or other special purpose vehicle supported by future revenues from these fees. Because of the unique characteristics of the highly regulated utility industry and the {open_quotes}asset{close_quotes} that is securitized, the credit analysis of stranded cost securities differs from that of most other assets. For example, underwriting and servicing issues, which are key items of interest in other segments of the ABS market, are less of a concern in a stranded cost context.« less
Security architecture for health grid using ambient intelligence.
Naqvi, S; Riguidel, M; Demeure, I
2005-01-01
To propose a novel approach of incorporating ambient intelligence in the health grid security architecture. Security concerns are severely impeding the grid community effort in spreading its wings in health applications. In this paper, we have proposed a high level approach to incorporate ambient intelligence for health grid security architecture and have argued that this will significantly improve the current state of the grid security paradigm with an enhanced user-friendly environment. We believe that the time is right to shift the onus of traditional security mechanisms onto the new technologies. The incorporation of ambient intelligence in the security architecture of a grid will not only render a security paradigm robust but also provide an attractive vision for the future of computing by bringing the two worlds together. In this article we propose an evolutionary approach of utilizing smart devices for grid security architecture. We argue that such an infrastructure will impart unique features to the existing grid security paradigms by offering fortified and relentless monitoring. This new security architecture will be comprehensive in nature but will not be cumbersome for the users due to its typical characteristics of not prying into their lives and adapting to their needs. We have identified a new paradigm of the security architecture for a health grid that will not only render a security mechanism robust but will also provide the high levels of user-friendliness. As our approach is a first contribution to this problem, a number of other issues for future research remain open. However, the prospects are fascinating.
NASA Technical Reports Server (NTRS)
Goseva-Popstojanova, Katerina; Tyo, Jacob
2017-01-01
While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.
Ko, Heasin; Choi, Byung-Seok; Choe, Joong-Seon; Kim, Kap-Joong; Kim, Jong-Hoi; Youn, Chun Ju
2017-08-21
Most polarization-based BB84 quantum key distribution (QKD) systems utilize multiple lasers to generate one of four polarization quantum states randomly. However, random bit generation with multiple lasers can potentially open critical side channels that significantly endangers the security of QKD systems. In this paper, we show unnoticed side channels of temporal disparity and intensity fluctuation, which possibly exist in the operation of multiple semiconductor laser diodes. Experimental results show that the side channels can enormously degrade security performance of QKD systems. An important system issue for the improvement of quantum bit error rate (QBER) related with laser driving condition is further addressed with experimental results.
Addressing the Economic Security Issues Facing Same-Sex Couples.
ERIC Educational Resources Information Center
Dolan, Elizabeth M.; Stum, Marlene S.; Rupured, Michael
1999-01-01
Provides educators and researchers with an awareness of the financial security issues faced by same-sex couples and offers suggestions for incorporating the discussion of these ideas into existing curricula and research. (Author/JOW)
Security Encryption Scheme for Communication of Web Based Control Systems
NASA Astrophysics Data System (ADS)
Robles, Rosslin John; Kim, Tai-Hoon
A control system is a device or set of devices to manage, command, direct or regulate the behavior of other devices or systems. The trend in most systems is that they are connected through the Internet. Traditional Supervisory Control and Data Acquisition Systems (SCADA) is connected only in a limited private network Since the internet Supervisory Control and Data Acquisition Systems (SCADA) facility has brought a lot of advantages in terms of control, data viewing and generation. Along with these advantages, are security issues regarding web SCADA, operators are pushed to connect Control Systems through the internet. Because of this, many issues regarding security surfaced. In this paper, we discuss web SCADA and the issues regarding security. As a countermeasure, a web SCADA security solution using crossed-crypto-scheme is proposed to be used in the communication of SCADA components.
Choices in International Conflict: With a Focus on Security Issues in Asia.
ERIC Educational Resources Information Center
Francis, Gregory; Mukai, Gary; Kim, Pearl; Leininger, James
Many world leaders and scholars feel that the U.S.-Japan Security Alliance is essential for long-term peace, prosperity, and stability in Asia. The purpose of this curriculum unit is to examine this alliance by introducing students to case studies of international conflict, with a focus on security issues in Asia. Through each of the lessons…
Federal Register 2010, 2011, 2012, 2013, 2014
2010-08-18
... Policy, Department of Homeland Security, Washington, DC 20528. For privacy issues please contact: Mary...;Prices of new books are listed in the first FEDERAL REGISTER issue of each #0;week. #0; #0; #0; #0;#0...] Privacy Act of 1974: Implementation of Exemptions; Department of Homeland Security/ALL--027 The History of...
Code of Federal Regulations, 2014 CFR
2014-04-01
... 24 Housing and Urban Development 2 2014-04-01 2014-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2011 CFR
2011-04-01
... 24 Housing and Urban Development 2 2011-04-01 2011-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2013 CFR
2013-04-01
... 24 Housing and Urban Development 2 2013-04-01 2013-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2012 CFR
2012-04-01
... 24 Housing and Urban Development 2 2012-04-01 2012-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Code of Federal Regulations, 2010 CFR
2010-04-01
... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Securities. 320.25 Section 320.25... SECURITIES Bond-Type Securities § 320.25 Securities. (a) Instruments. Securities to be issued pursuant to the provisions of this subpart B may be in registered or bearer form. Each security shall have terms acceptable...
Strategic Challenges during Changing Times: A Prioritized Research Program, 1994
1994-04-01
and planning. 14, SUBJECT T[RMS 15 NUMBER OF PAGES strategic assessments; domestic and global issues and 5 trends; peace operations; political...1994 or which, for a variety of reasons, will riot be published. 3 SECTION I TRANSREGIONAL SECURITY CONCERNS Regional Challenges, Global Issues . When...but global issues . Global security issues derive from three forms of connectivity. The first is economic. Today, there is truly a world economy. Markets
Climate Change Effects: Issues for International and US National Security
2009-07-01
impacts such as heat waves, major concerns are significant spreading of conditions for vector-borne diseases, such as dengue fever and malaria, and...U.S. national directives and strategic-level documents, and notable reports on specific climate change impacts or especially vulnerable regions ...add to tensions even in stable world regions . There is greater potential for failed states and political instability. Climate change acts as a
Unlocking Indian Maritime Strategy
2006-12-01
problems of sustaining security and stability. One of those issues was smuggling. Whether it be narcotics or small arms, India sought to curb its...olj/sa/sa_dec00kg01.html (Accessed July 2006). 71 The Indian economy at that time was less dependent upon external sources to sustain it and... sustain its economy. Survival interests are, self evidently, those that are critical to the existence of the government or nation-state. Threats
Securing Nuclear Materials: The 2012 Summit and Issues for Congress
2012-03-07
Republic of Korea, the Russian Federation, Saudi Arabia, Singapore, Switzerland, South Africa, Spain, Sweden, Thailand, Turkey , United Arab Emirates, the ...of the nuclear terrorism threat runs highest. In addition, the Russian Federation said it would be helping the United States prepare the groundwork...Minister Netanyahu. Press reports quote an Israeli official as saying that the Prime Minister decided not to attend due to concerns that Egypt or Turkey
CTC Sentinel. Volume 9, Issue 3
2016-03-01
International Terror Andrew Watkins 19 The Islamic State Threat to Britain: Evidence from Recent Terror Trials Raffaello Pantucci PROFILE 24 The Last...a new beachhead for fostering the Islamic State’s regional extremism.” Andrew Watkins explores why there may be a strong correlation between...offensive Andrew Watkins is an energy and security analyst for the Iraq Oil Report. He spent four years working as a senior lecturer at the American
Defense AR Journal. Volume 16, Number 2, Issue 51, July 2009
2009-07-01
and provides an economic theory for reviving this declining, but important industry. The fourth article by Dr. Roy Wood, “Program Manager as Chief...services (Avant, 2007). United States Naval War College Professor Larry McCabe observed that an economic aspect to the emergence of private security...and nonlinear relationships in managerial control. The methodology’s ability to model many diverse system components (e.g., work, people, money
Russian Political, Economic, and Security Issues and U.S. Interests
2008-08-26
concerns and on nuclear non-proliferation in general. Russia’s actions in Georgia, however, could be a turning point in U.S.-Russian relations...Russia’s actions also arouse anxiety in other Soviet successor states, especially those with large Russian minorities, such as Ukraine and Kazakhstan...transforming Yukos into a major global energy company. Khodorkovski criticized some of Putin’s actions , financed anti-Putin political parties, and hinted
Russian Political, Economic, and Security Issues and U.S. Interests
2008-10-06
concerns and on nuclear non-proliferation in general. Russia’s actions in Georgia, however, could be a turning point in U.S.-Russian relations. Russia’s... actions also arouse anxiety in other Soviet successor states, especially those with large Russian minorities, such as Ukraine and Kazakhstan...into a major global energy company. Khodorkovski criticized some of Putin’s actions , financed anti-Putin political parties, and hinted that he might
India-United States Security Cooperation: Past, Present, and Future
2011-12-16
IOR Indian Ocean Region ISI Inter-Services Intelligence JeM Jaish-e-Mohammad ix JTG Joint Technical Group LCA Light Combat Aircraft LeT...community’s senior expert who has written and consulted on issues ranging from terrorism to nuclear policy, political stability, and foreign relations... resulted in the happy situation of simultaneous expansion of relations with all the major powers, growing weight in Asia and the Indian Ocean regions
Central Asia’s Security: Issues and Implications for U.S. Interests
2010-03-11
assistance through regional and international organizations, including the World Bank, International Monetary Fund ( IMF ), Economic Community...attacks seemingly aimed against the government. One took place at the Oberon market in Bishkek in December 2002, one at a currency exchange outlet...of foreign currency entering the states as the result of foreign oil and natural gas investments, the low pay of most government bureaucrats, and
State Approaches Toward Reducing Youth Violence in Honduras and Nicaragua
2015-09-01
delinquency issues, through the implantation of domestic policies, security reforms, and social programs. This thesis will make use of statistical 13...Flow of U.S Deportations to Central America, DHS .......... 21 Table 3. Statistics of Central American National Police Forces, 2013. ........ 56 Table...Nacional de Estadística (National Statistics Institute) MIGOB Ministerio de Gobernación (Ministry of Interior) MS-13 Mara Salvatrucha NGO non
Brazil and the United States: Security Issues for the Twenty-First Century
2001-01-01
American continent. Its Atlantic Ocean coastline stretches for 4,600 miles. The country contains the bulk of the Amazon Basin with the largest...Paraguay, Bolivia, Peru , Columbia, Venezuela, Guyana, Suriname and French Guiana.[2] With the exception of Columbia, Brazil has cordial diplomatic...relations with its contiguous neighbors. Brazil’s Amazon jungle border with Columbia poses serious challenges from Columbia’s narcotics trade. Brazil
Private Security Contractors in Iraq and Afghanistan: Legal Issues
2009-12-22
Afghanistan: Background and Analysis, by Moshe Schwartz. 2 See James Risen and Mark Mazzetti, Blackwater Guards Tied to Secret C.I.A. Raids, NY...contractors, five Blackwater Worldwide employees under contract with the State Department were charged with manslaughter in connection with the 2007...at http://www.usdoj.gov/usao/law/news/wdl20081215.pdf. 125 Press Release, Department of Justice, Five Blackwater Employees Indicted on Manslaughter
2015-01-01
including suggestions for reducing this burden, to Washington Headquarters Services , Directorate for Information Operations and Reports, 1215 Jefferson...and DEVELOPMENT The United States Army War College educates and develops leaders for service at the strategic level while advancing knowledge in the...expert knowledge, and provides solutions to strategic Army issues affecting the national security community . The Peacekeeping and Stability Operations
Worldwide Report, Arms Control
1985-12-19
disarmament shows that the decisive factor in Soviet-U.S. relations remains the sphere of security, the core of which is the organically linked ...actiye in the United States for whom the very prospect of preconditions for curbing the arms race is patently not to their linking . Certain quarters in...distorting the essence of the issue of the organic link between preventing the mili- tarization of space and the reduction of nuclear arms on earth
Making US Soil Taxonomy more scientifically applicable to environmental and food security issues.
NASA Astrophysics Data System (ADS)
Monger, Curtis; Lindbo, David L.; Wysocki, Doug; Schoeneberger, Phil; Libohova, Zamir
2017-04-01
US Department of Agriculture began mapping soils in the 1890s on a county-by-county basis until most of the conterminous United States was mapped by the late 1930s. This first-generation mapping was followed by a second-generation that re-mapped the US beginning in the 1940s. Soil classification during these periods evolved into the current system of Soil Taxonomy which is based on (1) soil features as natural phenomena and on (2) soil properties important for agriculture and other land uses. While this system has enabled communication among soil surveyors, the scientific applicability of Soil Taxonomy to address environmental and food security issues has been under-utilized. In particular, little effort has been exerted to understand how soil taxa interact and function together as larger units—as soil systems. Thus, much soil-geomorphic understanding that could be applied to process-based modeling remains unexploited. The challenge for soil taxonomists in the United States and elsewhere is to expand their expertise and work with modelers to explore how soil taxa are linked to each other, how they influence water, nutrient, and pollutant flow through the landscape, how they interact with ecology, and how they change with human land use.
Building a strategic security organisation.
Howard, Mike
2016-01-01
In everyone's day-to-day jobs there is constant need to deal with current and newly detected matters. This is now a world of immediacy, driven by the cadence of the business and its needs. These concerns should not be ignored, as failing to deal with these issues would not bode well for the future. It is essential that the gears are kept spinning. The challenge for any security organisation is to identify its short-term tactical requirements, while developing longer-term strategic needs. Once done, the differences can be accounted for and strides can be made toward a desired future state. This paper highlights several steps that the author and his team have taken in their own journey. There is no magic answer, each organisation will have its own unique challenges. Nevertheless, some of the approaches to building a strategic security organisation described in this paper are applicable to all organisations, irrespective of their size.
Secure Remote Access Issues in a Control Center Environment
NASA Technical Reports Server (NTRS)
Pitts, Lee; McNair, Ann R. (Technical Monitor)
2002-01-01
The ISS finally reached an operational state and exists for local and remote users. Onboard payload systems are managed by the Huntsville Operations Support Center (HOSC). Users access HOSC systems by internet protocols in support of daily operations, preflight simulation, and test. In support of this diverse user community, a modem security architecture has been implemented. The architecture has evolved over time from an isolated but open system to a system which supports local and remote access to the ISS over broad geographic regions. This has been accomplished through the use of an evolved security strategy, PKI, and custom design. Through this paper, descriptions of the migration process and the lessons learned are presented. This will include product decision criteria, rationale, and the use of commodity products in the end architecture. This paper will also stress the need for interoperability of various products and the effects of seemingly insignificant details.
Personal, Electronic, Secure National Library of Medicine Hosts Health Records Conference
... Bar Home Current Issue Past Issues EHR Personal, Electronic, Secure: National Library of Medicine Hosts Health Records ... One suggestion for saving money is to implement electronic personal health records. With this in mind, the ...
Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna
2017-04-10
This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.
NASA Astrophysics Data System (ADS)
Li, Z. J.; Tian, Q.; Song, L. L.
2016-08-01
In this study, the analytic hierarchy process (ahp), ecological security index(S) and PSR model were used to evaluate Gansu's ecological security based on the large number of survey data. The results indicated that Gansu's ecological security index increased from 0.31 in 1986 to 0.66 in 2013, which reflected ecological security was in sensitive state (0.7༞S≥⃒0.5). The main reason was that national policy on protecting the ecological environment has played a crucial role, especially the national project of returning farmland to forest and grass carried out in recent years. Moreover, the environmental issues such as the higher PM2.5, sand storms and climate extremes, had significantly improved people's environmental awareness in the study area. The regional difference of ecological security index was significant in Gansu Provinces, and the part of Yangtze river basin was higher than the part of Yellow River basin, whiles the in-land river basin was the lowest value. In a world, Gansu's ecological security had improved in recent years, but there was strong need for paying more attention to policy for ecological environment protection and increasing the propaganda to ensure the Gansu's ecological security in the future. This study will provide a scientific basis for the sustainable development of regional social economy and ecological environment.
Secure satellite communication using multi-photon tolerant quantum communication protocol
NASA Astrophysics Data System (ADS)
Darunkar, Bhagyashri; Punekar, Nikhil; Verma, Pramode K.
2015-09-01
This paper proposes and analyzes the potential of a multi-photon tolerant quantum communication protocol to secure satellite communication. For securing satellite communication, quantum cryptography is the only known unconditionally secure method. A number of recent experiments have shown feasibility of satellite-aided global quantum key distribution (QKD) using different methods such as: Use of entangled photon pairs, decoy state methods, and entanglement swapping. The use of single photon in these methods restricts the distance and speed over which quantum cryptography can be applied. Contemporary quantum cryptography protocols like the BB84 and its variants suffer from the limitation of reaching the distances of only Low Earth Orbit (LEO) at the data rates of few kilobits per second. This makes it impossible to develop a general satellite-based secure global communication network using the existing protocols. The method proposed in this paper allows secure communication at the heights of the Medium Earth Orbit (MEO) and Geosynchronous Earth Orbit (GEO) satellites. The benefits of the proposed method are two-fold: First it enables the realization of a secure global communication network based on satellites and second it provides unconditional security for satellite networks at GEO heights. The multi-photon approach discussed in this paper ameliorates the distance and speed issues associated with quantum cryptography through the use of contemporary laser communication (lasercom) devices. This approach can be seen as a step ahead towards global quantum communication.
NASA Astrophysics Data System (ADS)
Straub, Jeremy
2017-06-01
A wide variety of characteristics of 3D printed objects have been linked to impaired structural integrity and use-efficacy. The printing material can also have a significant impact on the quality, utility and safety characteristics of a 3D printed object. Material issues can be created by vendor issues, physical security issues and human error. This paper presents and evaluates a system that can be used to detect incorrect material use in a 3D printer, using visible light imaging. Specifically, it assesses the ability to ascertain the difference between materials of different color and different types of material with similar coloration.
Medical image security in a HIPAA mandated PACS environment.
Cao, F; Huang, H K; Zhou, X Q
2003-01-01
Medical image security is an important issue when digital images and their pertinent patient information are transmitted across public networks. Mandates for ensuring health data security have been issued by the federal government such as Health Insurance Portability and Accountability Act (HIPAA), where healthcare institutions are obliged to take appropriate measures to ensure that patient information is only provided to people who have a professional need. Guidelines, such as digital imaging and communication in medicine (DICOM) standards that deal with security issues, continue to be published by organizing bodies in healthcare. However, there are many differences in implementation especially for an integrated system like picture archiving and communication system (PACS), and the infrastructure to deploy these security standards is often lacking. Over the past 6 years, members in the Image Processing and Informatics Laboratory, Childrens Hospital, Los Angeles/University of Southern California, have actively researched image security issues related to PACS and teleradiology. The paper summarizes our previous work and presents an approach to further research on the digital envelope (DE) concept that provides image integrity and security assurance in addition to conventional network security protection. The DE, including the digital signature (DS) of the image as well as encrypted patient information from the DICOM image header, can be embedded in the background area of the image as an invisible permanent watermark. The paper outlines the systematic development, evaluation and deployment of the DE method in a PACS environment. We have also proposed a dedicated PACS security server that will act as an image authority to check and certify the image origin and integrity upon request by a user, and meanwhile act also as a secure DICOM gateway to the outside connections and a PACS operation monitor for HIPAA supporting information. Copyright 2002 Elsevier Science Ltd.
International boundary experiences by the United Nations
NASA Astrophysics Data System (ADS)
Kagawa, A.
2013-12-01
Over the last few decades, the United Nations (UN) has been approached by Security Council and Member States on international boundary issues. The United Nations regards the adequate delimitation and demarcation of international boundaries as a very important element for the maintenance of peace and security in fragile post-conflict situations, establishment of friendly relationships and cross-border cooperation between States. This paper will present the main principles and framework the United Nations applies to support the process of international boundary delimitation and demarcation activities. The United Nations is involved in international boundary issues following the principle of impartiality and neutrality and its role as mediator. Since international boundary issues are multi-faceted, a range of expertise is required and the United Nations Secretariat is in a good position to provide diverse expertise within the multiple departments. Expertise in different departments ranging from legal, political, technical, administrative and logistical are mobilised in different ways to provide support to Member States depending on their specific needs. This presentation aims to highlight some of the international boundary projects that the United Nations Cartographic Section has been involved in order to provide the technical support to different boundary requirements as each international boundary issue requires specific focus and attention whether it be in preparation, delimitation, demarcation or management. Increasingly, the United Nations is leveraging geospatial technology to facilitate boundary delimitation and demarcation process between Member States. Through the presentation of the various case studies ranging from Iraq - Kuwait, Israel - Lebanon (Blue Line), Eritrea - Ethiopia, Cyprus (Green Line), Cameroon - Nigeria, Sudan - South Sudan, it will illustrate how geospatial technology is increasingly used to carry out the support. In having applied a range of geospatial solutions, some of the good practices that have been applied in preceding projects, but there have been challenges and limitations faced. However, these challenges need to be seen as an opportunity to improve the geospatial technology solutions in future international boundary projects. This presentation will also share the aspirations that the United Nations Cartographic Section has in becoming a facilitator in geospatial technical aspects related to international boundary issues as we increasingly develop our geospatial institutional knowledge base and expertise. The presentation will conclude by emphasizing the need for more collaboration between different actors dealing with geospatial technology on borderland issues in order to meet the main goal of the United Nations - to live and work together as "We the Peoples of the United Nations".
Overview of Climate Confluence Security Issues
NASA Astrophysics Data System (ADS)
Reisman, J. P.
2011-12-01
Presentation will focus on an overview of the security perspectives based on the confluence considerations including energy, economics and climate change. This will include perspectives from reports generated by the Quadrennial Defense Review, Joint Forces Command, the Center for Strategic International Studies, MIT, the Inter-agency Climate Change Adaptation Task Force, the Central Intelligence Agency, the Center for Naval Analysis, and other relevant reports. The presentation will highlight the connections between resource issues and climate change which can be interpreted into security concerns. General discussion of global issues, contextual review of AR4 WGII may be included and any other report updates as applicable. The purpose of this presentation is to give a rounded view of the general qualitative and quantitative perspectives regarding climate related security considerations.