WorldWideScience

Sample records for benefits security administration

  1. 76 FR 2142 - Employee Benefits Security Administration

    Science.gov (United States)

    2011-01-12

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Hearing on Definition of ``Fiduciary'' AGENCY: Employee Benefits Security Administration, Labor. ACTION: Notice of hearing and extension of comment period. SUMMARY: Notice is hereby given that the Employee Benefits Security Administration will...

  2. 29 CFR 70.54 - Employee Benefits Security Administration.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Employee Benefits Security Administration. 70.54 Section 70... Records and Filings § 70.54 Employee Benefits Security Administration. (a) The annual financial reports (Form 5500) and attachments/schedules as filed by employee benefit plans under the Employee Retirement...

  3. 75 FR 65511 - Employee Benefits Security Administration; Submission for OMB Review

    Science.gov (United States)

    2010-10-25

    ... DEPARTMENT OF LABOR Office of the Secretary Employee Benefits Security Administration; Submission...--Employee Benefits Security Administration (EBSA), Office of Management and Budget, Room 10235, Washington...: Employee Benefits Security Administration. Type of Review: Extension without change of a currently approved...

  4. Legal rights, efficiency and citizen involvement in the administration of social security cash benefits

    DEFF Research Database (Denmark)

    Von Hielmcrone, Nina

    2010-01-01

    for the accretion of new special rules. They merely have to be coded into the system. The government’s modernisation programme has been carried out at the expense of transparency and the legal rights of the citizens. This article deals with Danish legislation; the mechanisms in question are common not only......The Danish social security legislation has been distinguished in recent years by an intense growth in rules and regulations. Numerous laws and ordinances have been promulgated, which make it extremely difficult for both citizens and authorities to come to grips with the laws, much less to gain...... to a vast growth in very detailed and complex rules and thereby lack of transparency for citizens and social workers. The fact that benefits are administered with the aid of computers means that neither administrators nor politicians find the abundance of rules to be a problem, and no limits are thereby set...

  5. Social Security and Medicare Benefits

    Data.gov (United States)

    Social Security Administration — Cash benefits and rehabilitation benefits paid in each year from the Old-Age and Survivors Insurance, and Disability Insurance Trust Funds, and benefits paid from...

  6. Employee Retirement Income Security Act of 1974: rules and regulations for administration and enforcement; claims procedure. Pension and Welfare Benefits Administration, Labor. Final regulation.

    Science.gov (United States)

    2000-11-21

    This document contains a final regulation revising the minimum requirements for benefit claims procedures of employee benefit plans covered by Title I of the Employee Retirement Income Security Act of 1974 (ERISA or the Act). The regulation establishes new standards for the processing of claims under group health plans and plans providing disability benefits and further clarifies existing standards for all other employee benefit plans. The new standards are intended to ensure more timely benefit determinations, to improve access to information on which a benefit determination is made, and to assure that participants and beneficiaries will be afforded a full and fair review of denied claims. When effective, the regulation will affect participants and beneficiaries of employee benefit plans, employers who sponsor employee benefit plans, plan fiduciaries, and others who assist in the provision of plan benefits, such as third-party benefits administrators and health service providers or health maintenance organizations that provide benefits to participants and beneficiaries of employee benefit plans.

  7. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  8. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  9. A cost-benefit analysis of the Mexican Social Security Administration's family planning program.

    Science.gov (United States)

    Nortman, D L; Halvas, J; Rabago, A

    1986-01-01

    A cost-benefit analysis of the family planning program of the Mexican Social Security System (IMSS) was undertaken to test the hypothesis that IMSS's family planning services yield a net savings to IMSS by reducing the load on its maternal and infant care service. The cost data are believed to be of exceptionally high quality because they were empirically ascertained by a retrospective and prospective survey of unit time and personnel costs per specified detailed type of service in 37 IMSS hospitals and 16 clinics in 13 of Mexico's 32 states. Based on the average cost per case, the analysis disclosed that for every peso (constant 1983 currency) that IMSS spent on family planning services to its urban population during 1972-1984 inclusive, the agency saved nine pesos. The article concludes by raising the speculative question as to the proportion of the births averted by the IMSS family planning program that would have been averted in the absence of IMSS's family planning services.

  10. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  11. Social Security Administration

    Science.gov (United States)

    ... Suze Orman on Why Creating an Account is Important Suze Orman explains how a my Social Security account can help you plan for your retirement ... for same-sex couples? Open Government at Social Security Explore the benefits you may be due Plain ... About Us Accessibility FOIA Open Government Glossary ...

  12. 20 CFR 404.1362 - Treatment of social security benefits or payments where Veterans Administration pension or...

    Science.gov (United States)

    2010-04-01

    ... payments where Veterans Administration pension or compensation payable. 404.1362 Section 404.1362 Employees... Administration pension or compensation payable. (a) Before we receive notice from the Veterans Administration. If... status provisions in § 404.1350 before we receive notice from the Veterans Administration that a pension...

  13. Security bingo for administrators

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Have you ever thought about the security of your service(s) or system(s)? Show us and win one of three marvellous books on computer security! Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us at Computer.Security@cern.ch or P.O. Box G19710, by November 14th 2011.   Winners[1] must show us that they follow at least five good practices in a continuous horizontal row, vertical column or diagonal. For details on CERN Computer Security, please consult http://cern.ch/security. My service or system…   …is following a software development life-cycle. …is patched in an automatic and timely fashion. …runs a tightened local ingress/egress firewall. …uses CERN Single-Sign-On (SSO). …has physical access protections in place. …runs all processes / services / applications with least privileges. …has ...

  14. Federal Coal Mine Health and Safety Act of 1969, Title IV, as amended (The Black Lung Benefits Act); payment of benefits--withholding Part B benefits where Part C payments are made for the same period. Social Security Administration. Final rule.

    Science.gov (United States)

    1982-05-04

    This regulation confirms the interim rule authorizing the Social Security Administration to withhold payment of Part B Black Lung benefits where Part C Black Lung benefits administered by the Dept. of Labor are paid for the same period. We are doing this by expanding the definition of "overpayment" in 20 CFR 410.560(a) to include these duplicate payments under Part C. This regulation provides a quick and efficient means of avoiding unjustified duplicate payments.

  15. ORDER SECURITY – NATIONAL SECURITY ADMINISTRATION. NATIONAL SECURITY DEFENSE AS SPECIAL ADMINISTRATION

    OpenAIRE

    Zoltán BALLA

    2009-01-01

    National security administration is the special executivedisposal activity of the national security agencies, the section of the state administration that helps the governmental work by reconnoitering and preventing with secret-servicing methods of the risks that shall harm or endanger the national security’s interests. The main operational principles of national security governing are the followings among others: - controlling the operation of national security organization belongs to the ex...

  16. Social Security Administration Data for Enumeration Accuracy

    Data.gov (United States)

    Social Security Administration — This dataset provides data at the national level from federal fiscal year 2006 onwards for the accuracy of the assignment of Social Security numbers (SSN) based on...

  17. 20 CFR 404.1361 - Federal benefit payable other than by Veterans Administration.

    Science.gov (United States)

    2010-04-01

    ... Uniformed Services Effect of Other Benefits on Payment of Social Security Benefits and Payments § 404.1361... Veterans Administration. 404.1361 Section 404.1361 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... on the veteran's World War II or post-World War II active service before we determine and certify...

  18. Capitalization of Defense Technology Security Administration Equipment

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1996-01-01

    ... $5.2 million in the Equipment in Use account on its trial balance. Starting with FY 1996, Defense Technology Security Administration financial data will be included in consolidated DoD financial statements...

  19. 20 CFR 423.1 - Suits against the Social Security Administration and its employees in their official capacities.

    Science.gov (United States)

    2010-04-01

    ... Federal Register, and are available on-line at the Social Security Administration's Internet site, http... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Suits against the Social Security... SECURITY ADMINISTRATION SERVICE OF PROCESS § 423.1 Suits against the Social Security Administration and its...

  20. Market Valuation of Accrued Social Security Benefits

    OpenAIRE

    John Geanakoplos; Stephen P. Zeldes

    2009-01-01

    One measure of the health of the Social Security system is the difference between the market value of the trust fund and the present value of benefits accrued to date. How should present values be computed for this calculation in light of future uncertainties? We think it is important to use market value. Since claims on accrued benefits are not currently traded in financial markets, we cannot directly observe a market value. In this paper, we use a model to estimate what the market price for...

  1. Measurement issues associated with using survey data matched with administrative data from the Social Security Administration.

    Science.gov (United States)

    Davies, Paul S; Fisher, T Lynn

    2009-01-01

    Researchers using survey data matched with administrative data benefit from the rich demographic and economic detail available from survey data combined with detailed programmatic data from administrative records. The research benefits of using these matched data are too numerous to mention. But there are drawbacks as well, and those drawbacks have received less systematic attention from researchers. We focus on survey data matched with administrative data from the Social Security Administration and address the strengths and weaknesses of each in four specific areas: (1) program participation and benefits, (2) disability and health information, (3) earnings, and (4) deferred compensation. We discuss the implications of these strengths and weaknesses for decisions that researchers must make regarding the appropriate data source and definition for the concepts in question. From this discussion, some general conclusions are drawn about measurement issues associated with using matched survey and administrative data for research, policy evaluation, and statistics.

  2. An Analysis of the Use of the Social Security Number as Veteran Identification as it Relates to Identity Theft; A Cost Benefit Analysis of Transitioning the Department of Defense and Veterans Administration to a Military Identification Number

    National Research Council Canada - National Science Library

    Opria, George R; Maraska, Donald G

    2007-01-01

    ...) as a primary personal identifier. Originally intended for the very limited purpose of tracking social security benefits, the value of the SSN as a unique identifier was quickly recognized, and its use rapidly grew...

  3. Social Security Administration - Quarterly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from fiscal...

  4. 29 CFR 2509.75-3 - Interpretive bulletin relating to investments by employee benefit plans in securities of...

    Science.gov (United States)

    2010-07-01

    ... Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR... Interpretive bulletin relating to investments by employee benefit plans in securities of registered investment.... That section provides that an investment by an employee benefit plan in securities issued by an...

  5. 75 FR 8096 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-023...

    Science.gov (United States)

    2010-02-23

    ... response to workplace violence, analyzes data as needed, and provides training. Additionally, DHS is... 1974; Department of Homeland Security Transportation Security Administration--023 Workplace Violence... Security Administration--023 Workplace Violence Prevention Program System of Records.'' This system will...

  6. Lifetime distributional effects of Social Security retirement benefits.

    Science.gov (United States)

    Smith, Karen; Toder, Eric; Iams, Howard

    This article presents three measures of the distribution of actual and projected net benefits (benefits minus payroll taxes) from Social Security's Old-Age and Survivors Insurance (OASI) for people born between 1931 and 1960. The results are based on simulations with the Social Security Administration's Model of Income in the Near Term (MINT), which projects retirement income through 2020. The base sample for MINT is the U.S. Census Bureau's Survey of Income and Program Participation panels for 1990 to 1993, matched with Social Security administrative records. The study population is grouped into 5-year birth cohorts and then ranked by economic status in three ways. First, the population is divided into five groups on the basis of individual lifetime covered earnings, and their lifetime present values of OASI benefits received and payroll taxes paid are calculated. By this measure, OASI provides much higher benefits to the lowest quintile of earners than to other groups, but it becomes less redistributive toward lower earners in more recent birth cohorts. Second, people are ranked by shared lifetime covered earnings, and the values of shared benefits received and payroll taxes paid are computed. Individuals are assumed to split covered earnings, benefits, and payroll taxes with their spouses in the years they are married. By the shared covered earnings measure, OASI is still much more favorable to persons in the lower income quintiles, although to a lesser degree than when people are ranked by individual covered earnings. OASI becomes more progressive among recent cohorts, even as net lifetime benefits decline for the entire population. Finally, individuals are ranked on the basis of their shared permanent income from age 62, when they become eligible for early retirement benefits, until death. Their annual Social Security benefits are compared with the benefits they would have received if they had saved their payroll taxes in individual accounts and used the

  7. Internet/Web-based administration of benefits.

    Science.gov (United States)

    Vitiello, J

    2001-09-01

    Most funds will face the challenge of deploying at least some Web-based functionality in the near future, if they have not already done so. Clear objectives and careful planning will help ensure success. Issues that must be considered include support requirements, security concerns, functional business objectives, and employer and member Web access.

  8. Security administration plan for HANDI 2000 business management system

    Energy Technology Data Exchange (ETDEWEB)

    Wilson, D.

    1998-09-29

    This document encompasses and standardizes the integrated approach for security within the PP and Ps applications, It also identifies the security tools and methods to be used. The Security Administration Plan becomes effective as of this document`s acceptance and will provide guidance through implementation efforts and, as a ``living document`` will support the operations and maintenance of the system.

  9. Information systems security policies: a survey in Portuguese public administration

    OpenAIRE

    Lopes, Isabel Maria; Sá-Soares, Filipe de

    2010-01-01

    Information Systems Security is a relevant factor for present organizations. Among the security measures, policies assume a central role in literature. However, there is a reduced number of empirical studies about the adoption of information systems security policies. This paper contributes to mitigate this flaw by presenting the results of a survey in the adoption of Information System Security Policies in Local Public Administration in Portugal. The results are discussed in light of literat...

  10. Security and Office Administration Coordinator | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Under the supervision of the Manager, Local Operations (MLO), the Security and ... Sees to the continuous updating and relevance of the Business Continuity Plan ... BCP to local management (Manager and Regional Director) and to the Head ...

  11. Security Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills

    CERN Document Server

    Miller, David R

    2011-01-01

    A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition o

  12. Benefits of Openness for US Security

    Science.gov (United States)

    May, Michael M.

    2000-04-01

    The US has been very successful in applying science and engineering to defense and space. The US has also run the most open defense research and development establishment in the world. The openness is connected with the success by making possible open criticism of mistakes and failures, access of foreign-born citizens, and participation of cleared scientists and engineers in open science around the world. This open system is at risk today, when it is more badly needed than ever. The right strategy is first, to draw a clear line around the information that should be kept secret, with some margin so that this information would not be partially given away by its boundary, and to continue with the open system elsewhere. The US, because it invests more, usually profits more from common knowledge. Second, spies are caught through good line leadership and good security work. The constraints now being discussed on unclassified information or on foreign visitors would not have helped catch them. Third, new guidance is needed for exports control. The US must cooperate with countries that are partners in trade and in international initiatives of the first importance, but which may also be political, economic and military rivals. Guidelines to protect what is key to our current military edge while retaining the open system are suggested.

  13. ADMINISTRATIVE EXPENDITURES OF SOCIAL SECURITY FUNDS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Nataliia Ivanchuk

    2017-12-01

    Full Text Available Along with the expenditures for social protection, social security funds finance administrative direction, which should correspond to the amount of functions performed by a particular fund. The purpose of the paper is to determine ways to reduce administrative expenditures of state social security funds in the conditions of reforming Ukrainian economy. For this purpose, the authors investigate distribution of the expenditures between social security funds, analyse dynamics and structure of assignments for fund administration, and suggest possible ways to rationalize maintenance cost for these institutions. Methodology. Administrative expenditures are an integral part of the cost of social security funds and include particular items of expenses in the budget of these institutions. Applying a systematic approach to calculating the administrative costs of social security funds of Ukraine the authors have taken into account the expenditures related to funding management, support for information systems, and organization of work with insured people. Results of the survey showed that in 2007–2016 Pension Fund of Ukraine incurred the largest part of social expenditures (more than 90% compared with other social insurance funds (less than 10%. At the same time, the administrative expenses were divided approximately into two halves between Pension Fund and other social security funds. In 2015, the government launched a reform of social insurance funds that aimed to reduce funds to three institutions but a decrease in the total amount of administrative expenditures has not been achieved yet. In addition, Pension Fund of Ukraine was least burdened with administrative expenses, while other social security funds with a relatively small share of social expenditures were burdened with administrative expenditures much more. Practical implications. Research showed that nowadays the existence of several social security funds in Ukraine is economically

  14. 76 FR 51358 - National Nuclear Security Administration Amended Record of Decision: Disposition of Surplus...

    Science.gov (United States)

    2011-08-18

    ... DEPARTMENT OF ENERGY National Nuclear Security Administration Amended Record of Decision... National Nuclear Security Administration (NNSA), a semi- autonomous agency within the U.S. Department of... Manager, Office of Fissile Materials Disposition, National Nuclear Security Administration, U.S...

  15. Inherent security benefits of underground dry storage of nuclear materials

    International Nuclear Information System (INIS)

    Moore, R.D.; Zahn, T.

    1997-07-01

    This paper, augmented by color slides and handouts, will examine the inherent security benefits of underground dry storage of nuclear materials. Specific items to be presented include: the successful implementation of this type of storage configuration at Argonne National Laboratory - West; facility design concepts with security as a primary consideration; physical barriers achieved by container design; detection, assessment, and monitoring capabilities; and open-quotes self protectionclose quotes strategies. This is a report on the security features of such a facility. The technical operational aspects of the facility are beyond the scope of this paper

  16. A Platform for RFID Security and Privacy Administration

    NARCIS (Netherlands)

    Rieback, M.R.; Gaydadjiev, G.N.; Crispo, B.; Hofman, R.F.H.; Tanenbaum, A.S.

    2006-01-01

    This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an ``RFID firewall,'' that monitors and controls access to RFID tags by combining a standard-issue RFID

  17. Social Security Administration Retirement, Survivors, and Disability Insurance (RSDI) Improper Payments

    Data.gov (United States)

    Social Security Administration — This dataset shows improper payment experience for the Social Security Retirement, Survivors, and Disability Insurance program paid to workers, their dependents, and...

  18. Potential savings from redetermining disability among children receiving supplemental security income benefits.

    Science.gov (United States)

    Pulcini, Christian D; Kotelchuck, Milton; Kuhlthau, Karen A; Nozzolillo, Alixandra A; Perrin, James M

    2012-01-01

    To compare the costs of redetermining disability to potential savings in Supplemental Security Income payments associated with different strategies for implementing Continuing Disability Reviews (CDRs) among children potentially enrolled in SSI from 2012 to 2021. We reviewed publicly available reports from the Social Security Administration and Government Accountability Office to estimate costs and savings. We considered CDRs for children ages 1-17 years, excluding mandated low-birth weight and age 18 redeterminations that SSA routinely has performed. If in 2012 the Social Security Administration performs the same number of CDRs for children as in 2010 (16,677, 1% of eligibles) at a cessation rate of 15%, the agency would experience net savings of approximately $145 million in benefit payments. If CDR numbers increased to the greatest level ever (183,211, 22% of eligibles, in 1999) at the same cessation rate, the agency would save approximately $1.6 billion in benefit payments. Increasing the numbers of CDRs for children represents a considerable opportunity for savings. Recognizing the dynamic nature of disability, the agency could reassess the persistence of disability systematically; doing so could free up resources from children who are no longer eligible and help the agency better direct its benefits to recipients with ongoing disability and whose families need support to meet the extra costs associated with raising a child with a major disability. Copyright © 2012 Academic Pediatric Association. Published by Elsevier Inc. All rights reserved.

  19. 75 FR 64389 - Proposed Recommendation to the Social Security Administration for Occupational Information System...

    Science.gov (United States)

    2010-10-19

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2010-0066] Proposed Recommendation to the Social Security Administration for Occupational Information System (OIS) Development Planning; Request for Comment...) to provide independent advice and recommendations on plans and activities to create an occupational...

  20. 20 CFR 416.305 - You must file an application to receive supplemental security income benefits.

    Science.gov (United States)

    2010-04-01

    ... benefits will be stopped because you are no longer eligible and you again meet the requirements for... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false You must file an application to receive supplemental security income benefits. 416.305 Section 416.305 Employees' Benefits SOCIAL SECURITY...

  1. Individual social security accounts: issues in assessing administrative feasibility and costs.

    Science.gov (United States)

    Olsen, K A; Salisbury, D L

    1998-11-01

    difficult to administer than employment-based plans, and total administrative expenses would be larger relative to benefits. Credit-based systems such as the current Social Security program are less difficult to administer than cash-based systems, which must account for every dollar. Inherent in the "privatization" debate is generally the presumption that IA benefits would be based on cash contributions and investment returns. The current credit-based system tolerates small errors in wage reporting, because they rarely affect benefits. But every dollar counts in a cash-based IA system. To ensure that benefits are properly provided, an IA system would require more regulation, oversight, and error reconciliation than the current Social Security program. Social Security individual accounts cannot be administered like 401(k) plans without adding significant employer burdens--especially on small businesses. Under the current wage reporting and tax collection process, it would take at least 7-19 months for every dollar contributed to an individual's account to be sorted out from aggregate payments and credited to his or her IA. This 7-19 month "float period" could result in substantial benefit losses over time. Options for preventing such losses involve difficult trade-offs, such as increased government responsibility, increased complexity, greater employer burdens, and/or investment restrictions for beneficiaries. If legally considered personal property, the IAs of married participants could pose significant administrative challenges. Social Security today must obtain proof of marriage only at the time spousal benefits are claimed. But some IA proposals would require contributions to be split between spouses' individual accounts, requiring records on participants' marital status to be continuously update to ensure that contributions are correctly directed. Also, dealing with claims on individual account contributions in divorce cases could place IA record keepers in the middle o

  2. 78 FR 6168 - Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract...

    Science.gov (United States)

    2013-01-29

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2013-0001] Public Availability of Social Security Administration Fiscal Year (FY) 2012 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2012 Service Contract Inventories. SUMMARY: In accordance with...

  3. 77 FR 3836 - Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract...

    Science.gov (United States)

    2012-01-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0105] Public Availability of Social Security Administration Fiscal Year (FY) 2011 Service Contract Inventory AGENCY: Social Security Administration. ACTION: Notice of Public Availability of FY 2011 Service Contract Inventories. SUMMARY: In accordance with...

  4. Safeguards and security benefits of project straight-line

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Waddoups, I.G.

    1995-01-01

    As a result of a number of events the inventory of fissile materials no longer in nuclear weapons in the United States is increasing. This has led to a growing concern regarding the potential for theft and/or diversion and accountability of this material. Straight-Line is a project whose purpose is to demonstrate a site-independent system to monitor stored nuclear material (e.g. plutonium) and integrate the collection, processing and dissemination of information regarding this material. Safeguards and security (S ampersand S) goals of this project include data transfer of information on nuclear material to appropriate users to enhance S ampersand S, continuous on-line accountability, reduction of hands-on access to nuclear materials, incorporation of information security technologies, and early detection of tampering or unauthorized material movement. This paper addresses threat considerations, S ampersand S requirements, S ampersand S objectives, and issues for the Straight-Line project. S ampersand S features and benefits of this project are discussed with respect to existing item monitoring systems and/or other material tracking systems being developed

  5. Analysis of costs-benefits tradeoffs of complex security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.

    1996-01-01

    Essential to a systems approach to design of security systems is an analysis of the cost effectiveness of alternative designs. While the concept of analysis of costs and benefits is straightforward, implementation can be at the least tedious and, for complex designs and alternatives, can become nearly intractable without the help of structured analysis tools. PACAIT--Performance and Cost Analysis Integrated Tools--is a prototype tool. The performance side of the analysis collates and reduces data from ASSESS, and existing DOE PC-based security systems performance analysis tool. The costs side of the analysis uses ACE, an existing DOD PC-based costs analysis tool. Costs are reported over the full life-cycle of the system, that is, the costs to procure, operate, maintain and retire the system and all of its components. Results are collected in Microsoft reg-sign Excel workbooks and are readily available to analysts and decision makers in both tabular and graphical formats and at both the system and path-element levels

  6. 20 CFR 725.606 - Security for the payment of benefits.

    Science.gov (United States)

    2010-04-01

    ... operator or other employer fails to provide proof of such security to the Director within 30 days of its...-compliance to the appropriate United States district court in accordance with § 725.351(c). (f) Security... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Security for the payment of benefits. 725.606...

  7. Incomes and Outcomes: Social Security Disability Benefits in First-Episode Psychosis.

    Science.gov (United States)

    Rosenheck, Robert A; Estroff, Sue E; Sint, Kyaw; Lin, Haiqun; Mueser, Kim T; Robinson, Delbert G; Schooler, Nina R; Marcy, Patricia; Kane, John M

    2017-09-01

    Social Security Administration (SSA) disability benefits are an important source of income for people with psychoses and confer eligibility for health insurance. The authors examined the impact of coordinated specialty care on receipt of such benefits in first-episode psychosis, along with the correlates and consequences of receiving them. The Recovery After an Initial Schizophrenia Episode-Early Treatment Program (RAISE-ETP) study, a 34-site cluster-randomized trial, compared NAVIGATE, a coordinated specialty care program, to usual community care over 2 years. Receipt of SSA benefits and clinical outcomes were assessed at program entry and every 6 months for 2 years. Piecewise regression analysis was used to identify relative change in outcome trajectories after receipt of disability benefits. Among 399 RAISE-ETP participants, 36 (9%) were receiving SSA disability benefits at baseline; of the remainder, 124 (34.1%) obtained benefits during the 2-year study period. The NAVIGATE intervention improved quality of life, symptoms, and employment but did not significantly reduce the likelihood of receiving SSA disability benefits. Obtaining benefits was predicted by more severe psychotic symptoms and greater dysfunction and was followed by increased total income but fewer days of employment, reduced motivation (e.g., sense of purpose, greater anhedonia), and fewer days of intoxication. A 2-year coordinated specialty care intervention did not reduce receipt of SSA disability benefits. There were some advantages for those who obtained SSA disability benefits over the 2-year treatment period, but there were also some unintended adverse consequences. Providing income supports without impeding recovery remains an important policy challenge.

  8. 38 CFR 1.575 - Social security numbers in veterans' benefits matters.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Social security numbers... Affairs Records § 1.575 Social security numbers in veterans' benefits matters. (a) Except as provided in... because of refusal to disclose to the Department of Veterans Affairs a social security number. (b) VA...

  9. Human errors and violations in computer and information security: the viewpoint of network administrators and security specialists.

    Science.gov (United States)

    Kraemer, Sara; Carayon, Pascale

    2007-03-01

    This paper describes human errors and violations of end users and network administration in computer and information security. This information is summarized in a conceptual framework for examining the human and organizational factors contributing to computer and information security. This framework includes human error taxonomies to describe the work conditions that contribute adversely to computer and information security, i.e. to security vulnerabilities and breaches. The issue of human error and violation in computer and information security was explored through a series of 16 interviews with network administrators and security specialists. The interviews were audio taped, transcribed, and analyzed by coding specific themes in a node structure. The result is an expanded framework that classifies types of human error and identifies specific human and organizational factors that contribute to computer and information security. Network administrators tended to view errors created by end users as more intentional than unintentional, while errors created by network administrators as more unintentional than intentional. Organizational factors, such as communication, security culture, policy, and organizational structure, were the most frequently cited factors associated with computer and information security.

  10. Security information and event management systems: benefits and inefficiencies

    OpenAIRE

    Κάτσαρης, Δημήτριος Σ.

    2014-01-01

    In this Master’s thesis, the new trend in computer and information security industry called Security Information and Event Management systems will be covered. The evolution, advantages and weaknesses of these systems will be described, as well as a home-based implementation with open source tools will be proposed and implemented.

  11. A cost-benefit analysis of alternative device configurations for aviation-checked baggage security screening.

    Science.gov (United States)

    Jacobson, Sheldon H; Karnani, Tamana; Kobza, John E; Ritchie, Lynsey

    2006-04-01

    The terrorist attacks of September 11, 2001 have resulted in dramatic changes in aviation security. As of early 2003, an estimated 1,100 explosive detection systems (EDS) and 6,000 explosive trace detection machines (ETD) have been deployed to ensure 100% checked baggage screening at all commercial airports throughout the United States. The prohibitive costs associated with deploying and operating such devices is a serious issue for the Transportation Security Administration. This article evaluates the cost effectiveness of the explosive detection technologies currently deployed to screen checked baggage as well as new technologies that could be used in the future. Both single-device and two-device systems are considered. In particular, the expected annual direct cost of using these devices for 100% checked baggage screening under various scenarios is obtained and the tradeoffs between using single- and two-device strategies are studied. The expected number of successful threats under the different checked baggage screening scenarios with 100% checked baggage screening is also obtained. Lastly, a risk-based screening strategy proposed in the literature is analyzed. The results reported suggest that for the existing security setup, with current device costs and probability parameters, single-device systems are less costly and have fewer expected number of successful threats than two-device systems due to the way the second device affects the alarm or clear decision. The risk-based approach is found to have the potential to significantly improve security. The cost model introduced provides an effective tool for the execution of cost-benefit analyses of alternative device configurations for aviation-checked baggage security screening.

  12. Social Security and divorce or death benefits storyboard (S(2)D(2)BS): an interactive participant learning exercise.

    Science.gov (United States)

    Brown, Pamela Pitman

    2014-01-01

    Using the concept of an interactive or living storyboard, the author discusses the use of seven case narratives constructed for the sole purpose of teaching introductory gerontology or geriatric students about the distribution of Social Security benefits after spousal death. Additional information is included pertaining to Social Security benefits payable to divorced persons after the death of the former spouse, including the status of married same-sex couples. Narratives include representations of a male breadwinner model couple, a two-earner couple who have similar/dissimilar earnings prior to retirement, a divorced couple with a remarriage after a death, a gay couple with and without children, and a female primary breadwinner couple. Updated information from the Social Security Administration, as well as information on game preparation, scripts, and debriefing questions are included.

  13. Imperfect Annuity Markets, Unintended Bequests, and the Optimal Age Structure of Social Security Benefits

    OpenAIRE

    Martin Feldstein

    1989-01-01

    The social security program now provides a constant real benefit throughout each retirees lifetime. This paper examines whether total welfare would rise if benefits were lower in early retirement years (when most individuals have some saving with which to finance consumption) and higher in later years (when the uncertainty of survival and the absence of actuarially fair private annuities makes the availability of social security benefits more important.) The analysis shows that there is a pot...

  14. The Optimal Time for Claiming Social Security Benefits: A Methodological Note

    OpenAIRE

    Joseph Friedman

    2014-01-01

    The optimal age for initiating Social Security benefits and the initiation versus postponement of benefits decision are the subjects of a number of recent papers. It is generally agreed that an initiation versus postponement of benefits decision may have significant consequences, but there is less agreement about how to model the problem or measure its financial implications. By law benefits are paid only to live beneficiaries. Thus, the anticipated future benefits should be weighted by the r...

  15. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is a...

  16. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2011-0090] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  17. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2012-0016] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Department of Veterans Affairs (VA.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503...

  18. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2009-0043] Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 Public Law (Pub. L.) 100-503...

  19. Network Security: What Non-Technical Administrators Must Know

    Science.gov (United States)

    Council, Chip

    2005-01-01

    Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…

  20. 75 FR 2161 - Proposed Extension of Information Collection; Comment Request; Employee Benefit Plan Claims...

    Science.gov (United States)

    2010-01-14

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Proposed Extension of Information Collection; Comment Request; Employee Benefit Plan Claims Procedures Under ERISA AGENCY: Employee Benefits... Employee Benefits Security Administration (EBSA) is soliciting comments on a proposed extension of the...

  1. VBA SSA Acc To Fed Rec Online (SAFRO) - Also known as Veterans Benefit Administration Query (VBAQ).

    Data.gov (United States)

    Social Security Administration — The purpose of this query is to provide SSA field office personnel with real-time access to military discharge data from the VA BIRLS database. This information is...

  2. 22 CFR 192.43 - Administration of benefits.

    Science.gov (United States)

    2010-04-01

    ....43 Foreign Relations DEPARTMENT OF STATE HOSTAGE RELIEF VICTIMS OF TERRORISM COMPENSATION Educational... this part, shall apply in writing to the Director General of the Foreign Service, Department of State... those benefits. The Director General of the Foreign Service, on behalf of the Secretary of State, shall...

  3. National Nuclear Security Administration Nonproliferation Graduate Fellowship Program Annual Report in Brief: October 2007 - May 2008

    Energy Technology Data Exchange (ETDEWEB)

    Berkman, Clarissa O.; Fankhauser, Jana G.; Sandusky, Jessica A.

    2009-05-01

    This abbreviated Annual Report covers program activities of the National Nuclear Security Administration (NNSA) Nonproliferation Graduate Fellowship Program (NGFP) from October 2007 through May 2008--the timeframe between the last Annual Report (which covered activities through September 2007) and the next report (which will begin with June 2008 activities). In that timeframe, the NGFP continued building a solid foundation as the program began reaping the benefits of recently implemented changes. This report is organized by Fellowship class and the pertinent program activities for each, including: October 2007 Recruiting events and final applications (Class of 2008) Winter 2007 Selection and hiring (Class of 2008) Spring 2008 Career development roundtables (Class of 2007) Orientation planning (Class of 2008) Recruitment planning and university outreach (Class of 2009) May 2008 Closing ceremony (Class of 2007)

  4. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    To improve SSAs IT management practices, we recommend that the Acting Commissioner of Social Security direct the Chief Information Officer and the Deputy Commissioner for Systems to complete the following actions...

  5. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  6. Information Technology Management: Social Security Administration Practices Can Be Improved

    National Research Council Canada - National Science Library

    Shaw, Clay

    2001-01-01

    ...) develop and maintain selection criteria that include explicit cost, benefit, schedule, and risk criteria to facilitate the objective analysis, comparison, prioritization, and selection of IT investments; (3...

  7. 75 FR 28046 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-002...

    Science.gov (United States)

    2010-05-19

    ... security, law enforcement, immigration, intelligence, or other functions consistent with the routine uses... transportation operators, flight students, and others, where appropriate, for services related to security threat.... Enforce safety- and security-related regulations and requirements; 3. Assess and distribute intelligence...

  8. Department of Homeland Security (DHS I-131)

    Data.gov (United States)

    Social Security Administration — This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for...

  9. Secure it now or secure it later: the benefits of addressing cyber-security from the outset

    Science.gov (United States)

    Olama, Mohammed M.; Nutaro, James

    2013-05-01

    The majority of funding for research and development (R&D) in cyber-security is focused on the end of the software lifecycle where systems have been deployed or are nearing deployment. Recruiting of cyber-security personnel is similarly focused on end-of-life expertise. By emphasizing cyber-security at these late stages, security problems are found and corrected when it is most expensive to do so, thus increasing the cost of owning and operating complex software systems. Worse, expenditures on expensive security measures often mean less money for innovative developments. These unwanted increases in cost and potential slowing of innovation are unavoidable consequences of an approach to security that finds and remediate faults after software has been implemented. We argue that software security can be improved and the total cost of a software system can be substantially reduced by an appropriate allocation of resources to the early stages of a software project. By adopting a similar allocation of R&D funds to the early stages of the software lifecycle, we propose that the costs of cyber-security can be better controlled and, consequently, the positive effects of this R&D on industry will be much more pronounced.

  10. 78 FR 55270 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... their official duties. The computer system also maintains a real-time audit of individuals who access... Secure Flight Program regulations \\4\\ for the purpose of enhancing the security of air travel in the... detection of individuals on federal government watch lists who seek to travel by air, and to facilitate the...

  11. Higher Education Administrators Roles in Fortification of Information Security Program

    Science.gov (United States)

    Eyadat, Mohammad S.

    2015-01-01

    Information systems produce significant benefits to organizations. Therefore, organizations invest tremendous amount of money and time to obtain and manage information in order to maintain a high level of performance and to remain competitive. There are many factors that can impact the organizational information management and performance. One of…

  12. Business Administration and Computer Science Degrees: Earnings, Job Security, and Job Satisfaction

    Science.gov (United States)

    Mehta, Kamlesh; Uhlig, Ronald

    2017-01-01

    This paper examines the potential of business administration vs. computer science degrees in terms of earnings, job security, and job satisfaction. The paper focuses on earnings potential five years and ten years after the completion of business administration and computer science degrees. Moreover, the paper presents the income changes with…

  13. Design of security scheme of the radiotherapy planning administration system based on the hospital information system

    International Nuclear Information System (INIS)

    Zhuang Yongzhi; Zhao Jinzao

    2010-01-01

    Objective: To design a security scheme of radiotherapy planning administration system. Methods: Power Builder 9i language was used to program the system through the model of client-server machine. Oracle 9i was used as the database server. Results In this system, user registration management, user login management, application-level functions of control, database access control, and audit trail were designed to provide system security. Conclusions: As a prototype for the security analysis and protection of this scheme provides security of the system, application system, important data and message, which ensures the system work normally. (authors)

  14. 20 CFR 404.469 - Nonpayment of benefits where individual has not furnished or applied for a Social Security number.

    Science.gov (United States)

    2010-04-01

    ... not furnished or applied for a Social Security number. 404.469 Section 404.469 Employees' Benefits... or applied for a Social Security number. No monthly benefits will be paid to an entitled individual... or her Social Security number, or, if the individual has not been assigned a number, he or she makes...

  15. 76 FR 20823 - Agency Information Collection (Veterans Benefits Administration (VBA) Voice of the Veteran (VOV...

    Science.gov (United States)

    2011-04-13

    ... AGENCY: Veterans Benefits Administration, Department of Veterans Affairs. ACTION: Notice. SUMMARY: In... to VA's OMB Desk Officer, OMB Human Resources and Housing Branch, New Executive Office Building, Room... benefit claim within 30 days prior to the fielding period. The sample will be stratified as follows: (1...

  16. Trends in social security benefits for oral and oropharyngeal cancer from 2006 to 2013 in Brazil.

    Science.gov (United States)

    Bomfim, Rafael Aiello; Cascaes, Andreia Morales

    2018-01-01

    to analyze the trends in the concession of social security sick pay for oral and oropharyngeal cancer, from 2006 to 2013, in Brazil. time series study using data of workers insured by the Brazilian National Institute of Social Security (INSS); Prais-Winsten generalized linear regressions were used to calculate the annual percentage change (APC). social security benefits for oral and oropharyngeal cancer presented significant increase (APC=9.0%; 95%CI 1.4; 17.4); benefits for other parts of the mouth, nasopharynx, oropharynx, floor of mouth and palate have also shown significant increase; the areas of trade (5.5%) and manufacturing (5.2%) were the most prevalent activities; there was a high proportion of fields in blank in the information systems (average of 72.9%). trends in occupational benefits for oral and oropharyngeal cancer showed significant increase.

  17. Stochastic Actuarial Modelling of a Defined-Benefit Social Security Pension Scheme: An Analytical Approach

    OpenAIRE

    Iyer, Subramaniam

    2017-01-01

    Among the systems in place in different countries for the protection of the population against the long-term contingencies of old-age (or retirement), disability and death (or survivorship), defined-benefit social security pension schemes, i.e. social insurance pension schemes, by far predominate, despite the recent trend towards defined-contribution arrangements in social security reforms. Actuarial valuations of these schemes, unlike other branches of insurance, continue to be carried out a...

  18. Administrative corruption from sociology perspective and the relationship between administrative corruption and social security

    OpenAIRE

    Mohsen Zarei Jlyany; Gholam Reza Sharafi; Mustafa Tavani; Mansour Haghighatian; Moslem Tavani

    2014-01-01

    certain principles Observance and non- Observance on organizing a social system will have Indisputable effect at the Organization. And administrative systems are not exempt from this, also the selection of the Administration components and also How to Place the components together can affect its performance. Meanwhile, the government's role in the prevalence or no-prevalence, the extent type and the way of administrative corruption influence, in this article, researchers wants to explore the ...

  19. The Long-Term Health Implications of Marital Disruption: Divorce, Work Limits, and Social Security Disability Benefits Among Men.

    Science.gov (United States)

    Couch, Kenneth A; Tamborini, Christopher R; Reznik, Gayle L

    2015-10-01

    We provide new evidence on the long-term impact of divorce on work disability among U.S. men. Using data from the 2004 Survey of Income and Program Participation linked to U.S. Social Security Administration records, we assess the relationship between divorce and subsequent self-reports of work limitations and the receipt of federal disability benefits. The examination of self-reports and administrative records of medically qualified benefits provides dual confirmation of key relationships. We compare men who experienced a marital dissolution between 1975 and 1984 with continuously married men for 20 years following divorce using fixed-effects and propensity score matching models, and choose a sample to help control for selection into divorce. On average, we find that divorce is not associated with an increased probability of self-reported work limitations or receipt of disability benefits over the long run. However, among those who do not remarry, we do find that divorce increases men's long-term probability of both self-reported work limitations and federal disability benefit receipt. Lack of marital resources may drive this relationship. Alternative estimates that do not control for selection into divorce demonstrate that selection bias can substantially alter findings regarding the relationship between marital status changes and subsequent health.

  20. 78 FR 10211 - Agency Information Collection Activities; Submission for OMB Review; Comment Request; Securities...

    Science.gov (United States)

    2013-02-13

    ... for OMB Review; Comment Request; Securities Lending by Employee Benefit Plans ACTION: Notice. SUMMARY: The Department of Labor (DOL) is submitting the Employee Benefits Security Administration (EBSA) sponsored information collection request (ICR) titled, ``Securities Lending by Employee Benefit Plans,'' to...

  1. Risk-based security cost-benefit analysis: method and example applications - 59381

    International Nuclear Information System (INIS)

    Wyss, Gregory; Hinton, John; Clem, John; Silva, Consuelo; Duran, Felicia A.

    2012-01-01

    Document available in abstract form only. Full text of publication follows: Decision makers wish to use risk-based cost-benefit analysis to prioritize security investments. However, understanding security risk requires estimating the likelihood of attack, which is extremely uncertain and depends on unquantifiable psychological factors like dissuasion and deterrence. In addition, the most common performance metric for physical security systems, probability of effectiveness at the design basis threat [P(E)], performs poorly in cost-benefit analysis. It is extremely sensitive to small changes in adversary characteristics when the threat is near a systems breaking point, but very insensitive to those changes under other conditions. This makes it difficult to prioritize investment options on the basis of P(E), especially across multiple targets or facilities. To overcome these obstacles, a Sandia National Laboratories Laboratory Directed Research and Development project has developed a risk-based security cost-benefit analysis method. This approach characterizes targets by how difficult it would be for adversaries to exploit each targets vulnerabilities to induce consequences. Adversaries generally have success criteria (e.g., adequate or desired consequences and thresholds for likelihood of success), and choose among alternative strategies that meet these criteria while considering their degree of difficulty in achieving their successful outcome. Investments reduce security risk as they reduce the severity of consequences available and/or increase the difficulty for an adversary to successfully accomplish their most advantageous attack

  2. 75 FR 18867 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-011...

    Science.gov (United States)

    2010-04-13

    ... source categories, retention and disposal, and notification procedure. The Transportation Security... recipients of information about individuals who are their employees, job applicants, or contractors, or.... For each system of records covered by this notice, the retention and disposal sections are updated to...

  3. 75 FR 18863 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-006...

    Science.gov (United States)

    2010-04-13

    ... 12th Street, Arlington, VA, 20598-6036. For privacy issues please contact: Mary Ellen Callahan (703-235... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary [Docket No. DHS-2010-0015] Privacy Act of... Matters Tracking Records AGENCY: Privacy Office, DHS. [[Page 18864

  4. Claims procedures for employee benefit plans--Pension and Welfare Benefits Administration, Department of Labor. Request for information.

    Science.gov (United States)

    1997-09-08

    This document requests information from the public concerning the advisability of amending the existing regulation under the Employee Retirement Income Security Act of 1974 (ERISA) that establishes minimum requirements for employee benefit plan claims procedures. The term "claims procedure" refers to the process that employee benefit plans must provide for participants and beneficiaries who seek to obtain pension or welfare plan benefits, including requests for medical treatment or services, consideration of claims, and review of denials of claims by plans. The primary purpose of this notice is to obtain information to assist the Department of Labor (the Department) in evaluating (1) the extent to which the current claims procedure regulation assures that group health plan participants and beneficiaries are provided with effective and timely means to file and resolve claims for health care benefits, and (1) whether and in what way the existing minimum requirements should be amended with respect to group health plans covered by ERISA. The furnished information also will assist the Department in determining whether the regulation should be amended with respect to pension plans covered by ERISA and in developing legislative proposals to address any identified deficiencies relating to the claims procedures that cannot be addressed by amending the current regulation.

  5. The Potential Effects of Obesity on Social Security Claiming Behavior and Retirement Benefits.

    Science.gov (United States)

    Knoll, Melissa A Z; Shoffner, Dave; O'Leary, Samantha

    2018-04-16

    Obesity prevalence among Americans has increased for nearly three decades. We explore the relationship between the rise in obesity and Social Security retirement benefit claiming, a decision impacting nearly all aging Americans. Specifically, we investigate whether obesity can affect individuals' decision to claim benefits early, a choice that has important implications for financial security in retirement, particularly for those with lower socioeconomic status (SES). We use a microsimulation model called MINT6 (Modeling Income in the Near Term, version 6) to demonstrate the potential effects of obesity on subjective life expectancy and claiming behavior. We impute obesity status using data from the National Health and Nutrition Examination Survey (NHANES), which describes the distribution of obesity prevalence within the United States by gender, poverty status, and race/ethnicity. We find that the rise in obesity and the consequent incidence of obesity-related diseases may lead some individuals to make claiming decisions that lead to lower monthly and lifetime Social Security retirement benefits. Further, we find that the potential economic impact of this decision is larger for those with lower SES. We present a behavioral perspective by addressing the potential effects that obesity can have on individuals' retirement decisions and their resulting Social Security retirement benefits.

  6. 76 FR 66637 - Prohibited Transaction Exemption Procedures; Employee Benefit Plans

    Science.gov (United States)

    2011-10-27

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 29 CFR Part 2570 RIN 1210-AB49 Prohibited Transaction Exemption Procedures; Employee Benefit Plans AGENCY: Employee Benefits Security... Determinations, Employee Benefits Security Administration, Room N-5700, U.S. Department of Labor, Washington, DC...

  7. Prevalence of temporary social security benefits due to respiratory disease in Brazil.

    Science.gov (United States)

    Ildefonso, Simone de Andrade Goulart; Barbosa-Branco, Anadergh; Albuquerque-Oliveira, Paulo Rogério

    2009-01-01

    To determine the prevalence of temporary social security benefits due to respiratory disease granted to employees, as well as the number of lost workdays and costs resulting from those in Brazil between 2003 and 2004. Cross-sectional study using data obtained from the Unified System of Benefits of the Brazilian Institute of Social Security (INSS, Instituto Nacional de Seguro Social) and the Brazilian Social Registry Database. Data regarding gender, age, diagnosis and type of economic activity, as well as type, duration and cost of benefits, were compiled. Respiratory diseases accounted for 1.3% of the total number of temporary social security benefits granted by INSS, with a prevalence rate of 9.92 (per 10,000 employment contracts). Females and individuals older than 50 years of age were the most affected. Non-work-related benefits were more common than were work-related benefits. The most prevalent diseases were pneumonia, asthma and COPD, followed by laryngeal and vocal cord diseases. The most prevalent types of economic activity were auxiliary transportation equipment manufacturing, tobacco product manufacturing and computer-related activities. The mean duration of benefits was 209.68 days, with a mean cost of R$ 4,495.30 per occurrence. Respiratory diseases caused by exogenous agents demanded longer sick leave (mean, 296.72 days) and greater cost (mean, R$ 7,105.74). The most prevalent diseases were airway diseases and pneumonia. Workers from auxiliary transportation equipment manufacturing, tobacco product manufacturing and computer-related activities were the most affected. Diseases caused by exogenous agents demanded longer sick leaves and resulted in greater costs.

  8. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ...; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM.... SUPPLEMENTARY INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Public Law (Pub... computer matching involving the Federal government could be performed and adding certain protections for...

  9. Obtaining Knowledge for Innovation: Benefits and Harms of Procedures for Managing Information Security

    Directory of Open Access Journals (Sweden)

    José Geraldo Pereira Barbosa

    2012-06-01

    Full Text Available The research reported in this article aims to describe how the processes of information security used in a manufacturing and packaging paper company influenced the attainment of knowledge on two innovations. The study was conducted through field research, using interviews, narratives, direct observation and thematic analysis for data collection and data processing. The research started from the assumption that even considering the importance of managing information security and its benefits to an organization, the processes of logical security, and physical access controls, would undermine the process of obtaining and transference of knowledge required by innovations. It was observed the presence of five instruments of physical and logical security: "confidentiality", "general control of protection", "antivirus", "backups" and "facility security procedures" which did not interfere negatively in obtaining knowledge. The single barrier identified for the transfer of knowledge was the lack of absorptive capacity of knowledge workers. Therefore, the case describes a situation where a clearly and consistent information security policy allowed the obtaining and transferring of knowledge necessary for innovation. In other words, the assumption of the research was rejected by the findings.

  10. Cost and Benefit Analysis of an Automated Nursing Administration System: A Methodology*

    OpenAIRE

    Rieder, Karen A.

    1984-01-01

    In order for a nursing service administration to select the appropriate automated system for its requirements, a systematic process of evaluating alternative approaches must be completed. This paper describes a methodology for evaluating and comparing alternative automated systems based upon an economic analysis which includes two major categories of criteria: costs and benefits.

  11. 20 CFR 416.421 - Determination of benefits; computation of prorated benefits.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Determination of benefits; computation of prorated benefits. 416.421 Section 416.421 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Amount of Benefits § 416.421 Determination of benefits...

  12. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  13. Applicants' preference for impression management tactic in employment interviews by Transportation Security Administration.

    Science.gov (United States)

    Scudder, Joseph N; Lamude, Kevin G

    2009-04-01

    Following past findings on employment interviews, this study hypothesized applicants would have a preference for using self-promoting tactics of impression management over other focuses. Self-reports of impression management tactics were collected from 124 applicants who had interviews for screener positions with the Transportation Security Administration. Contrary to the hypothesis, analysis indicated participants reported they used more ingratiation tactics attempting to praise the interviewer than self-promotion tactics which focused on their own accomplishments. Special qualifications for security jobs which required well-developed perceptual abilities and the controlling structure of the interview context were perhaps responsible for present results differing from prior findings.

  14. Self-administration of cocaine, cannabis and heroin in the human laboratory: benefits and pitfalls

    OpenAIRE

    Haney, Margaret

    2008-01-01

    The objective of this review is to describe self-administration procedures for modeling addiction to cocaine, cannabis and heroin in the human laboratory, the benefits and pitfalls of the approach, and the methodological issues unique to each drug. In addition, the predictive validity of the model for testing treatment medications will be addressed. The results show that all three drugs of abuse are reliably and robustly self-administered by non-treatment-seeking research volunteers. In terms...

  15. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  16. 20 CFR 416.105 - Administration.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Administration. 416.105 Section 416.105 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Introduction, General Provisions and Definitions § 416.105 Administration. The Supplemental...

  17. Prevalence and duration of social security benefits allowed to workers with asthma in Brazil in 2008.

    Science.gov (United States)

    Branco, Anadergh Barbosa de Abreu; Ildefonso, Simone de Andrade Goulart

    2012-01-01

    To determine the prevalence and duration of social security benefits (SSBs) claims to registered workers with asthma in Brazil by the Brazilian National Institute of Social Security in 2008. This was a retrospective, descriptive study, based on information obtained from the Brazilian Unified Benefit System database, on the number of SSB claims granted to registered workers with asthma in 2008. The reference population was the monthly mean number of workers registered in the Brazilian Social Registry Database in 2008. The variables studied were type of economic activity, gender, age, and type/duration of the SSB claim. The relationship between work and asthma was evaluated by the prevalence ratio (PR) between work-related and non-work-related SSB claims for asthma. In 2008, 2,483 SSB claims were granted for asthma, with a prevalence of 7.5 allowances per 100,000 registered workers. The prevalence was higher among females than among males (PR = 2.1 between the sexes). Workers > 40 years of age were 2.5 times more likely to be granted an SSB claim for asthma than were younger workers. The prevalence was highest among workers engaged in the following types of economic activity: sewage, wood and wood product manufacturing, and furniture manufacturing (78.8, 22.4, and 22.2 claims/100,000 registered workers, respectively). The median (interquartile range) duration of SSB claims for asthma was 49 (28-87) days. Asthma is a major cause of sick leave, and its etiology has a strong occupational component. This has a major impact on employers, employees, and the social security system. Being female, being > 40 years of age, and working in the areas of urban sanitation/sewage, wood and wood product manufacturing, and furniture manufacturing increase the chance of sick leave due to asthma.

  18. Assessing work disability for social security benefits: international models for the direct assessment of work capacity.

    Science.gov (United States)

    Geiger, Ben Baumberg; Garthwaite, Kayleigh; Warren, Jon; Bambra, Clare

    2017-08-25

    judgement of skilled professionals). While it is possible to implement a direct assessment of work capacity for social security benefits, further research is necessary to understand how best to maximise validity, legitimacy, and cost-effectiveness.

  19. Nuclear Materials Management U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office (NNSA/NSO)

    International Nuclear Information System (INIS)

    Jesse Schreiber

    2008-01-01

    In light of the changing Defense Complex mission, the high cost to storing and protecting nuclear materials, and in consideration of scarcity of resources, it is imperative that the U.S. Department of Energy (DOE) owned nuclear materials are managed effectively. The U.S. Department of Energy, National Nuclear Security Administration (NNSA) Strategic Action Plan outlines the strategy for continuing to meet America's nuclear security goals, meeting the overall mission challenges of DOE and NNSA as well as giving focus to local missions. The mission of the NNSA/NSO Nuclear Materials Management (NMM) Program is to ensure that nuclear material inventories are accurately assessed and reported, future material needs are adequately planned, and that existing Nevada Test Site (NTS) inventories are efficiently utilized, staged, or dispositioned. The NNSA/NSO understands that the NTS has unique characteristics to serve and benefit the nation with innovative solutions to the complex problems involving Special Nuclear Materials, hazardous materials, and multi-agency, integrated operations. The NNSA/NSO is defining infrastructure requirements for known future missions, developing footprint consolidation strategic action plans, and continuing in the path of facility modernization and improvements. The NNSA/NSO is striving for the NTS to be acknowledged as an ideal location towards mission expansion and growth. The NTS has the capability of providing isolated, large scale construction and development locations for nuclear power or alternate energy source facilities, expanded nuclear material storage sites, and for new development in 'green' technology

  20. OASDI Beneficiaries and Benefits by State, 2014

    Data.gov (United States)

    Social Security Administration — This annual map focuses on the Social Security beneficiary population receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the state level in...

  1. OASDI Beneficiaries and Benefits by State- 2015

    Data.gov (United States)

    Social Security Administration — This annual map focuses on the Social Security beneficiary population receiving Old-Age, Survivors, and Disability Insurance (OASDI) benefits at the state level in...

  2. Changes in Spending and Labor Supply in Response to a Social Security Benefit Cut: Evidence from Stated Choice Data.

    Science.gov (United States)

    Delavande, Adeline; Rohwedder, Susann

    2017-12-01

    We investigate how individuals in the U.S. expect to adjust their labor force participation and savings if Social Security benefits were cut by 30 percent. Respondents were asked directly what they would do under this scenario. Using the resulting stated choice data we find that respondents would on average reduce spending by 18.2 percent before retirement and 20.4 percent after retirement. About 34.1% of respondents state they would definitely work longer and they would postpone claiming Social Security by 1.1 years. We investigate how working longer and claiming Social Security later would compensate partially for the loss in benefits among the individuals who are currently working, under the assumption that individuals retire and claim at the same time. Individuals would increase their Social Security benefits from the post-reform level due to additional earnings entering the benefit calculation and a smaller early claiming penalty (or higher delayed claiming credit). As a result, the Social Security benefit people would receive would drop on average by 21 rather than 30 percent. Still, the net financial loss, even after accounting for additional earnings, is sizeable for individuals in the lowest wealth tertile.

  3. Social Security Rulings on Federal Old-Age, Survivors, Disability, Health Insurance, Supplemental Security Income, and Black Lung Benefits. Cumulative Bulletin 1976.

    Science.gov (United States)

    Social Security Administration (DHEW), Washington, DC.

    The purpose of this publication is to make available to the public official rulings relating to the Federal old-age, survivors, disability, health insurance, supplemental security income, and miners' benefit programs. The rulings contain precedential case decisions, statements of policy and interpretations of the law and regulations. Included is a…

  4. A systematic review on clinical benefits of continuous administration of beta-lactam antibiotics.

    Science.gov (United States)

    Roberts, Jason A; Webb, Steven; Paterson, David; Ho, Kwok M; Lipman, Jeffrey

    2009-06-01

    The clinical benefits of extended infusion or continuous infusion of beta-lactam antibiotics remain controversial. We systematically reviewed the literature to determine whether any clinical benefits exist for administration of beta-lactam antibiotics by extended or continuous infusion. PubMed (January 1950 to November 2007), EMBASE (1966 to November 2007), and the Cochrane Controlled Trial Register were searched (updated November 2007). Randomized controlled trials (RCTs) were meta-analyzed, and observational studies were described by two unblinded reviewers. A total of 846 patients from eligible prospective randomized controlled studies were included in the meta-analysis. Two observational studies were deemed appropriate for description. A meta-analysis of prospective RCTs was undertaken using Review Manager. Among a total of 59 potentially relevant studies, 14 RCTs involving a total of 846 patients from nine countries were deemed appropriate for meta-analysis. The use of continuous infusion of a beta-lactam antibiotic was not associated with an improvement in clinical cure (n = 755 patients; odds ratio: 1.04, 95% confidence interval: 0.74-1.46, p = 0.83, I = 0%) or mortality (n = 541 patients; odds ratio: 1.00, 95% confidence interval: 0.48-2.06, p = 1.00, I = 14.8%). All RCTs except one used a higher antibiotic dose in the bolus administration group. Two observational studies, not pooled because they did not meet the a priori criteria for meta-analysis, showed that beta-lactam administration by extended or continuous infusion was associated with an improvement in clinical cure. The difference in the results between the meta-analysis results and the observational studies could be explained by the bias created by a higher dose of antibiotic in the bolus group in the RCTs and because many of the RCTs only recruited patients with a low acuity of illness. The limited data available suggest that continuous infusion of beta-lactam antibiotics leads to the same

  5. Administration of additional inactive iodide during radioiodine therapy for Graves' disease. Who might benefit?

    International Nuclear Information System (INIS)

    Dietlein, M.; Moka, D.; Reinholz, U.; Schmidt, M.; Schomaecker, K.; Schicha, H.; Wellner, U.

    2007-01-01

    Aim: Graves' hyperthyroidism and antithyroid drugs empty the intrathyroid stores of hormones and iodine. The consequence is rapid 131 I turnover and impending failure of radioiodine therapy. Can administration of additional inactive iodide improve 131I kinetics? Patients, methods: Fifteen consecutive patients, in whom the 48 h post-therapeutically calculated thyroid dose was between 150 and 249 Gy due to an unexpectedly short half-life, received 3 x 200 μg inactive potassium-iodide ( 127 I) daily for 3 days (Group A), while 17 consecutive patients with a thyroid dose of = 250 Gy (Group B) served as the non-iodide group. 48 hours after 131 I administration (M1) and 4 or 5 days later (M2) the following parameters were compared: effective 131 I half-life, thyroid dose, total T3, total T4, 131 I-activity in the T3- and T4-RIAs. Results: In Group A, the effective 131 I half-life M1 before iodine (3.81 ± 0.93 days) was significantly (p 131 I half-life M2 (4.65 ± 0.79 days). Effective 131 I half-life M1 correlated with the benefit from inactive 127 I (r = -0.79): Administration of 127 I was beneficial in patients with an effective 131 I half-life M1 of 131 I activity of T3 and T4 showed lower specific 131 I activity after addition of inactive iodine compared with patients from the same group with a lower initial specific 131 I activity of T3 and T4 and compared with the patient group B who was given no additional inactive iodide. This correlation was mathematically described and reflected in the flatter gradient in Group A (y = 0.5195x + 0.8727 for 131 I T3 and y = 1.0827x - 0.4444 for 131 I T4) and steeper gradient for Group B (y = 0.6998x + 0.5417 for 131 I T3 and y = 1.3191x - 0.2901 for 131 I T4). Radioiodine therapy was successful in all 15 patients from Group A. Conclusion: The administration of 600 μg inactive iodide for three days during radioiodine therapy in patients with Graves' hyperthyroidism and an unexpectedly short half-life of <3 or 4 days was a safe

  6. Privacy in confidential administrative micro data: implementing statistical disclosure control in a secure computing environment.

    Science.gov (United States)

    Hochfellner, Daniela; Müller, Dana; Schmucker, Alexandra

    2014-12-01

    The demand for comprehensive and innovative data is constantly growing in social science. In particular, micro data from various social security agencies become more and more attractive. In contrast to survey data, administrative data offer a census with highly reliable information but are restricted in their usage. To make them accessible for researchers, data or research output either have to be anonymized or released after disclosure review procedures have been used. This article discusses the trade-off between maintaining a high capability of research potential while protecting private information, by exploiting the data disclosure portfolio and the adopted disclosure strategies of the Research Data Center of the German Federal Employment Agency. © The Author(s) 2014.

  7. Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Long, J.D.

    2013-01-01

    The IAEA has described the Safeguards by Design (SBD) concept as an approach in which international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning. Often, international safeguards features are added following completion of the facility design. Earlier consideration of safeguards features has the potential to reduce the need for costly re-designs or retrofits of the facility and can result in a more efficient and effective safeguards design. The U.S. Department of Energy's National Nuclear Security Administration (NNSA) initiated a project in 2008 through its Next Generation Safeguards Initiative (NGSI) to establish a global norm for the use of SBD. The NGSI SBD program is evolving in parallel with a similar effort at the IAEA, while taking into account the IAEA's SBD achievements and future plans. The NGSI program includes DOE laboratory studies, international workshops, engagement with industry and the IAEA, and setting an example through its planned use in new nuclear facilities in the United States. Consistent with this effort, the NGSI program has sponsored 'Lessons Learned' studies and the preparation of facility-specific SBD Guidance documents. The NGSI program also takes into account successes that the NNSA has had with implementing safeguards early into facility designs within the U.S. The purpose of this paper is the presentation of the most recent developments in SBD under NGSI within the U.S. as well as the presentation of 'Lessons Learned' integrating safeguards into new nuclear facility designs of the U.S. Nuclear Security Enterprise (NSE), namely the Uranium Processing Facility (UPF) project at the Y-12 National Security Complex in Oak Ridge, Tennessee and to discuss its relevance to international safeguards. The paper is followed by the slides of the presentation. (author)

  8. Annual Waste Minimization Summary Report for the National Nuclear Security Administration Nevada Site Office

    International Nuclear Information System (INIS)

    Alfred J. Karns

    2007-01-01

    This report summarizes the waste minimization efforts undertaken by National Security Technologies, LLC (NSTec), for the U. S. Department of Energy (DOE) National Nuclear Security Administration Nevada Site Office (NNSA/NSO), during CY06. This report was developed in accordance with the requirements of the Nevada Test Site (NTS) Resource Conservation and Recovery Act (RCRA) Permit ((number s ign)NEV HW0021) and as clarified in a letter dated April 21, 1995, from Paul Liebendorfer of the Nevada Division of Environmental Protection to Donald Elle of the DOE, Nevada Operations Office. The NNSA/NSO Pollution Prevention (P2) Program establishes a process to reduce the volume and toxicity of waste generated by the NNSA/NSO and ensures that proposed methods of treatment, storage, and/or disposal of waste minimize potential threats to human health and the environment. The following information provides an overview of the P2 Program, major P2 accomplishments during the reporting year, a comparison of the current year waste generation to prior years, and a description of efforts undertaken during the year to reduce the volume and toxicity of waste generated by the NNSA/NSO

  9. Guidelines for development of NASA (National Aeronautics and Space Administration) computer security training programs

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    The report presents guidance for the NASA Computer Security Program Manager and the NASA Center Computer Security Officials as they develop training requirements and implement computer security training programs. NASA audiences are categorized based on the computer security knowledge required to accomplish identified job functions. Training requirements, in terms of training subject areas, are presented for both computer security program management personnel and computer resource providers and users. Sources of computer security training are identified.

  10. Guidelines for developing NASA (National Aeronautics and Space Administration) ADP security risk management plans

    Science.gov (United States)

    Tompkins, F. G.

    1983-01-01

    This report presents guidance to NASA Computer security officials for developing ADP security risk management plans. The six components of the risk management process are identified and discussed. Guidance is presented on how to manage security risks that have been identified during a risk analysis performed at a data processing facility or during the security evaluation of an application system.

  11. Demonstration of Security Benefits of Renewable Generation at FE Warren Air Force Base

    International Nuclear Information System (INIS)

    Warwick, William M.; Myers, Kurt; Seifert, Gary

    2010-01-01

    Report detailing field demonstration of security benefits of renewable generation at FE Warren Air Force Base. The 2006 National Defense Appropriations Act directed the Department of Defense (DOD) to coordinate the testing of a wind turbine (new to the U.S. market) at an Air Force installation as a follow on to analyses conducted by the Pacific Northwest National Laborabory (PNNL) as part of the 2005 DOD Renewable Assessment. The earlier study simulated the performance of renewable power produced from wind turbines, solar photovoltaics and geothermal energy as part of a Base-wide energy security solution. The simulation concluded that integration of renewable generating resources with emergency generators, typically diesel-fired, could significantly enhance energy security and extend power supplies during prolonged commercial grid power outages. A simulation is insufficient to convince skeptics of the reliability of renewable resources, especially those that produce power only intermittently, like wind and solar. Therefore, Congress requested a field demonstration be performed using a wind turbine because wind power is the most erratic of all renewable resources. Following this direction, the Air Force identified a site for the wind turbine demonstration and contracted with the Idaho National Laboratory (INL) and PNNL to conduct the demonstration and implement other provisions in the appropriation bill. INL identified a wind turbine that met the legislative requirements (the Gamesa G-80), and with the support of PNNL and the Air Force, selected FE Warren Air Force Base for the demonstration. FE Warren has an excellent wind resource and was already a host to two wind turbines and could accommodate a third. The G-80 is rated at 2 MWs versus the two existing 660 kW turbines, consequently wind production would more than double. Procurement, siting, and acceptance testing of the new turbine was completed in early 2010. The field test was conducted in late April 2010

  12. Administration of additional inactive iodide during radioiodine therapy for Graves' disease. Who might benefit?

    Energy Technology Data Exchange (ETDEWEB)

    Dietlein, M.; Moka, D.; Reinholz, U.; Schmidt, M.; Schomaecker, K.; Schicha, H.; Wellner, U. [Koeln Univ. (Germany). Dept. of Nuclear Medicine

    2007-07-01

    Aim: Graves' hyperthyroidism and antithyroid drugs empty the intrathyroid stores of hormones and iodine. The consequence is rapid {sup 131}I turnover and impending failure of radioiodine therapy. Can administration of additional inactive iodide improve 131I kinetics? Patients, methods: Fifteen consecutive patients, in whom the 48 h post-therapeutically calculated thyroid dose was between 150 and 249 Gy due to an unexpectedly short half-life, received 3 x 200 {mu}g inactive potassium-iodide ({sup 127}I) daily for 3 days (Group A), while 17 consecutive patients with a thyroid dose of = 250 Gy (Group B) served as the non-iodide group. 48 hours after {sup 131}I administration (M1) and 4 or 5 days later (M2) the following parameters were compared: effective {sup 131}I half-life, thyroid dose, total T3, total T4, {sup 131}I-activity in the T3- and T4-RIAs. Results: In Group A, the effective {sup 131}I half-life M1 before iodine (3.81 {+-} 0.93 days) was significantly (p <0.01) shorter than the effective {sup 131}I half-life M2 (4.65 {+-} 0.79 days). Effective {sup 131}I half-life M1 correlated with the benefit from inactive {sup 127}I (r = -0.79): Administration of {sup 127}I was beneficial in patients with an effective {sup 131}I half-life M1 of <3 or 4 days. Patients from Group A with high initial specific {sup 131}I activity of T3 and T4 showed lower specific {sup 131}I activity after addition of inactive iodine compared with patients from the same group with a lower initial specific {sup 131}I activity of T3 and T4 and compared with the patient group B who was given no additional inactive iodide. This correlation was mathematically described and reflected in the flatter gradient in Group A (y = 0.5195x + 0.8727 for {sup 131}I T3 and y = 1.0827x - 0.4444 for {sup 131}I T4) and steeper gradient for Group B (y = 0.6998x + 0.5417 for {sup 131}I T3 and y = 1.3191x - 0.2901 for {sup 131}I T4). Radioiodine therapy was successful in all 15 patients from Group A

  13. Social security administration in India- study of provident funds and pension scheme

    OpenAIRE

    Rao, Madhava P

    2005-01-01

    Social Security is becoming a distinct part of social policy of India and the time has come to give a serious thought to ever increasing Social Security needs of the population. There are diversified views on extension of Social Security coverage. Some say it should be limited to only working population and to their families and while others say that the entire population should be covered under Social Security programmes. Social Security schemes further have been branched out as protective...

  14. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    International Nuclear Information System (INIS)

    Madden, Michael S.

    2010-01-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  15. 20 CFR 416.501 - Payment of benefits: General.

    Science.gov (United States)

    2010-04-01

    ...: General. Payment of SSI benefits will be made for the month after the month of initial eligibility and for... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Payment of benefits: General. 416.501 Section 416.501 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED...

  16. 45 CFR 1336.67 - Security and collateral: Responsibilities of the Loan Administrator.

    Science.gov (United States)

    2010-10-01

    ... inventory or proceeds of inventory sales as well as marketable securities and cash collateral accounts. (1... security at any time during the term of the loan if after review and monitoring an assessment indicates the...

  17. Use of the Social Security Administration Death Master File for ascertainment of mortality status

    Directory of Open Access Journals (Sweden)

    Whitcomb Brian W

    2004-03-01

    Full Text Available Abstract Objectives Internet sources that use the Social Security Administration's (SSA Death Master File have demonstrated high sensitivity among males for detection of mortality status in comparisons to the National Death Index, but the sensitivity has not been investigated for other demographic groups. Methods The authors used the SSA Death Master File to determine the mortality status of 374 decedents from the ongoing Patient Outcomes Study at Cedars-Sinai Medical Center whose deaths were confirmed by physicians using hospital records. Results Decedents identified by the SSA Death Master File were significantly older than those not identified. Foreign-born decedents were significantly less likely to be identified as dead than American-born decedents. Gender and marital status were not significant factors for identification by the SSA Death Master File. Conclusion The results of this study suggest that Internet sources may be used as an inexpensive and effective tool for determination of mortality status. However, among certain populations use of these databases alone may provide incomplete information.

  18. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  19. The Effect of Disability Insurance on Health Investment: Evidence from the Veterans Benefits Administration's Disability Compensation Program

    Science.gov (United States)

    Singleton, Perry

    2009-01-01

    I examine whether individuals respond to monetary incentives to detect latent medical conditions. The effect is identified by a policy that deemed diabetes associated with herbicide exposure a compensable disability under the Veterans Benefits Administration's Disability Compensation program. Since a diagnosis is a requisite for benefit…

  20. Academic Benefits of Transitional Bilingual Education: A Literary Review, Staff Development, and Guidebook for Elementary Administrators and Educators.

    Science.gov (United States)

    Nunez, Jean Ann; Karr-Kidwell, PJ

    This paper provides a literature review, staff development information, and a guidebook for elementary administrators and educators that explains the academic benefits of Transitional Bilingual Education (TBE) for prekindergarten through fifth grade students. TBE allows limited English speaking students to learn a second language while being…

  1. Administrative Circular No. 30 (Rev. 3) - “Financial benefits on taking up appointment and on termination of contract”

    CERN Multimedia

    2013-01-01

    Administrative Circular No. 30 (Rev. 3) entitled “Financial benefits on taking up appointment and on termination of contract”, approved by the Director-General following discussion at the Standing Concertation Committee meeting of 27 June 2013 and entering into force on 1 August 2013, is available on the intranet site of the Human Resources Department (see here).   Administrative Circular No. 30 (Rev. 3) is applicable to all members of the personnel. It cancels and replaces Administrative Circular No. 30 (Rev. 2/Corr.) entitled "Financial benefits on taking up appointment and on termination of contract” of September 2009. This circular was revised in order to implement the modifications introduced into the Staff Rules and Regulations in January 2013 relating to the introduction of the status of Associate Member States and new categories of associated members of the personnel. In particular, the notion of “Member State” in Annexe II (&a...

  2. Developing a Leadership Development Program for the Veterans Benefits Administration within the Department of Veterans Affairs

    Science.gov (United States)

    2014-06-13

    highest priorities: Veteran homelessness, “ VBA access ” to allow improved awareness of available VA services and benefits, and the backlog of benefits...Veterans by 2015. VBA access refers to improved Veteran awareness of the various VA benefits and services available, particularly through outreach and...claim completion time. While all three of these priorities impact VBA , the second two--increased access and decreased backlog--directly relate to

  3. Development of a computer-adaptive physical function instrument for Social Security Administration disability determination.

    Science.gov (United States)

    Ni, Pengsheng; McDonough, Christine M; Jette, Alan M; Bogusz, Kara; Marfeo, Elizabeth E; Rasch, Elizabeth K; Brandt, Diane E; Meterko, Mark; Haley, Stephen M; Chan, Leighton

    2013-09-01

    To develop and test an instrument to assess physical function for Social Security Administration (SSA) disability programs, the SSA-Physical Function (SSA-PF) instrument. Item response theory (IRT) analyses were used to (1) create a calibrated item bank for each of the factors identified in prior factor analyses, (2) assess the fit of the items within each scale, (3) develop separate computer-adaptive testing (CAT) instruments for each scale, and (4) conduct initial psychometric testing. Cross-sectional data collection; IRT analyses; CAT simulation. Telephone and Internet survey. Two samples: SSA claimants (n=1017) and adults from the U.S. general population (n=999). None. Model fit statistics, correlation, and reliability coefficients. IRT analyses resulted in 5 unidimensional SSA-PF scales: Changing & Maintaining Body Position, Whole Body Mobility, Upper Body Function, Upper Extremity Fine Motor, and Wheelchair Mobility for a total of 102 items. High CAT accuracy was demonstrated by strong correlations between simulated CAT scores and those from the full item banks. On comparing the simulated CATs with the full item banks, very little loss of reliability or precision was noted, except at the lower and upper ranges of each scale. No difference in response patterns by age or sex was noted. The distributions of claimant scores were shifted to the lower end of each scale compared with those of a sample of U.S. adults. The SSA-PF instrument contributes important new methodology for measuring the physical function of adults applying to the SSA disability programs. Initial evaluation revealed that the SSA-PF instrument achieved considerable breadth of coverage in each content domain and demonstrated noteworthy psychometric properties. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  4. 20 CFR 404.1805 - Paying benefits.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Paying benefits. 404.1805 Section 404.1805 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Payment Procedures § 404.1805 Paying benefits. (a) As soon as possible after we have made a determination...

  5. 20 CFR 416.544 - Paying benefits in installments: Drug addiction or alcoholism.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Paying benefits in installments: Drug addiction or alcoholism. 416.544 Section 416.544 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE AGED, BLIND, AND DISABLED Payment of Benefits, Overpayments, and Underpayments § 416.544 Paying benefits in installment...

  6. 75 FR 7551 - Transfer of Accumulated Benefit Payments

    Science.gov (United States)

    2010-02-22

    ...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA-2009-0067] RIN 0960-AH08 Transfer of Accumulated Benefit Payments AGENCY: Social Security Administration (SSA). ACTION: Final rule...

  7. 77 FR 19079 - Removal of Regulations on Black Lung Benefits

    Science.gov (United States)

    2012-03-30

    ... visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY... SOCIAL SECURITY ADMINISTRATION 20 CFR Part 410 [Docket No. SSA-2012-0012] RIN 0960-AH48 Removal of Regulations on Black Lung Benefits AGENCY: Social Security Administration. ACTION: Final rule. SUMMARY: This...

  8. Delivering Summer Electronic Benefit Transfers for Children through the Supplemental Nutrition Assistance Program or the Special Supplemental Nutrition Program for Women, Infants, and Children: Benefit Use and Impacts on Food Security and Foods Consumed.

    Science.gov (United States)

    Gordon, Anne R; Briefel, Ronette R; Collins, Ann M; Rowe, Gretchen M; Klerman, Jacob A

    2017-03-01

    The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC

  9. A Graduate Program in Toxicology: Administrative and Educational Benefits of Interdepartmental Management.

    Science.gov (United States)

    Masten, Lawrence W.

    1979-01-01

    The University of Mississippi School of Pharmacy's Department of Pharmacology offers masters and doctoral programs in toxicology. Its programs and toxicology courses are described, and the administration of these interdisciplinary programs within one department is discussed. (JMD)

  10. 75 FR 71171 - Social Security Disability Program Demonstration Project: Benefit Offset National Demonstration...

    Science.gov (United States)

    2010-11-22

    ... project. Stage 2 Offset and Enhanced Benefits Counseling Treatment Group--We will assign approximately 3... treatment of earnings and the enhanced benefits counseling, depending on their treatment group. Alternate... Treatment Group be eligible for counseling services? A beneficiary assigned to this Stage 2 treatment group...

  11. Japanese Prime Minister Shinzo Abe’s Two Administrations: Successes and Failures of Domestic and Security Policies

    Science.gov (United States)

    2016-12-01

    parties as well. It seemed also difficult to make coalitions among the opposition parties, with their diverse political identities , to win a district...explanations for Abe’s political success in his second administration. Abe’s pragmatism in statecraft mainly originated from his own political experiences...and was crucial for accumulating his political capital and realizing security policy. At the domestic level, political influence from former

  12. 20 CFR 410.706 - Effect of the Social Security Administration determination of entitlement.

    Science.gov (United States)

    2010-04-01

    ... COAL MINE HEALTH AND SAFETY ACT OF 1969, TITLE IV-BLACK LUNG BENEFITS (1969- ) Rules for the Review of Denied and Pending Claims Under the Black Lung Benefits Reform Act (BLBRA) of 1977 § 410.706 Effect of...

  13. Information System Security: Air Force Web Site Administration, Policies, and Practices

    National Research Council Canada - National Science Library

    2002-01-01

    .... Subsequent reports will cover Web site administration within the Army and DoD. The Naval Audit Service plans to issue a separate report based on the audit of Web site administration within the Navy and the Marine Corps...

  14. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    Energy Technology Data Exchange (ETDEWEB)

    Sinars, Daniel [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Scott, Kimberly Carole [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Edwards, M. John [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Olson, Russell Teall [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-10-17

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  15. Pulsed Power Science and Technology: A Strategic Outlook for the National Nuclear Security Administration (Summary)

    International Nuclear Information System (INIS)

    Sinars, Daniel; Scott, Kimberly Carole; Edwards, M. John; Olson, Russell Teall

    2016-01-01

    Major advances in pulsed power technology and applications over the last twenty years have expanded the mission areas for pulsed power and created compelling new opportunities for the Stockpile Stewardship Program (SSP). This summary document is a forward look at the development of pulsed power science and technology (PPS&T) capabilities in support of the next 20 years of the SSP. This outlook was developed during a three-month-long tri-lab study on the future of PPS&T research and capabilities in support of applications to: (1) Dynamic Materials, (2) Thermonuclear Burn Physics and Inertial Confinement Fusion (ICF), and (3) Radiation Effects and Nuclear Survivability. It also considers necessary associated developments in next-generation codes and pulsed power technology as well as opportunities for academic, industry, and international engagement. The document identifies both imperatives and opportunities to address future SSP mission needs. This study was commissioned by the National Nuclear Security Administration (NNSA). A copy of the memo request is contained in the Appendix. NNSA guidance received during this study explicitly directed that it not be constrained by resource limitations and not attempt to prioritize its findings against plans and priorities in other areas of the national weapons program. That prioritization, including the relative balance amongst the three focus areas themselves, must of course occur before any action is taken on the observations presented herein. This unclassified summary document presents the principal imperatives and opportunities identified in each mission and supporting area during this study. Preceding this area-specific outlook, we discuss a cross-cutting opportunity to increase the shot capacity on the Z pulsed power facility as a near-term, cost-effective way to broadly impact PPS&T for SSP as well as advancing the science and technology to inform future SSMP milestones over the next 5-10 years. The final page of the

  16. Administration

    DEFF Research Database (Denmark)

    Bogen handler om den praksis, vi kalder administration. Vi er i den offentlige sektor i Danmark hos kontorfolkene med deres sagsmapper, computere, telefoner,, lovsamlinger,, retningslinier og regneark. I bogen udfoldes en mangfoldighed af konkrete historier om det administrative arbejde fra...... forskellige områder i den offentlige sektor. Hensigten er at forstå den praksis og faglighed der knytter sig til det administrative arbejde...

  17. Future regional nuclear fuel cycle cooperation in East Asia: Energy security costs and benefits

    International Nuclear Information System (INIS)

    Hippel, David von; Hayes, Peter; Kang, Jungmin; Katsuta, Tadahiro

    2011-01-01

    Economic growth in East Asia has rapidly increased regional energy, and especially, electricity needs. Many of the countries of East Asia have sought or are seeking to diversify their energy sources and bolster their energy supply and/or environmental security by developing nuclear power. Rapid development of nuclear power in East Asia brings with it concerns regarding nuclear weapons proliferation associated with uranium enrichment and spent nuclear fuel management. This article summarizes the development and analysis of four different scenarios of nuclear fuel cycle management in East Asia, including a scenario where each major nuclear power user develops uranium enrichment and reprocessing of spent fuel individually, scenarios featuring cooperation in the full fuel cycle, and a scenario where reprocessing is avoided in favor of dry cask storage of spent fuel. The material inputs and outputs and costs of key fuel cycle elements under each scenario are summarized. - Highlights: → We evaluate four scenarios of regional nuclear fuel cycle cooperation in East Asia and the Pacific. → The scenarios cover fuel supply, enrichment, transport, reprocessing, and waste management. → We evaluate nuclear material flows, energy use, costs, and qualitative energy security impacts. → Regional cooperation on nuclear fuel cycle issues can help to enhance energy security. → A regional scenario in which reprocessing is rapidly phased out shows security and cost advantages.

  18. The availability and affordability of long-term care for disabled older people in China: The issues related to inequalities in social security benefits.

    Science.gov (United States)

    Lei, Peng; Feng, Zhixin; Wu, Zhuochun

    2016-01-01

    China is experiencing increasing pressure from issues relating to an ageing population. The rationality of different eligibility criteria of the benefits within the social security system has been widely challenged; however, to date, no previous study has explored its association with the availability and affordability of long-term care (LTC). This study evaluates the availability and affordability of Long-Term Care (LTC) services for disabled older people (aged 65 and above) in China, with special attention to the differences among groups in receipt of specific social security benefits. The data of availability and affordability of LTC services for disabled older people is from a nationally representative sample Chinese Longitudinal Healthy Longevity Survey (CLHLS). Three different social security benefits were identified and their effects on the long-term care services for disabled older people were explored. The overall proportions of disabled older people who have only limited or no available or affordable LTC services were remarkably high, especially for those who have moderate or no social security benefits. Compared to those who are entitled to generous social security benefits, older people who have no social security benefits are 18.45 times more likely to be unable to afford health care expenses. The findings imply that policy makers in China could focus on the LTC needs for the social security and socioeconomically disadvantaged (who have limited or no social security benefits and in low household income) disabled older people which could reduce the gap between them and those who are entitled to generous social security benefits. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  19. VA INFORMATION SYSTEMS: Computer Security Weaknesses Persist at the Veterans Health Administration

    National Research Council Canada - National Science Library

    2000-01-01

    .... To determine the status of computer security within VHA, we (1) evaluated information system general controls at the VA Maryland Health Cafe System, the New Mexico VA Health Care System, and the VA North Texas Health Care System and (2...

  20. A Cost Benefit Analysis of Security at the Naval Postgraduate School

    National Research Council Canada - National Science Library

    Lakamp, David

    2003-01-01

    .... The present value approach was used as a guide to compare the cost of preventative measures against a physical attack and the value of benefits preserved by a deterred attack, Often, cost is simply...

  1. Demographics and Volatile Social Security Wealth: Political Risks of Benefit Rule Changes in Germany

    OpenAIRE

    Christoph Borgmann; Matthias Heidler

    2003-01-01

    In this paper we address the question how the generosity of the benefit rule of the German public pension system has changed during the past three decades and how this development can be explained by demographic changes. Firstly, we illustrate the political risk of benefit rule changes for individuals. We find that depending on the birth year and the considered scenario the relative losses vary between 30 and nearly 60 percent. Secondly, we estimate how demographic developments have triggered...

  2. Cost-benefit functions for the allocation of security sensors for air contaminants

    International Nuclear Information System (INIS)

    Lambert, James H.; Farrington, Mark W.

    2007-01-01

    In this paper, we study various functional forms of the cost-benefit function in a context of risk analysis and multi-objective decision-making for the allocation of hazard protection. An approach of benefit-cost analysis under uncertainty is used. The study identifies measures of hazard intensity and population exposure as well as additional parameters that influence assessments of benefits and costs. Parameter uncertainties are propagated by numerical interval analysis. Several tiers of the uncertainty of the benefit-to-cost ratio are generated to compare hazard intensity and population exposure in multi-objective tradeoff analysis. We develop an example application with the allocation of chemical, biological, and radiological air contaminant sensors throughout a region. The sensors provide local protection to non-identical sectors of the population that are exposed to non-identical intensities of the hazard. The results illuminate the significance of the cost-benefit function for the allocation of sensors. The paper has implications for anti-terrorism, disaster preparedness, transportation safety, and other areas of public safety

  3. Do Boys Benefit from Male Teachers in Elementary School? Evidence from Administrative Panel Data

    OpenAIRE

    Puhani, Patrick A.

    2017-01-01

    With girls having overtaken boys in many education indicators, the 'feminization' of elementary school teaching is causing debates about disadvantages for male students. Using administrative panel data on the universe of students, teachers and schools for a German state, I exploit within school and within teacher variation to determine teacher characteristics' effects on students' tracking outcomes. Germany tracks students at age 10 into more or less academic school types. I find hardly any e...

  4. Psychiatric legal investigation for sickness benefits due to disability at the Brazilian Federal Social Security Special Court in Florianópolis, capital city of the State of Santa Catarina, southern Brazil.

    Science.gov (United States)

    Figueredo, Roberto; Damas, Fernando Balvedi

    2015-01-01

    To describe the profile of insured individuals that filed claims for sickness benefits and compare the results of the administrative and legal investigations. This case series included 114 insured persons that filed lawsuits against the Brazilian National Institute of Social Security (Instituto Nacional de Seguridade Social, INSS). They underwent psychiatric examinations required by the Brazilian Federal Social Security Special Court in Florianópolis from August to December 2010. Mean age was 47 years, and participant age ranged from 24 to 64 years. Most insured individuals were women (79%), and most were employed (67.5%) and self-employed (26.5%) workers. Mean contribution time was 99.9 months, ranging from 8 to 352 months. Mean benefit duration was 20.4 months, ranging from 2 to 97 months. The most prevalent category of workers was service workers, store and supermarket salespeople (54.4%), followed by administrative workers (19.3%). Only 17 participants were found to be unable to work after benefit cessation, a 14.9% mismatch between administrative and legal investigations. The most frequent diagnoses were mood disorders (59.6%) and anxiety disorders (17.5%).

  5. Psychiatric legal investigation for sickness benefits due to disability at the Brazilian Federal Social Security Special Court in Florianópolis, capital city of the State of Santa Catarina, southern Brazil

    Directory of Open Access Journals (Sweden)

    Roberto Figueredo

    2015-06-01

    Full Text Available Objective: To describe the profile of insured individuals that filed claims for sickness benefits and compare the results of the administrative and legal investigations.Method: This case series included 114 insured persons that filed lawsuits against the Brazilian National Institute of Social Security (Instituto Nacional de Seguridade Social, INSS. They underwent psychiatric examinations required by the Brazilian Federal Social Security Special Court in Florianópolis from August to December 2010.Results: Mean age was 47 years, and participant age ranged from 24 to 64 years. Most insured individuals were women (79%, and most were employed (67.5% and self-employed (26.5% workers. Mean contribution time was 99.9 months, ranging from 8 to 352 months. Mean benefit duration was 20.4 months, ranging from 2 to 97 months. The most prevalent category of workers was service workers, store and supermarket salespeople (54.4%, followed by administrative workers (19.3%.Conclusions: Only 17 participants were found to be unable to work after benefit cessation, a 14.9% mismatch between administrative and legal investigations. The most frequent diagnoses were mood disorders (59.6% and anxiety disorders (17.5%.

  6. Legal basis and administrative departments for securing and guaranteeing the energy supply

    International Nuclear Information System (INIS)

    Besslich, W.

    1979-01-01

    The headline is no game with the words. It distinguishes between the securing of the supply in times of peace and the guarantee in times of defense during war which is a popular topic again and follows a linguistic term by the Bundesrat of 1915 which was kept alive up to day. (orig.) [de

  7. Pharmacy benefits management in the Veterans Health Administration: 1995 to 2003.

    Science.gov (United States)

    Sales, Mariscelle M; Cunningham, Francesca E; Glassman, Peter A; Valentino, Michael A; Good, Chester B

    2005-02-01

    The Department of Veterans Affairs (VA) Pharmacy Benefits Management Strategic Healthcare Group (VA PBM) oversees the formulary for the entire VA system, which serves more than 4 million veterans and provides more than 108 million prescriptions per year. Since its establishment in 1995, the VA PBM has managed pharmaceuticals and pharmaceutical-related policies, including drug safety and efficacy evaluations, pharmacologic management algorithms, and criteria for drug use. These evidence-based practices promote, optimize, and assist VA providers with the safe and appropriate use of pharmaceuticals while allowing for formulary decisions that can result in substantial cost savings. The VA PBM also has utilized various contracting techniques to standardize generic agents as well as specific drugs and drug classes (eg, antihistamines, angiotensin-converting enzyme inhibitors, alpha-blockers, and 3-hydroxy-3-methylglutaryl coenzyme A reductase inhibitors [statins]). These methods have enabled the VA to save approximately dollar 1.5 billion since 1996 even as drug expenditures continued to rise from roughly dollar 1 billion in fiscal year (FY) 1996 to more than dollar 3 billion in FY 2003. Furthermore, the VA PBM has established an outcomes research section to undertake quality-improvement and safety initiatives that ultimately monitor and determine the clinical impact of formulary decisions on the VA system nationwide. The experiences of this pharmacy benefits program, including clinical and contracting processes/procedures and their impact on the VA healthcare system, are described.

  8. Administrative Subpoenas and National Security Letters in Criminal and Foreign Intelligence Investigations: Background and Proposed Adjustments

    National Research Council Canada - National Science Library

    Doyle, Charles

    2005-01-01

    .... Several statutes at least arguably authorize the use of administrative subpoenas primarily or exclusively for use in a criminal investigation in cases involving health care fraud, child abuse, Secret...

  9. Investigating the Benefits and Drawbacks of Realigning the National Guard Under the Department of Homeland Security

    Science.gov (United States)

    2016-08-01

    and opinions regarding potential drawbacks to date. While the drawbacks noted are significant, we also identified several poten- tial benefits to...defend, as it deals entirely in hypothet- ical situations and is based solely on the opinions and conjecture of those interviewed. Nonetheless, stream...of Staff, Homeland Defense, Joint Publica - tion 3-27, Washington, DC: Joint Chiefs of Staff, July 29, 2013, Ap- pendix A, pp. A-1 – A-6. 9

  10. Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits for fiscal...

  11. Quarterly Data for Spoken Language Preferences of Social Security Retirement and Survivor Claimants (2016-onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for Retirement and Survivor benefits from fiscal...

  12. Potential benefits of employee portals in public administrations: implementation and proactive behaviour towards the organization

    Directory of Open Access Journals (Sweden)

    Héctor Marcos Pérez-Feijoo

    2015-06-01

    Full Text Available The aim of this article is the determination of the advantages achieved through the implementation of an employee portal, both for the government and for the users of the portal. We proposed an adaptation of the Huang, Jin and Yang (2004 model, based on the organizational support theory (Eisenberger et al., 1986. This theory predicts a proactive behaviour of employees wheter they perceive a support of the organization. In this case, the trigger for that perception is the satisfaction derived by the benefits to personnel provided by an employee portal. Through an empirical study, conducted among public school teachers, we have found evidence of the perception of organizational support among public employees when the portal is deployes. However we haven´t found a link between that support and a proactive behaviour towards the organization.

  13. 20 CFR 416.405 - Cost-of-living adjustments in benefits.

    Science.gov (United States)

    2010-04-01

    ... which the title II benefits are being increased based on the Consumer Price Index, or, if greater, the... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Cost-of-living adjustments in benefits. 416.405 Section 416.405 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME...

  14. Mitigating Insider Threats in the Domestic Aviation System: Policy Options for the Transportation Security Administration

    Science.gov (United States)

    2017-12-01

    Birmingham Airport to come up with a set of short-, mid-, and long-term initiatives for its employees. The first step was to pull the top layer of...programs are defensive and akin to a goalie patrolling the net. They know what they are defending against and the area (goal) they are protecting...Unfortunately, even the best goalies from time to time have the ball kicked past them. At their core, security programs can be split into two main

  15. Biodiversity, climate change and complexity: An opportunity for securing co-benefits?

    Energy Technology Data Exchange (ETDEWEB)

    Roe, Dilys

    2006-10-15

    Climate change and biodiversity loss are both major environmental concerns, yet the links between them often go unrecognised. Not only does the science of climate change and biodiversity share similar characteristics, but climate change both affects, and is affected by biodiversity. Diversity confers far greater resilience on natural systems, thus reducing their vulnerability – and the vulnerability of the people that depend upon them – to climate change. Yet climate adaptation and mitigation strategies that are blind to biodiversity can undermine this natural and social resilience. Ignoring the links between biodiversity and climate risks exacerbates the problems associated with climate change and represents a missed opportunity for maximising co-benefits.

  16. Focus on Energy Security. Costs, Benefits and Financing of Holding Emergency Oil Stocks

    Energy Technology Data Exchange (ETDEWEB)

    Stelter, Jan; Nishida, Yuichiro

    2013-07-01

    Oil is traded in a market where uncertainty, price volatility, and sudden supply disruptions are common characteristics. Natural disasters, political disagreements and wars can seriously disrupt oil supply and demand with consequent detrimental impacts on economic activity. One particularly powerful policy tool that IEA member countries have to respond to such disruptions is the release of emergency oil stocks. In its 40 year history, the IEA released stocks on three occasions to reduce the supply disruptions and the associated economic damage. This paper provides a general guide to the existing emergency stockholding system for those countries who are considering the introduction of new stockholding systems or changes to their existing emergency stocks. It draws together analysis of the costs and benefits of emergency stocks, in addition to exploring options for financing the establishment of stocks.

  17. 17 CFR 230.701 - Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and...

    Science.gov (United States)

    2010-04-01

    ... irrevocable election to defer is made. (iii) Derivative securities. In calculating outstanding securities for..., must be delivered. (6) If the sale involves a stock option or other derivative security, the issuer... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales...

  18. 75 FR 70625 - Annual Funding Notice for Defined Benefit Plans

    Science.gov (United States)

    2010-11-18

    ... model funding notices. Much of the guidance in FAB 2009-01 has been incorporated into the proposed... Annual Funding Notice for Defined Benefit Plans AGENCY: Employee Benefits Security Administration, Labor... implement the annual funding notice requirement in the Employee Retirement Income Security Act of 1974...

  19. Limitation of right of codetermination of the works council in case of an administrative order for security controls

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    BetrVG section 87, sub-sec. (1), No. 1 and 7, first sentence; Atomic Energy Act section 7, sub-sec. (2), No. 5; section 17, sub-sec. (1), sentence 2. On the basis of a right of codetermination, the works council may only claim an arrangement that could be decided upon by the employer alone outside the Works Constitution Act. In case the employer is obliged by an administrative act binding upon him, to take certain measures, the works council may not claim an arrangement deviating from this directive by referring to the right of codetermination. Federal Labour Court, decision of May 26, 1988 - 1 ABR 9/87 - concerning the execution of security controls on the personnel entering the WAK. (orig./HP) [de

  20. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  1. How Strong Is Europeanisation, Really? The Danish Defence Administration and the Opt-Out from the European Security and Defence Policy

    DEFF Research Database (Denmark)

    Olsen, Gorm Rye

    2011-01-01

    The article questions how strong Europeanisation is as an explanation of administrative changes in EU member states. Denmark has an opt-out from the European cooperation on defence, and, therefore, its defence administration represents a critical or a less likely case to test the Europeanisation...... thesis. The article shows that in spite of the opt-out, the administrative structures and the policy processes in the Ministry of Foreign Affairs (MFA) have adapted to the common foreign and security policy (CFSP) and the European security and defence policy (ESDP). Surprisingly, the administrative...... structures and the decision-making processes in the Ministry of Defence (MoD) have also adapted to the ESDP. The latter example emphasises the strength of top-down Europeanisation as a possible explanation of domestic administrative changes in member states. It is argued that Europeanisation per se...

  2. Publication Of Administrative Circulars: No. 4 (Rev. 4) – Unemployment Insurance Scheme No. 30 (Rev. 2) – Financial Benefits on Taking Up Appointment and on Termination of Contract

    CERN Multimedia

    HR Department

    2008-01-01

    Administrative Circular No. 4 (Rev. 4) – Unemployment insurance scheme Administrative Circular No. 4 (Rev. 4) – "Unemployment insurance scheme", approved following discussion in the Standing Concertation Committee meetings of 28 August 2007 and 27 February 2008, is now available on the intranet site of the Human Resources Department. It cancels and replaces Administrative Circular No. 4 (Rev. 3) – "Unemployment insurance" of October 1993. Copies will shortly be available in Departmental secretariats. Human Resources Department Tel. 78003 Administrative Circular No. 30 (Rev. 2) – Financial benefits on taking up appointment and termination of contract Administrative Circular No. 30 (Rev. 2) – "Financial benefits on taking up appointment and termination of contract", approved following discussion in the Standing Concertation Committee meetings of 28 August 2007 and 27 February 2008, is now available on the intranet site of the Human Resources De...

  3. Publication Of Administrative Circulars: No. 4 (Rev. 4) – Unemployment Insurance Scheme No. 30 (Rev. 2) – Financial Benefits on Taking Up Appointment and on Termination of Contract

    CERN Document Server

    HR Department

    2008-01-01

    Administrative Circular No. 4 (Rev. 4) – Unemployment insurance scheme Administrative Circular No. 4 (Rev. 4) – "Unemployment insurance scheme", approved following discussion at the Standing Concertation Committee meetings of 28 August 2007 and 27 February 2008, is now available on the intranet site of the Human Resources Department. It cancels and replaces Administrative Circular No. 4 (Rev. 3) – "Unemployment insurance" of October 1993. Copies will shortly be available in Departmental secretariats. Human Resources Department Tel. 78003 Administrative Circular No. 30 (Rev. 2) – Financial benefits on taking up appointment and termination of contract Administrative Circular No. 30 (Rev. 2) – "Financial benefits on taking up appointment and termination of contract", approved following discussion at the Standing Concertation Committee meetings of 28 August 2007 and 27 February 2008, is now available on the intranet site of the Human Resources De...

  4. An analysis of patient-provider secure messaging at two Veterans Health Administration medical centers: message content and resolution through secure messaging.

    Science.gov (United States)

    Shimada, Stephanie L; Petrakis, Beth Ann; Rothendler, James A; Zirkle, Maryan; Zhao, Shibei; Feng, Hua; Fix, Gemmae M; Ozkaynak, Mustafa; Martin, Tracey; Johnson, Sharon A; Tulu, Bengisu; Gordon, Howard S; Simon, Steven R; Woods, Susan S

    2017-09-01

    We sought to understand how patients and primary care teams use secure messaging (SM) to communicate with one another by analyzing secure message threads from 2 Department of Veterans Affairs facilities. We coded 1000 threads of SM communication sampled from 40 primary care teams. Most threads (94.5%) were initiated by patients (90.4%) or caregivers (4.1%); only 5.5% were initiated by primary care team members proactively reaching out to patients. Medication renewals and refills (47.2%), scheduling requests (17.6%), medication issues (12.9%), and health issues (12.7%) were the most common patient-initiated requests, followed by referrals (7.0%), administrative issues (6.5%), test results (5.4%), test issues (5.2%), informing messages (4.9%), comments about the patient portal or SM (4.1%), appreciation (3.9%), self-reported data (2.8%), life issues (1.5%), and complaints (1.5%). Very few messages were clinically urgent (0.7%) or contained other potentially challenging content. Message threads were mostly short (2.7 messages), comprising an average of 1.35 discrete content types. A substantial proportion of issues (24.2%) did not show any evidence of being resolved through SM. Time to response and extent of resolution via SM varied by message content. Proactive SM use by teams varied, but was most often for test results (32.7%), medication-related issues (21.8%), medication renewals (16.4%), or scheduling issues (18.2%). The majority of messages were transactional and initiated by patients or caregivers. Not all content categories were fully addressed over SM. Further education and training for both patients and clinical teams could improve the quality and efficiency of SM communication. Published by Oxford University Press on behalf of the American Medical Informatics Association 2017. This work is written by US Government employees and is in the public domain in the United States.

  5. Public and physician's expectations and ethical concerns about electronic health record: Benefits outweigh risks except for information security.

    Science.gov (United States)

    Entzeridou, Eleni; Markopoulou, Evgenia; Mollaki, Vasiliki

    2018-02-01

    physicians should have full access to an EHR (90.9%), whereas nursing staff, pharmacists, laboratory staff, and other healthcare professional should have partial access. The factors identified in the present study present actionable insights that may increase awareness about EHRs. The survey illustrates that both the public and physicians acknowledge the benefits and support EHRs on the condition that sufficient guarantees are provided about privacy and security. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. 20 CFR 404.480 - Paying benefits in installments: Drug addiction or alcoholism.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Paying benefits in installments: Drug addiction or alcoholism. 404.480 Section 404.480 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND DISABILITY INSURANCE (1950- ) Deductions; Reductions; and Nonpayments of Benefits § 404.480 Paying benefits in installments:...

  7. 20 CFR 422.512 - Applications and related forms used in the black lung benefits program.

    Science.gov (United States)

    2010-04-01

    ... black lung benefits program. 422.512 Section 422.512 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... black lung benefits program. (a) Application forms. The following forms are prescribed for use in... Act of 1969, as amended by the Black Lung Benefits Act of 1972: SSA-46—Application for Benefits Under...

  8. Benefits of oral administration of an electrolyte solution interrupting a prolonged preoperatory fasting period in pediatric patients.

    Science.gov (United States)

    Moyao-García, D; Corrales-Fernández, M A; Blanco-Rodríguez, G; Sánchez-Hernández, E; Nava-Ocampo, A A

    2001-03-01

    The aim of this study was to evaluate the benefits of an oral isosmolar solution of electrolytes (ISE) administered to interrupt a prolonged fasting period in children undergoing an elective surgical procedure under general anesthesia. Forty unpremedicated children aged 3 to 12 years, ASA I, undergoing a surgical procedure requiring general anesthesia were assigned randomly to 1 of 2 groups. Group 1 consisted of patients with an overnight fasting period for milk and solids of at least 8 hours. In group 2, patients under a similar fasting period received a volume of 4 mL/kg of an oral ISE 3 hours before completing the fasting period. After anesthetic induction, blood glucose level (BGL) was quantified, and patients underwent an endoscopic examination to obtain the gastric content to determine the residual gastric volume (RGV) and pH levels. In group 1, the RGV was 0.78 +/- 0.44 mL/kg, pH was 1.75 +/- 0.38, and BGL was 86.4 +/- 14.5. In group 2, the RGV was 0.40 +/- 0.29 mL/kg, pH was 3.18 +/- 0.61, and BGL was 85.1 +/- 12.6. Only RGV and pH were significantly different between groups. A prolonged fasting period interrupted with oral ISE administration resulted in an RGV of low risk, without counterbalancing a potential fasting-induced hypoglycemia.

  9. 20 CFR 404.1360 - Veterans Administration pension or compensation payable.

    Science.gov (United States)

    2010-04-01

    ... Uniformed Services Effect of Other Benefits on Payment of Social Security Benefits and Payments § 404.1360... compensation payable. 404.1360 Section 404.1360 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD... lump-sum death payment based on the death of the World War II veteran without using the wage credits...

  10. Automation in airport security X-ray screening of cabin baggage: Examining benefits and possible implementations of automated explosives detection.

    Science.gov (United States)

    Hättenschwiler, Nicole; Sterchi, Yanik; Mendes, Marcia; Schwaninger, Adrian

    2018-10-01

    Bomb attacks on civil aviation make detecting improvised explosive devices and explosive material in passenger baggage a major concern. In the last few years, explosive detection systems for cabin baggage screening (EDSCB) have become available. Although used by a number of airports, most countries have not yet implemented these systems on a wide scale. We investigated the benefits of EDSCB with two different levels of automation currently being discussed by regulators and airport operators: automation as a diagnostic aid with an on-screen alarm resolution by the airport security officer (screener) or EDSCB with an automated decision by the machine. The two experiments reported here tested and compared both scenarios and a condition without automation as baseline. Participants were screeners at two international airports who differed in both years of work experience and familiarity with automation aids. Results showed that experienced screeners were good at detecting improvised explosive devices even without EDSCB. EDSCB increased only their detection of bare explosives. In contrast, screeners with less experience (tenure automated decision provided better human-machine detection performance than on-screen alarm resolution and no automation. This came at the cost of slightly higher false alarm rates on the human-machine system level, which would still be acceptable from an operational point of view. Results indicate that a wide-scale implementation of EDSCB would increase the detection of explosives in passenger bags and automated decision instead of automation as diagnostic aid with on screen alarm resolution should be considered. Copyright © 2018 The Authors. Published by Elsevier Ltd.. All rights reserved.

  11. 20 CFR 405.315 - Time and place for a hearing before an administrative law judge.

    Science.gov (United States)

    2010-04-01

    ... administrative law judge will decide whether to have that person appear in person or by video teleconference... administrative law judge. 405.315 Section 405.315 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Administrative Law Judge Hearing § 405...

  12. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  13. Reliance on social security benefits by Swedish patients with ill-health attributed to dental fillings: a register-based cohort study.

    Science.gov (United States)

    Naimi-Akbar, Aron; Svedberg, Pia; Alexanderson, Kristina; Ekstrand, Jan; Sandborgh-Englund, Gunilla

    2012-08-30

    Some people attribute their ill health to dental filling materials, experiencing a variety of symptoms. Yet, it is not known if they continue to financially support themselves by work or become reliant on different types of social security benefits. The aim of this study was to analyse reliance on different forms of social security benefits by patients who attribute their poor health to dental filling materials. A longitudinal cohort study with a 13-year follow up. The subjects included were 505 patients attributing their ill health to dental restorative materials, who applied for subsidised filling replacement. They were compared to a cohort of matched controls representing the general population (three controls per patient). Annual individual data on disability pension, sick leave, unemployment benefits, and socio-demographic factors was obtained from Statistics Sweden. Generalized estimating equations were used to test for differences between cohorts in number of days on different types of social security benefits. The cohort of dental filling patients had a significantly higher number of days on sick leave and disability pension than the general population. The test of an overall interaction effect between time and cohort showed a significant difference between the two cohorts regarding both sick leave and disability pension. In the replacement cohort, the highest number of sick-leave days was recorded in the year they applied for subsidised replacement of fillings. While sick leave decreased following the year of application, the number of days on disability pension increased and peaked at the end of follow-up. Ill health related to dental materials is likely to be associated with dependence on social security benefits. Dental filling replacement does not seem to improve workforce participation.

  14. Reliance on social security benefits by Swedish patients with ill-health attributed to dental fillings: a register-based cohort study

    Directory of Open Access Journals (Sweden)

    Naimi-Akbar Aron

    2012-08-01

    Full Text Available Abstract Background Some people attribute their ill health to dental filling materials, experiencing a variety of symptoms. Yet, it is not known if they continue to financially support themselves by work or become reliant on different types of social security benefits. The aim of this study was to analyse reliance on different forms of social security benefits by patients who attribute their poor health to dental filling materials. Methods A longitudinal cohort study with a 13-year follow up. The subjects included were 505 patients attributing their ill health to dental restorative materials, who applied for subsidised filling replacement. They were compared to a cohort of matched controls representing the general population (three controls per patient. Annual individual data on disability pension, sick leave, unemployment benefits, and socio-demographic factors was obtained from Statistics Sweden. Generalized estimating equations were used to test for differences between cohorts in number of days on different types of social security benefits. Results The cohort of dental filling patients had a significantly higher number of days on sick leave and disability pension than the general population. The test of an overall interaction effect between time and cohort showed a significant difference between the two cohorts regarding both sick leave and disability pension. In the replacement cohort, the highest number of sick-leave days was recorded in the year they applied for subsidised replacement of fillings. While sick leave decreased following the year of application, the number of days on disability pension increased and peaked at the end of follow-up. Conclusions Ill health related to dental materials is likely to be associated with dependence on social security benefits. Dental filling replacement does not seem to improve workforce participation.

  15. Effectiveness of Using a Change Management Approach to Convey the Benefits of an Information Security Implementation to Technology Users

    Science.gov (United States)

    Bennett, Jeannine B.

    2012-01-01

    This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…

  16. Claims Procedure for Plans Providing Disability Benefits. Final rule.

    Science.gov (United States)

    2016-12-19

    This document contains a final regulation revising the claims procedure regulations under the Employee Retirement Income Security Act of 1974 (ERISA) for employee benefit plans providing disability benefits. The final rule revises and strengthens the current rules primarily by adopting certain procedural protections and safeguards for disability benefit claims that are currently applicable to claims for group health benefits pursuant to the Affordable Care Act. This rule affects plan administrators and participants and beneficiaries of plans providing disability benefits, and others who assist in the provision of these benefits, such as third-party benefits administrators and other service providers.

  17. Supplemental Security Income (SSI) / Internal Revenue Service (IRS) 1099

    Data.gov (United States)

    Social Security Administration — A finder file from SSA's Title XVI database is provided to the IRS. The IRS discloses 1099 information to SSA for use in verifying eligibility, amount, and benefits...

  18. Metrics for Identifying Food Security Status and the Population with Potential to Benefit from Nutrition Interventions in the Lives Saved Tool (LiST).

    Science.gov (United States)

    Jackson, Bianca D; Walker, Neff; Heidkamp, Rebecca

    2017-11-01

    Background: The Lives Saved Tool (LiST) uses the poverty head-count ratio at $1.90/d as a proxy for food security to identify the percentage of the population with the potential to benefit from balanced energy supplementation and complementary feeding (CF) interventions, following the approach used for the Lancet 's 2008 series on Maternal and Child Undernutrition. Because much work has been done in the development of food security indicators, a re-evaluation of the use of this indicator was warranted. Objective: The aim was to re-evaluate the use of the poverty head-count ratio at $1.90/d as the food security proxy indicator in LiST. Methods: We carried out a desk review to identify available indicators of food security. We identified 3 indicators and compared them by using scatterplots, Spearman's correlations, and Bland-Altman plot analysis. We generated LiST projections to compare the modeled impact results with the use of the different indicators. Results: There are many food security indicators available, but only 3 additional indicators were identified with the data availability requirements to be used as the food security indicator in LiST. As expected, analyzed food security indicators were significantly positively correlated ( P security indicators that were used in the meta-analyses that produced the effect estimates. These are the poverty head-count ratio at $1.90/d for CF interventions and the prevalence of a low body mass index in women of reproductive age for balanced energy supplementation interventions. © 2017 American Society for Nutrition.

  19. Securing a Stop to the Summer Setback: Policy Considerations in the Future Expansion of the Summer Electronic Benefit Transfer for Children.

    Science.gov (United States)

    Hopkins, Laura C; Hooker, Neal H; Gunther, Carolyn

    2017-09-01

    The Summer Electronic Benefits Transfer for Children (SEBTC) has been proposed as a solution to address the problem of child food security during the summer. Initial SEBTC findings from a demonstration project show promise and the federal government has approved substantial funding for its continuation. This report reviews empirical assessments of SEBTC and Electronic Benefits Transfer research, and presents policy considerations in the program's future expansion. Copyright © 2016 Society for Nutrition Education and Behavior. Published by Elsevier Inc. All rights reserved.

  20. 20 CFR 404.902 - Administrative actions that are initial determinations.

    Science.gov (United States)

    2010-04-01

    ... under a workmen's compensation law; (f) A deduction from your benefits on account of work; (g) [Reserved... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Administrative actions that are initial determinations. 404.902 Section 404.902 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...

  1. 20 CFR 408.1210 - What are the essential elements of an administration agreement?

    Science.gov (United States)

    2010-04-01

    ... administration agreement? 408.1210 Section 408.1210 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SPECIAL BENEFITS FOR CERTAIN WORLD WAR II VETERANS Federal Administration of State Recognition Payments § 408.1210... provide that recognition payments can only be made to individuals who are receiving SVB payments. (b...

  2. 20 CFR 405.301 - Hearing before an administrative law judge-general.

    Science.gov (United States)

    2010-04-01

    ... law judge. (c) You may examine the evidence used in making the decision or determination under review... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Hearing before an administrative law judge-general. 405.301 Section 405.301 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW...

  3. Analysis of the Administration's Proposal to Ensure Solvency of the United Mine Workers of America Combined Benefit Fund

    National Research Council Canada - National Science Library

    2000-01-01

    .... In addition, you asked that we provide some general background information on the operations, governance structure, benefit structure, and historical and projected financial position of the Fund...

  4. IPv6 Network Administration

    CERN Document Server

    Murphy, Niall Richard

    2009-01-01

    This essential guide explains what works, what doesn't, and most of all, what's practical about IPv6--the next-generation Internet standard. A must-have for network administrators everywhere looking to fix their network's scalability and management problems. Also covers other IPv6 benefits, such as routing, integrated auto-configuration, quality-of-services (QoS), enhanced mobility, and end-to-end security.

  5. Benefits of Preventive Administration of Chlorella sp. on Visceral Pain and Cystitis Induced by a Single Administration of Cyclophosphamide in Female Wistar Rat

    OpenAIRE

    Hidalgo-Lucas, Sophie; Rozan, Pascale; Guérin-Deremaux, Laetitia; Baert, Blandine; Violle, Nicolas; Saniez-Degrave, Marie-Hélène; Bisson, Jean-François

    2016-01-01

    Chlorella sp. is a green microalgae containing nutrients, vitamins, minerals, and chlorophyll. In some communities, Chlorella sp. is a traditional medicinal plant used for the management of inflammation-related diseases. In a rat model, ROQUETTE Chlorella sp. (RCs) benefits were investigated on visceral pain and associated inflammatory parameters related to cystitis both induced by cyclophosphamide (CYP). RCs was orally administered every day from day 1–16 (250 and 500 mg/kg body weight). Six...

  6. 20 CFR 404.2065 - How does your representative payee account for the use of benefits?

    Science.gov (United States)

    2010-04-01

    ... for the use of benefits? 404.2065 Section 404.2065 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... records of how benefits were used in order to make accounting reports and must make those records available upon our request. If your representative payee fails to provide an annual accounting of benefits...

  7. Paid parental leave and child development: Evidence from the 2007 German parental benefit reform and administrative data

    OpenAIRE

    Huebener, Mathias; Kuehnle, Daniel; Spieß, Christa Katharina

    2017-01-01

    This paper examines the effects of a substantial change in publicly funded paid parental leave in Germany on child development and socio-economic development gaps. For children born before January 1, 2007, parental leave benefits were means-tested and paid for up to 24 months after childbirth. For children born thereafter, parental leave benefits were earnings-related and only paid for up to 14 months. Higher-income households benefited more from the reform than low-income households. We stud...

  8. 77 FR 19153 - Nonpayment of Benefits to Fugitive Felons and Probation or Parole Violators

    Science.gov (United States)

    2012-03-30

    ... toll-free number, 1-800-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA 2006-0173] RIN 0960-AG12 Nonpayment of Benefits to Fugitive Felons and Probation or Parole Violators AGENCY: Social Security...

  9. 20 CFR 410.686b - Fee for services performed for an individual before the Social Security Administration.

    Science.gov (United States)

    2010-04-01

    ... Representation of Parties § 410.686b Fee for services performed for an individual before the Social Security... person or in writing; (ii) There was a death or serious illness in the individual's family; (iii...

  10. 20 CFR 416.1452 - Consolidated hearings before an administrative law judge.

    Science.gov (United States)

    2010-04-01

    ... are involved in another claim you have pending before us. (2) If the administrative law judge decides... administrative law judge. 416.1452 Section 416.1452 Employees' Benefits SOCIAL SECURITY ADMINISTRATION..., and Reopening of Determinations and Decisions Administrative Law Judge Hearing Procedures § 416.1452...

  11. 20 CFR 405.365 - Consolidated hearing before an administrative law judge.

    Science.gov (United States)

    2010-04-01

    ... before us. (2) If the administrative law judge consolidates the claims, he or she will decide both claims... law judge. 405.365 Section 405.365 Employees' Benefits SOCIAL SECURITY ADMINISTRATION ADMINISTRATIVE REVIEW PROCESS FOR ADJUDICATING INITIAL DISABILITY CLAIMS Administrative Law Judge Hearing § 405.365...

  12. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  13. Benefits of Preventive Administration of Chlorella sp. on Visceral Pain and Cystitis Induced by a Single Administration of Cyclophosphamide in Female Wistar Rat.

    Science.gov (United States)

    Hidalgo-Lucas, Sophie; Rozan, Pascale; Guérin-Deremaux, Laetitia; Baert, Blandine; Violle, Nicolas; Saniez-Degrave, Marie-Hélène; Bisson, Jean-François

    2016-05-01

    Chlorella sp. is a green microalgae containing nutrients, vitamins, minerals, and chlorophyll. In some communities, Chlorella sp. is a traditional medicinal plant used for the management of inflammation-related diseases. In a rat model, ROQUETTE Chlorella sp. (RCs) benefits were investigated on visceral pain and associated inflammatory parameters related to cystitis both induced by cyclophosphamide (CYP). RCs was orally administered every day from day 1-16 (250 and 500 mg/kg body weight). Six hours after an intraperitoneal injection of 200 mg/kg body weight of CYP, body temperature, general behavior, food intake, and body weight were recorded. Twenty-four hours after CYP injection, rats were tested in two behavioral tests, an open field and the aversive light stimulus avoidance conditioning test, to evaluate the influence of pain on general activity and learning ability of rats. After euthanasia, bladders were weighed, their thickness was scored, and the urinary hemoglobin was measured. RCs orally administered at the two dosages significantly reduced visceral pain and associated inflammatory parameters related to cystitis both induced by CYP injection, and improved rat behavior. To conclude, RCs demonstrated beneficial effects against visceral pain and cystitis.

  14. 78 FR 15019 - Food and Drug Administration Prescription Drug User Fee Act V Benefit-Risk Plan; Request for...

    Science.gov (United States)

    2013-03-08

    ... benefit and risk considerations that make up a regulatory decision will help to facilitate balanced and... and the role of those factors in the regulatory decision-making process for human drug and biological... communication of its decisions by making clear the important considerations in the Agency's decision-making...

  15. The weakest link in welfare state legitimacy : European perceptions of moral and administrative failure in the targeting of social benefits

    NARCIS (Netherlands)

    Roosma, F.; van Oorschot, W.J.H.; Gelissen, J.P.T.M.

    2014-01-01

    In the field of welfare attitude research, generally studies examining critical attitudes toward the welfare state are rather limited. However, the existing studies find that people are most negative about the mis-targeting of welfare benefits – that is, people are particularly critical of the high

  16. Assessing the impact of macroeconomic variables on pension benefits in Ghana: A case of Social Security and National Insurance Trust

    Directory of Open Access Journals (Sweden)

    Grace Ofori-Abebrese

    2017-10-01

    Full Text Available Background: One of the most pressing phases for all economic agents is post-retirement standard of living. Irrespective of the higher returns on pension contribution and varied pension reforms, there are possible factors that can render these pension benefits inadequate, which can affect the longevity of retirees. Studies conducted in other countries have concluded that inflation deteriorates the value of pension benefits. Aim: This study, thus, sought to assess the impact of some major economic indicators in the Ghanaian environment on pension benefits. Setting: This study was carried out in Ghana by obtaining quarterly data frequencies on pension benefits and economic indicators spanning the period 2000Q1 to 2014Q4. Method: The Auto-regressive Distributed Lag Model was utilised to examine the long run and short run dynamics of some major economic indicators and pension benefits. Results: The empirical evidence indicated that inflation deteriorates total pension benefits. Increasing monetary policy rate and depreciation of the domestic currency should be an issue to contend with only in the short run rather than in the long run. The study also found the prominence of the implementation of the National Pension Reform in 2008. Conclusion: The study concluded that if policy makers target the reduction in the monetary policy rate and the appreciation of the domestic currency in an effort to stabilise the value of total pension benefits in the long run, it would not be effective in the long run because of their insignificant nature. Policy makers should rather target inflation as the prime tool for stabilising the standard of living of retirees in the long run.

  17. Do Coffee Farmers Benefit in Food Security from Participating in Coffee Cooperatives? Evidence from Southwest Ethiopia Coffee Cooperatives.

    Science.gov (United States)

    Shumeta, Zekarias; D'Haese, Marijke

    2018-06-01

    Most coffee in Ethiopia is produced by smallholder farmers who face a daily struggle to get sufficient income but also to feed their families. At the same time, many smallholder coffee producers are members of cooperatives. Yet, literature has paid little attention to the effect of cooperatives on combating food insecurity among cash crop producers including coffee farmers. The objective of the study was to investigate how coffee cooperative membership may affect food security among coffee farm households in Southwest Ethiopia. The study used cross-sectional household data on income, expenditure on food, staple food production (maize and teff), and utilization of improved inputs (fertilizer and improved seed) collected from 256 randomly selected farm households (132 cooperative members and 124 nonmembers) and applied an inverse probability weighting (IPW) estimation to assess the impact of cooperative membership on food security. The result revealed that cooperative membership has a positive and significant effect on staple food production (maize and teff) and facilitated technological transformation via increased utilization of fertilizer and improved seeds. Nonetheless, the effect on food expenditure and income could not be confirmed. Findings suggest a trade-off between coffee marketing and input supply functions of the cooperatives, impairing their true food security impact from the pooled income and production effect.

  18. 20 CFR 416.1020 - General administrative requirements.

    Science.gov (United States)

    2010-04-01

    ... cause the State to be substantially failing to comply with our regulations or other written guidelines... substantially failing to follow our regulations or other written guidelines. (b) The State is responsible for... Section 416.1020 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL SECURITY INCOME FOR THE...

  19. Benefits of lethal pandemics: direct impact of contagious diseases on public administration in Hungary (1867-1914).

    Science.gov (United States)

    Palvolgyi, Balazs

    2013-01-01

    The reconciliation of 1867 between Austria and Hungary brought great changes to Hungarian public administration: the way towards the building up of a modern public administration had been opened. Although there was a functioning public health system and a related legislation from the late 18th century, major issues - such as balanced geographical distribution of medical personnel, fair access to medical services even in the poorer regions of the country, and the effective protection against some contagious diseases - were not resolved for decades. During the reform work of public administration since the 1870s, the lawmakers touched repeatedly the framework and functioning of the public health as well. Although the general conditions of the domain depended traditionally on the municipalities and counties due to the national importance of the matter, the government made efforts to make the functioning of the public health more efficient through centralisation. The contagious diseases continuously endangered the population, revealing the weak points in the existing public health system, thereby giving a momentum to the reforms and helping the government in its organization of prevention and clearly contributing to the legislation work.

  20. Technical and governance considerations for advanced metering infrastructure/smart meters: Technology, security, uncertainty, costs, benefits, and risks

    International Nuclear Information System (INIS)

    McHenry, Mark P.

    2013-01-01

    The fundamental role of policymakers when considering Advanced Metering Infrastructure (AMI), or ‘smart meters for energy and water infrastructure is to investigate a broad range of complex interrelated issues. These include alternative technical and non-technical options and deployment needs, the cost and benefits of the infrastructure (risks and mitigation measures), and the impact of a number of stakeholders: consumers, distributors, retailers, competitive market operators, competing technology companies, etc. The scale and number of potential variables in the AMI space is an almost unprecedented challenge to policymakers, with the anticipation of new ancillary products and services, associated market contestability, related regulatory and policy amendments, and the adequacy of consumer protection, education, and safety considerations requiring utmost due-diligence. Embarking on AMI investment entails significant technical, implementation, and strategic risk for governments and administering bodies, and an active effort is required to ensure AMI governance and planning maximises the potential benefits, and minimise uncertainties, costs, and risks to stakeholders. This work seeks to clarify AMI fundamentals and discusses the technical and related governance considerations from a dispassionate perspective, yet acknowledges many stakeholders tend to dichotomise debate, and obfuscate both advantages and benefits, and the converse. - Highlights: • AMI presents an almost unprecedented technical and governance policy challenge. • AMI enables vertical integration of electricity, gas, water, IT, and telco entities • AMI investments involve major technical, implementation, and strategic decisions. • Adequacy of consumer education, safety, privacy, and protection is paramount. • Policy must maximise AMI benefits and minimise uncertainties, costs, and risks

  1. End-User Perception Towards Pervasive Cardiac Healthcare Services: Benefits, Acceptance, Adoption, Risks, Security, Privacy and Trust

    NARCIS (Netherlands)

    Dhukaram, Anandhi Vivek; Baber, Chris; Elloumi, Lamia; van Beijnum, Bernhard J.F.; De Stefanis, Paolo

    This study examined patient and caregiver’s perception regarding pervasive healthcare technology using five focus groups and a 31-item questionnaire. To further develop an understanding of the benefits and functionalities that prospective patients deem as either desirable, undesirable, inadequate or

  2. 75 FR 54542 - Prohibited Transaction Exemption Procedures; Employee Benefit Plans

    Science.gov (United States)

    2010-09-08

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 29 CFR Part 2570 RIN 1210-AA98 Prohibited Transaction Exemption Procedures; Employee Benefit Plans Correction In proposed rule document 2010-21073 beginning on page 53172 in the issue of Monday, August 30, 2010, make the following correction...

  3. Satellite Anomalies: Benefits of a Centralized Anomaly Database and Methods for Securely Sharing Information Among Satellite Operators

    Science.gov (United States)

    2014-01-01

    is more or less prone to anomalies. The Atrium Space Insurance Corporation (ASIC) at Lloyd’s of London Insurance Market insures approximately 190...Oceanic and Atmospheric Administration, National Geophysical Data Center, 1993. As of December 6, 2012: http://www.ngdc.noaa.gov/ stp /satellite...National Geophysical Data Center, Online Publications, undated a. As of November 1, 2013: http://www.ngdc.noaa.gov/ stp /solar/onlinepubl.html ———, Space

  4. Safeguards and security by design support for the next generation nuclear plant project - Progress in safeguards by design (SBD) by the United States National Nuclear Security Administration (NNSA)

    International Nuclear Information System (INIS)

    Bjornard, T.; Casey Durst, P.

    2013-01-01

    The Next Generation Nuclear Plant (NGNP) project was authorized by the United States Energy Policy Act of 2005 with the principal objective of designing, licensing, and building a Generation IV nuclear plant capable of producing both high-temperature process heat and electricity. The two candidate NGNP reactor concepts are pebble- and prismatic-fueled high-temperature gas reactors that will be licensed by the U.S. Nuclear Regulatory Commission (NRC). The conceptual design phase of the project was completed in December 2010. This paper summarizes support provided to the NGNP project to facilitate consideration of international safeguards during the design phase, or safeguards by design (SBD). Additional support was provided for domestic safeguards (material control and accounting) and physical protection, or safeguards and security by design (2SBD). The main focus of this paper is on SBD and international safeguards. Included is an overview of the international safeguards guidance contained in guidance reports for SBD. These reports contain guidance and suggestions intended to be useful to the industry design teams, but they do not contain ready-made solutions. Early and frequent interaction of design stakeholders with the International Atomic Energy Agency and the NRC are essential to a successful endeavor. The paper is followed by the slides of the presentation. (author)

  5. Assessing the Security Benefits of a Trusted Traveler Program in the Presence of Attempted Attacker Exploitation and Compromise

    Science.gov (United States)

    2011-05-01

    and Behavior 32(2) 223–247.   Drury ,  Colin  G., Kimberly M. Ghylin, Karen Holness. 2006. Error analysis and threat magnitude for carry‐ on bag inspection... Drury  et al., 2006).  How probability of detection changes as resources are increased or decreased depends on the baseline  performance (i.e...Ghylin, K. M., C. G.  Drury , A. Schwaninger. 2006. Two‐component model of security inspection:  Application and findings. 16th World Congress of

  6. Glucose administration after traumatic brain injury exerts some benefits and no adverse effects on behavioral and histological outcomes

    Science.gov (United States)

    Shijo, Katsunori; Ghavim, Sima; Harris, Neil G.; Hovda, David A.; Sutton, Richard L.

    2015-01-01

    The impact of hyperglycemia after traumatic brain injury (TBI), and even the administration of glucose–containing solutions to head injured patients, remains controversial. In the current study adult male Sprague-Dawley rats were tested on behavioral tasks and then underwent surgery to induce sham injury or unilateral controlled cortical impact (CCI) injury followed by injections (i.p.) with either a 50% glucose solution (Glc; 2 g/kg) or an equivalent volume of either 0.9% or 8% saline (Sal) at 0, 1, 3 and 6 h post-injury. The type of saline treatment did not significantly affect any outcome measures, so these data were combined. Rats with CCI had significant deficits in beam-walking traversal time and rating scores (p’s glucose may improve some neurological outcomes and, importantly, the induction of hyperglycemia after isolated TBI did not adversely affect any sensorimotor, cognitive or histological outcomes. PMID:25911580

  7. Potential use of pearl millet (Pennisetum glaucum (L.) R. Br.) in Brazil: Food security, processing, health benefits and nutritional products.

    Science.gov (United States)

    Dias-Martins, Amanda M; Pessanha, Kênia Letícia F; Pacheco, Sidney; Rodrigues, José Avelino S; Carvalho, Carlos Wanderlei Piler

    2018-07-01

    Climate change can cause an increase in arid soils, warmer weather, and reduce water availability, which in turn can directly affect food security. This increases food prices and reduces the availability of food. Therefore, knowledge concerning the nutritional and technological potential of non-traditional crops and their resistance to heat and drought is very interesting. Pearl millet is known to produce small nutritious cereal grains, which can endure both heat and dry conditions, and is one of the basic cereals of several African and Asian countries. Although this species has been cultivated in Brazil for at least 50 years it is only used as a cover crop and animal feed, but not for human consumption. Nonetheless, pearl millet grains have a high potential as food for humans because they are gluten-free, higher in dietary fiber content than rice, similar in lipid content to maize and higher content of essential amino acids (leucine, isoleucine and lysine) than other traditional cereals, such as wheat and rye. In addition, the crop is low cost and less susceptible to contamination by aflatoxins compared to corn, for example. Most grains, including pearl millet, can be milled, decorticated, germinated, fermented, cooked and extruded to obtain products such as flours, biscuits, snacks, pasta and non-dairy probiotic beverages. Pearl millet also has functional properties; it has a low glycemic index and therefore it can be used as an alternative food for weight control and to reduce the risk of chronic diseases, such as diabetes. Thus, this review intends to show the potential of pearl millet as an alternative food security crop, particularly in countries, like Brazil, where it is not commonly consumed. Also this review presents different processes and products that have been already reported in the literature in order to introduce the great potential of this important small grain to producers and consumers. Copyright © 2018 Elsevier Ltd. All rights reserved.

  8. 20 CFR 404.929 - Hearing before an administrative law judge-general.

    Science.gov (United States)

    2010-04-01

    ... evidence used in making the determination or decision under review, and present and question witnesses. The... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Hearing before an administrative law judge-general. 404.929 Section 404.929 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE...

  9. 20 CFR 416.1429 - Hearing before an administrative law judge-general.

    Science.gov (United States)

    2010-04-01

    ... evidence, examine the evidence used in making the determination or decision under review, and present and... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false Hearing before an administrative law judge-general. 416.1429 Section 416.1429 Employees' Benefits SOCIAL SECURITY ADMINISTRATION SUPPLEMENTAL...

  10. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  11. 20 CFR 416.665 - How does your representative payee account for the use of benefits?

    Science.gov (United States)

    2010-04-01

    ... for the use of benefits? 416.665 Section 416.665 Employees' Benefits SOCIAL SECURITY ADMINISTRATION... in order to make accounting reports and must make those records available upon our request. If your representative payee fails to provide an annual accounting of benefits or other required reports, we may require...

  12. 77 FR 33241 - Advisory Council on Employee Welfare and Pension Benefit Plans; Nominations for Vacancies

    Science.gov (United States)

    2012-06-05

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... Council on Employee Welfare and Pension Benefit Plans (the Council), which is to consist of 15 members to... to the Advisory Council on Employee Welfare and Pension Benefit Plans to represent any of the groups...

  13. 77 FR 74515 - Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Charter Renewal

    Science.gov (United States)

    2012-12-14

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... charter for the Advisory Council on Employee Welfare and Pension Benefit Plans is renewed. The Advisory Council on Employee Welfare and Pension Benefit Plans shall advise the Secretary of Labor on technical...

  14. 78 FR 36596 - Advisory Council on Employee Welfare and Pension Benefit Plans; Nominations for Vacancies

    Science.gov (United States)

    2013-06-18

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... Council on Employee Welfare and Pension Benefit Plans (the Council), which is to consist of 15 members to... appointment to the Advisory Council on Employee Welfare and Pension Benefit Plans to represent any of the...

  15. 75 FR 80072 - Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Charter Renewal

    Science.gov (United States)

    2010-12-21

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... charter for the Advisory Council on Employee Welfare and Pension Benefit Plans is renewed. The Advisory Council on Employee Welfare and Pension Benefit Plans shall advise the Secretary of Labor on technical...

  16. Yearly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016 Onwards)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits from federal...

  17. Yearly Data for Spoken Language Preferences of Supplemental Security Income (Blind & Disabled) (2011-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits for federal fiscal years...

  18. Yearly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (2011-Onward)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for SSI Aged benefits from federal fiscal year 2011...

  19. Yearly Data for Spoken Language Preferences of Social Security Disability Insurance Claimants (2011-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for language preferences at the national level of individuals filing claims for ESRD Medicare benefits for federal fiscal years...

  20. Yearly Data for Asian & Pacific Islander Language Preferences of Supplemental Security Income Aged Applicants (2016 Onward)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for API language preferences at the national level of individuals filing claims for SSI Aged benefits from federal fiscal year...

  1. Quarterly Data for Spoken Language Preferences of Supplemental Security Income Aged Applicants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Aged benefits for fiscal years 2014 -...

  2. 20 CFR 404.452 - Reports to Social Security Administration of earnings; wages; net earnings from self-employment.

    Science.gov (United States)

    2010-04-01

    ... earnings; wages; net earnings from self-employment. 404.452 Section 404.452 Employees' Benefits SOCIAL...; net earnings from self-employment. (a) Reporting requirements and conditions under which a report of earnings, that is, wages and/or net earnings from self-employment, is required. (1) If you have not reached...

  3. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  4. Effects of acute administration of nicotinic and muscarinic cholinergic agonists and antagonists on performance in different cost-benefit decision making tasks in rats.

    Science.gov (United States)

    Mendez, Ian A; Gilbert, Ryan J; Bizon, Jennifer L; Setlow, Barry

    2012-12-01

    Alterations in cost-benefit decision making accompany numerous neuropsychiatric conditions, including schizophrenia, attention deficit hyperactivity disorder, and addiction. Central cholinergic systems have been linked to the etiology and/or treatment of many of these conditions, but little is known about the role of cholinergic signaling in cost-benefit decision making. The goal of these experiments was to determine how cholinergic signaling is involved in cost-benefit decision making, using a behavioral pharmacological approach. Male Long-Evans rats were trained in either "probability discounting" or "delay discounting" tasks, in which rats made discrete-trial choices between a small food reward and a large food reward associated with either varying probabilities of omission or varying delays to delivery, respectively. The effects of acute administration of different doses of nicotinic and muscarinic acetylcholine receptor agonists and antagonists were assessed in each task. In the probability discounting task, acute nicotine administration (1.0 mg/kg) significantly increased choice of the large risky reward, and control experiments suggested that this was due to robust nicotine-induced impairments in behavioral flexibility. In the delay discounting task, the muscarinic antagonists scopolamine (0.03, 0.1, and 0.3 mg/kg) and atropine (0.3 mg/kg) both significantly increased choice of the small immediate reward. Neither mecamylamine nor oxotremorine produced reliable effects on either of the decision making tasks. These data suggest that cholinergic receptors play multiple roles in decision making contexts which include consideration of reward delay or probability. These roles should be considered when targeting these receptors for therapeutic purposes.

  5. Effects of acute administration of nicotinic and muscarinic cholinergic agonists and antagonists on performance in different cost–benefit decision making tasks in rats

    Science.gov (United States)

    Mendez, Ian A.; Gilbert, Ryan J.; Bizon, Jennifer L.

    2012-01-01

    Rationale Alterations in cost–benefit decision making accompany numerous neuropsychiatric conditions, including schizophrenia, attention deficit hyperactivity disorder, and addiction. Central cholinergic systems have been linked to the etiology and/or treatment of many of these conditions, but little is known about the role of cholinergic signaling in cost–benefit decision making. Objectives The goal of these experiments was to determine how cholinergic signaling is involved in cost–benefit decision making, using a behavioral pharmacological approach. Methods Male Long-Evans rats were trained in either “probability discounting” or “delay discounting” tasks, in which rats made discrete-trial choices between a small food reward and a large food reward associated with either varying probabilities of omission or varying delays to delivery, respectively. The effects of acute administration of different doses of nicotinic and muscarinic acetylcholine receptor agonists and antagonists were assessed in each task. Results In the probability discounting task, acute nicotine administration (1.0 mg/kg) significantly increased choice of the large risky reward, and control experiments suggested that this was due to robust nicotine-induced impairments in behavioral flexibility. In the delay discounting task, the muscarinic antagonists scopolamine (0.03, 0.1, and 0.3 mg/kg) and atropine (0.3 mg/kg) both significantly increased choice of the small immediate reward. Neither mecamylamine nor oxotremorine produced reliable effects on either of the decision making tasks. Conclusions These data suggest that cholinergic receptors play multiple roles in decision making contexts which include consideration of reward delay or probability. These roles should be considered when targeting these receptors for therapeutic purposes. PMID:22760484

  6. Glucose administration after traumatic brain injury exerts some benefits and no adverse effects on behavioral and histological outcomes.

    Science.gov (United States)

    Shijo, Katsunori; Ghavim, Sima; Harris, Neil G; Hovda, David A; Sutton, Richard L

    2015-07-21

    The impact of hyperglycemia after traumatic brain injury (TBI), and even the administration of glucose-containing solutions to head injured patients, remains controversial. In the current study adult male Sprague-Dawley rats were tested on behavioral tasks and then underwent surgery to induce sham injury or unilateral controlled cortical impact (CCI) injury followed by injections (i.p.) with either a 50% glucose solution (Glc; 2g/kg) or an equivalent volume of either 0.9% or 8% saline (Sal) at 0, 1, 3 and 6h post-injury. The type of saline treatment did not significantly affect any outcome measures, so these data were combined. Rats with CCI had significant deficits in beam-walking traversal time and rating scores (p's beam-walking deficits were not affected by Glc versus Sal treatments. Persistent post-CCI deficits in forelimb contraflexion scores and forelimb tactile placing ability were also not differentially affected by Glc or Sal treatments. However, deficits in latency to retract the right hind limb after limb extension were significantly attenuated in the CCI-Glc group (p < 0.05 versus CCI-Sal). Both CCI groups were significantly impaired in a plus maze test of spatial working memory on days 4, 9 and 14 post-surgery (p < 0.001 versus sham), and there was no effect of Glc versus Sal on this cognitive outcome measure. At 15 days post-surgery the loss of cortical tissue volume (p < 0.001 versus sham) was significantly less in the CCI-Glc group (30.0%; p < 0.05) compared to the CCI-Sal group (35.7%). Counts of surviving hippocampal hilar neurons revealed a significant (~40%) loss ipsilateral to CCI (p < 0.001 versus sham), but neuronal loss in the hippocampus was not different in the CCI-Sal and CCI-Glc groups. Taken together, these results indicate that an early elevation of blood glucose may improve some neurological outcomes and, importantly, the induction of hyperglycemia after isolated TBI did not adversely affect any sensorimotor, cognitive or

  7. 20 CFR 404.1402 - When are railroad industry services by a non-vested worker covered under Social Security?

    Science.gov (United States)

    2010-04-01

    ...-vested worker covered under Social Security? 404.1402 Section 404.1402 Employees' Benefits SOCIAL... When are railroad industry services by a non-vested worker covered under Social Security? If you are a non-vested worker, we (the Social Security Administration) will consider your services in the railroad...

  8. 20 CFR 404.952 - Consolidated hearing before an administrative law judge.

    Science.gov (United States)

    2010-04-01

    ... before us. (2) If the administrative law judge decides to hold the hearing on both claims, he or she... law judge. 404.952 Section 404.952 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE... Determinations and Decisions Administrative Law Judge Hearing Procedures § 404.952 Consolidated hearing before an...

  9. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  10. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  11. Benefit-Risk Summary of Nivolumab for Patients With Metastatic Squamous Cell Lung Cancer After Platinum-Based Chemotherapy: A Report From the US Food and Drug Administration.

    Science.gov (United States)

    Kazandjian, Dickran; Khozin, Sean; Blumenthal, Gideon; Zhang, Lijun; Tang, Shenghui; Libeg, Meredith; Kluetz, Paul; Sridhara, Rajeshwari; Keegan, Patricia; Pazdur, Richard

    2016-01-01

    Metastatic squamous non-small-cell lung cancer (SQ NSCLC) is a serious and life-threatening malignant condition with unmet medical need. In late December 2014, the US Food and Drug Administration (FDA) obtained the data monitoring committee report of a planned interim analysis of a trial in second-line SQ NSCLC (CM017) that demonstrated an overall survival benefit for patients treated with nivolumab compared with docetaxel. In that trial, 272 patients with metastatic SQ NSCLC patients had been randomized to receive nivolumab (n = 135) or docetaxel (n = 137). Median overall survival was 9.2 months for patients randomized to nivolumab and 6.0 months for those randomized to docetaxel (hazard ratio, 0.59; 95% CI, 0.44-0.79; P chemotherapy. The approval provides an important treatment option for these patients, affecting routine care and clinical trials.

  12. Growing insights into the potential benefits and risks of activated protein C administration in sepsis: a review of preclinical and clinical studies

    Directory of Open Access Journals (Sweden)

    Laith Altaweel

    2009-09-01

    Full Text Available Laith Altaweel, Daniel Sweeney, Xizhong Cui, Amisha Barochia, Charles Natanson, Peter Q EichackerCritical Care Medicine Department, Clinical Center, National Institutes of Health, Bethesda, MD, USAAbstract: Recombinant human activated protein C (rhAPC was developed to reduce excessive coagulant and inflammatory activity during sepsis. Basic and clinical research has suggested these pathways contribute to the pathogenesis of this lethal syndrome and are inhibited by rhAPC. Based in large part on the results of a single multicenter randomized controlled trial, rhAPC was first approved in 2001 by the US Food and Drug Administration (FDA as adjunctive therapy in septic patients with a high risk of death. This was followed closely by approval in Europe, Australia, and New Zealand. At the original FDA review of rhAPC, concerns were raised as to whether a confirmatory trial should be done before final regulatory approval because of concerns that rhAPCs bleeding risk might outweigh its potential benefit during clinical use. Since 2001, continuing basic and clinical research has further elucidated the complex role activated protein C may have in both adaptive and maladaptive responses during sepsis. Moreover, subsequent controlled trials in other types of septic patients and observational studies appear to support earlier concerns that the benefit-to-risk ratio of rhAPC may not support its clinical use. This experience has prompted additional trials presently underway, to define whether treatment with rhAPC as it was originally indicated in septic patients with persistent shock, is safe and effective. Until such trials are complete, physicians employing this agent must carefully consider which patients may be appropriate candidates for rhAPC administration.Keywords: rhAPC, treatment, sepsis

  13. Validation of the Social Security Administration Life Tables (2004-2014) in Localized Prostate Cancer Patients within the Surveillance, Epidemiology, and End Results database.

    Science.gov (United States)

    Preisser, Felix; Bandini, Marco; Mazzone, Elio; Nazzani, Sebastiano; Marchioni, Michele; Tian, Zhe; Saad, Fred; Pompe, Raisa S; Shariat, Shahrokh F; Heinzer, Hans; Montorsi, Francesco; Huland, Hartwig; Graefen, Markus; Tilki, Derya; Karakiewicz, Pierre I

    2018-05-22

    Accurate life expectancy estimation is crucial in clinical decision-making including management and treatment of clinically localized prostate cancer (PCa). We hypothesized that Social Security Administration (SSA) life tables' derived survival estimates closely follow observed survival of PCa patients. To test this relationship, we examined 10-yr overall survival rates in patients with clinically localized PCa and compared it with survival estimates derived from the SSA life tables. Within the Surveillance, Epidemiology, and End Results database (2004), we identified patients aged >50-patients who did not die of disease or other causes. Monte Carlo method was used to define individual survival in years, according to the SSA life tables (2004-2014). Subsequently, SSA life tables' predicted survival was compared with observed survival rates in Kaplan-Meier analyses. Subgroup analyses were stratified according to treatment type and D'Amico risk classification. Overall, 39191 patients with localized PCa were identified. At 10-yr follow-up, the SSA life tables' predicted survival was 69.5% versus 73.1% according to the observed rate (ppatients. Conversely, the smallest differences were recorded for external beam radiotherapy (1.7%) and unknown treatment type (1.6%) patients. Overall, SSA life tables' predicted life expectancy closely approximate observed overall survival rates. However, SSA life tables' predicted rates underestimate by as much as 9.1% the survival in brachytherapy patients, as well as in D'Amico low-risk and radical prostatectomy patients. In these patient categories, an adjustment for the degree of underestimation might be required when counseling is provided in clinical practice. Social Security Administration (SSA) life tables' predicted life expectancy closely approximate observed overall survival rates. However, SSA life tables' predicted rates underestimate by as much as 9.1% the survival in brachytherapy patients, as well as in D'Amico low

  14. Official Position of the American Academy of Clinical Neuropsychology Social Security Administration Policy on Validity Testing: Guidance and Recommendations for Change.

    Science.gov (United States)

    Chafetz, M D; Williams, M A; Ben-Porath, Y S; Bianchini, K J; Boone, K B; Kirkwood, M W; Larrabee, G J; Ord, J S

    2015-01-01

    The milestone publication by Slick, Sherman, and Iverson (1999) of criteria for determining malingered neurocognitive dysfunction led to extensive research on validity testing. Position statements by the National Academy of Neuropsychology and the American Academy of Clinical Neuropsychology (AACN) recommended routine validity testing in neuropsychological evaluations. Despite this widespread scientific and professional support, the Social Security Administration (SSA) continued to discourage validity testing, a stance that led to a congressional initiative for SSA to reevaluate their position. In response, SSA commissioned the Institute of Medicine (IOM) to evaluate the science concerning the validation of psychological testing. The IOM concluded that validity assessment was necessary in psychological and neuropsychological examinations (IOM, 2015 ). The AACN sought to provide independent expert guidance and recommendations concerning the use of validity testing in disability determinations. A panel of contributors to the science of validity testing and its application to the disability process was charged with describing why the disability process for SSA needs improvement, and indicating the necessity for validity testing in disability exams. This work showed how the determination of malingering is a probability proposition, described how different types of validity tests are appropriate, provided evidence concerning non-credible findings in children and low-functioning individuals, and discussed the appropriate evaluation of pain disorders typically seen outside of mental consultations. A scientific plan for validity assessment that additionally protects test security is needed in disability determinations and in research on classification accuracy of disability decisions.

  15. Barriers, facilitators, and benefits of implementation of dialectical behavior therapy in routine care: results from a national program evaluation survey in the Veterans Health Administration.

    Science.gov (United States)

    Landes, Sara J; Rodriguez, Allison L; Smith, Brandy N; Matthieu, Monica M; Trent, Lindsay R; Kemp, Janet; Thompson, Caitlin

    2017-12-01

    National implementation of evidence-based psychotherapies (EBPs) in the Veterans Health Administration (VHA) provides important lessons on the barriers and facilitators to implementation in a large healthcare system. Little is known about barriers and facilitators to the implementation of a complex EBP for emotional and behavioral dysregulation-dialectical behavioral therapy (DBT). The purpose of this study was to understand VHA clinicians' experiences with barriers, facilitators, and benefits from implementing DBT into routine care. This national program evaluation survey measured site characteristics of VHA sites (N = 59) that had implemented DBT. DBT was most often implemented in general mental health outpatient clinics. While 42% of sites offered all four modes of DBT, skills group was the most frequently implemented mode. Fifty-nine percent of sites offered phone coaching in any form, yet only 11% of those offered it all the time. Providers were often provided little to no time to support implementation of DBT. Barriers that were difficult to overcome were related to phone coaching outside of business hours. Facilitators to implementation included staff interest and expertise. Perceived benefits included increased hope and functioning for clients, greater self-efficacy and compassion for providers, and ability to treat unique symptoms for clinics. There was considerable variability in the capacity to address implementation barriers among sites implementing DBT in VHA routine care. Mental health policy makers should note the barriers and facilitators reported here, with specific attention to phone coaching barriers.

  16. New evidence of neuroprotection by lactate after transient focal cerebral ischaemia: extended benefit after intracerebroventricular injection and efficacy of intravenous administration.

    Science.gov (United States)

    Berthet, Carole; Castillo, Ximena; Magistretti, Pierre J; Hirt, Lorenz

    2012-01-01

    Lactate protects mice against the ischaemic damage resulting from transient middle cerebral artery occlusion (MCAO) when administered intracerebroventricularly at reperfusion, yielding smaller lesion sizes and a better neurological outcome 48 h after ischaemia. We have now tested whether the beneficial effect of lactate is long-lasting and if lactate can be administered intravenously. Male ICR-CD1 mice were subjected to 15-min suture MCAO under xylazine + ketamine anaesthesia. Na L-lactate (2 µl of 100 mmol/l) or vehicle was administered intracerebroventricularly at reperfusion. The neurological deficit was evaluated using a composite deficit score based on the neurological score, the rotarod test and the beam walking test. Mice were sacrificed at 14 days. In a second set of experiments, Na L-lactate (1 µmol/g body weight) was administered intravenously into the tail vein at reperfusion. The neurological deficit and the lesion volume were measured at 48 h. Intracerebroventricularly injected lactate induced sustained neuroprotection shown by smaller neurological deficits at 7 days (median = 0, min = 0, max = 3, n = 7 vs. median = 2, min = 1, max = 4.5, n = 5, p mouse brain against ischaemic damage when supplied intracerebroventricularly during reperfusion with behavioural and histological benefits persisting 2 weeks after ischaemia. Importantly, lactate also protects after systemic intravenous administration, a more suitable route of administration in a clinical emergency setting. These findings provide further steps to bring this physiological, commonly available and inexpensive neuroprotectant closer to clinical translation for stroke. Copyright © 2012 S. Karger AG, Basel.

  17. Assessing functional status and the survival benefit of chemotherapy for advanced non-small cell lung cancer using administrative claims data.

    Science.gov (United States)

    Feliciano, Josephine; Gardner, Lisa; Hendrick, Franklin; Edelman, Martin J; Davidoff, Amy

    2015-01-01

    Borderline or poor performance status (PS) patients comprise a significant proportion of those diagnosed with advanced non-small cell lung cancer (AdvNSCLC), but are often excluded from clinical trials. It is difficult to draw conclusions about the benefit of therapy in borderline PS patients due to lack of reliable PS assessments, and small clinical trial samples. Retrospective population-based secondary analyses may allow investigators to study under-represented populations in clinical trials. We hypothesized that patients with poor functional status derive benefit from chemotherapy compared good functional status, but that the magnitude of the benefit is lower compared to patients with good functional status. By utilizing a "disability status" (DS) measure as a proxy for PS, we offer a reliable mechanism for patient stratification that can be implemented in administrative claims data. Medicare beneficiaries diagnosed with AdvNSCLC between 2001 and 2005 were selected from the Surveillance, Epidemiology and End Results database linked to Medicare claims. Disability status, a previously developed and validated claims-based proxy for baseline PS, was implemented. Patients were assigned to good versus poor DS. Cox proportional hazard models were used to examine the differential effects of chemotherapy for the two DS groups on all-cause mortality, controlling for tumor and patient characteristics. Most patients in the cohort (n=21,019) were ≥75 years of age (59%), and non-Hispanic white (85%); 91% were assigned to good DS; 38% received chemotherapy. Chemotherapy had a strong protective effect among good DS patients (hazard ratio, 0.43; CI 0.42-0.45; pChemotherapy improves survival for advanced NSCLC patients with poor DS but to a lower magnitude than for good DS patients. The DS measure opens the door to assess outcomes for cancer patients with poor functional status using insurance claims data. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  18. Increased Severe Trauma Patient Volume is Associated With Survival Benefit and Reduced Total Health Care Costs: A Retrospective Observational Study Using a Japanese Nationwide Administrative Database.

    Science.gov (United States)

    Endo, Akira; Shiraishi, Atsushi; Fushimi, Kiyohide; Murata, Kiyoshi; Otomo, Yasuhiro

    2017-06-07

    The aim of this study was to evaluate the associations of severe trauma patient volume with survival benefit and health care costs. The effect of trauma patient volume on survival benefit is inconclusive, and reports on its effects on health care costs are scarce. We conducted a retrospective observational study, including trauma patients who were transferred to government-approved tertiary emergency hospitals, or hospitals with an intensive care unit that provided an equivalent quality of care, using a Japanese nationwide administrative database. We categorized hospitals according to their annual severe trauma patient volumes [1 to 50 (reference), 51 to 100, 101 to 150, 151 to 200, and ≥201]. We evaluated the associations of volume categories with in-hospital survival and total cost per admission using a mixed-effects model adjusting for patient severity and hospital characteristics. A total of 116,329 patients from 559 hospitals were analyzed. Significantly increased in-hospital survival rates were observed in the second, third, fourth, and highest volume categories compared with the reference category [94.2% in the highest volume category vs 88.8% in the reference category, adjusted odds ratio (95% confidence interval, 95% CI) = 1.75 (1.49-2.07)]. Furthermore, significantly lower costs (in US dollars) were observed in the second and fourth categories [mean (standard deviation) for fourth vs reference = $17,800 ($17,378) vs $20,540 ($32,412), adjusted difference (95% CI) = -$2559 (-$3896 to -$1221)]. Hospitals with high volumes of severe trauma patients were significantly associated with a survival benefit and lower total cost per admission.

  19. Yearly Data for Asian & Pacific Islander Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2016 Onward)

    Data.gov (United States)

    Social Security Administration — This data set provides annual volumes for API language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits for federal...

  20. Quarterly Data for Spoken Language Preferences of Supplemental Security Income Blind and Disabled Applicants (2014-2015)

    Data.gov (United States)

    Social Security Administration — This data set provides quarterly volumes for language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits for fiscal...

  1. 29 CFR 2509.94-3 - Interpretive bulletin relating to in-kind contributions to employee benefit plans.

    Science.gov (United States)

    2010-07-01

    ... employee benefit plans. 2509.94-3 Section 2509.94-3 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GENERAL INTERPRETIVE BULLETINS RELATING TO...-kind contributions to employee benefit plans. (a) General. This bulletin sets forth the views of the...

  2. 78 FR 24235 - 166th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2013-04-24

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 166th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 166th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  3. 75 FR 27002 - 151st Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2010-05-13

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 151st Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 151st open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans will be held on...

  4. 76 FR 55706 - 158th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2011-09-08

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 158th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Teleconference Meeting Pursuant to the.... 1142, the 158th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans...

  5. 75 FR 64947 - 154th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2010-10-20

    ... Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting; Notice #0;#0;Federal Register... Employee Benefits Security Administration 154th Meeting of the Advisory Council on Employee Welfare and... Advisory Council on Employee Welfare and Pension Benefit Plans will be held on November 3-4, 2010. The...

  6. 78 FR 5209 - 165th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2013-01-24

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 165th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 165th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  7. 76 FR 36578 - 156th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2011-06-22

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 156th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 156th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; (also known as...

  8. 78 FR 44600 - 167th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2013-07-24

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 167th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 167th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  9. 76 FR 65211 - 159th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2011-10-20

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 159th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 159th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  10. 78 FR 50112 - 168th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2013-08-16

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 168th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Teleconference Meeting Pursuant to the.... 1142, the 168th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans...

  11. 75 FR 11199 - 150th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2010-03-10

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 150th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 150th open meeting of the full Advisory Council on Employee Welfare and Pension Benefit Plans will be...

  12. 78 FR 62708 - 169th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2013-10-22

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 169th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 169th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  13. 76 FR 6498 - 155th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2011-02-04

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 155th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Teleconference Meeting Pursuant to the.... 1142, the 155th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans...

  14. 77 FR 66186 - 164th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2012-11-02

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 164th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 164th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  15. 75 FR 57063 - 153rd Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2010-09-17

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 153rd Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 153rd open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans will be held on...

  16. 78 FR 50112 - Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Extension of Deadline...

    Science.gov (United States)

    2013-08-16

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... appointment to the Advisory Council on Employee Welfare and Pension Benefit Plans. Section 512 of the Employee... of an Advisory Council on Employee Welfare and Pension Benefit Plans (the Council), which is to...

  17. 77 FR 28406 - 161st Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2012-05-14

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 161st Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 161st open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  18. 77 FR 11159 - 160th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2012-02-24

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 160th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 160th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  19. 77 FR 52061 - 163rd Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2012-08-28

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 163rd Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Teleconference Meeting Pursuant to the.... 1142, the 163rd open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans...

  20. 29 CFR 2509.78-1 - Interpretive bulletin relating to payments by certain employee welfare benefit plans.

    Science.gov (United States)

    2010-07-01

    ... employee welfare benefit plans. 2509.78-1 Section 2509.78-1 Labor Regulations Relating to Labor (Continued) EMPLOYEE BENEFITS SECURITY ADMINISTRATION, DEPARTMENT OF LABOR GENERAL INTERPRETIVE BULLETINS RELATING TO... payments by certain employee welfare benefit plans. The Department of Labor today announced its...

  1. 75 FR 47636 - 152nd Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2010-08-06

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 152nd Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 152nd open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans will be held on...

  2. 77 FR 59420 - 164th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2012-09-27

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 164th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 164th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  3. 76 FR 48903 - 157th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of...

    Science.gov (United States)

    2011-08-09

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration 157th Meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans; Notice of Meeting Pursuant to the authority... 157th open meeting of the Advisory Council on Employee Welfare and Pension Benefit Plans (also known as...

  4. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  5. 78 FR 29318 - Notice of Public Meeting of the Assembly of the Administrative Conference of the United States

    Science.gov (United States)

    2013-05-20

    ... United States makes recommendations to administrative agencies, the President, Congress, and the Judicial... improve the adjudication process for Social Security disability claims at the administrative law judge... benefit-cost analyses that accompany proposed and final rules. Science in the Administrative Process. This...

  6. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  7. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  8. 75 FR 45166 - Advisory Council on Employee Welfare and Pension Benefit Plans; Nominations for Vacancies

    Science.gov (United States)

    2010-08-02

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... Council on Employee Welfare and Pension Benefit Plans (the Council), which is to consist of 15 members to... desiring to recommend one or more individuals for appointment to the Advisory Council on Employee Welfare...

  9. 76 FR 44047 - Advisory Council on Employee Welfare and Pension Benefit Plans; Nominations for Vacancies

    Science.gov (United States)

    2011-07-22

    ... DEPARTMENT OF LABOR Employee Benefits Security Administration Advisory Council on Employee Welfare... Council on Employee Welfare and Pension Benefit Plans (the Council), which is to consist of 15 members to... one or more individuals for appointment to the Advisory Council on Employee Welfare and Pension...

  10. 20 CFR 418.1355 - What are the rules for reopening a decision by an administrative law judge of the Office of...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What are the rules for reopening a decision by an administrative law judge of the Office of Medicare Hearings and Appeals (OMHA) or by the Medicare Appeals Council (MAC)? 418.1355 Section 418.1355 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES Medicare Part B...

  11. Yearly Data for Asian & Pacific Islander Language Preferences of Supplemental Security Income Blind and Disabled Applicants (FY 2016, including 53rd week)

    Data.gov (United States)

    Social Security Administration — This dataset provides annual volumes for API language preferences at the national level of individuals filing claims for SSI Blind and Disabled benefits for federal...

  12. 20 CFR 410.610 - Administrative actions that are initial determinations.

    Science.gov (United States)

    2010-04-01

    ... determinations. 410.610 Section 410.610 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL COAL MINE...) Withdrawal of claim or cancellation of withdrawal request. When a request for withdrawal of a claim, or a request for cancellation of a “request for withdrawal” of a claim, is denied by the Administration, the...

  13. 20 CFR 418.3005 - Purpose and administration of the program.

    Science.gov (United States)

    2010-04-01

    ... and Human Services has responsibility for administration of the Medicare program, including the new.... 418.3005 Section 418.3005 Employees' Benefits SOCIAL SECURITY ADMINISTRATION MEDICARE SUBSIDIES... drug coverage for individuals who meet certain income and resources requirements under the law as...

  14. 77 FR 54646 - Social Security Acquiescence Ruling (AR) 12-1(8); Correction; Petersen v. Astrue, 633 F.3d 633...

    Science.gov (United States)

    2012-09-05

    ... II of the Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security Acquiescence Ruling; Correction. SUMMARY: The Social Security Administration published a document... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR...

  15. Privacy and Security: A Bibliography.

    Science.gov (United States)

    Computer and Business Equipment Manufacturers Association, Washington, DC.

    Compiled at random from many sources, this bibliography attempts to cite as many publications concerning privacy and security as are available. The entries are organized under seven headings: (1) systems security, technical security, clearance of personnel, (2) corporate physical security, (3) administrative security, (4) miscellaneous--privacy…

  16. 20 CFR 411.552 - What effect will the subsequent entitlement to title II benefits have on EN payments for title...

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 2 2010-04-01 2010-04-01 false What effect will the subsequent entitlement to title II benefits have on EN payments for title XVI beneficiaries after they assign their ticket? 411.552 Section 411.552 Employees' Benefits SOCIAL SECURITY ADMINISTRATION THE TICKET TO WORK AND SELF...

  17. 77 FR 1971 - Supplemental Security Income and Homeless Individuals

    Science.gov (United States)

    2012-01-12

    ... visit our Internet site, Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0087] Supplemental Security Income and Homeless Individuals AGENCY: Social Security Administration. ACTION: Notice; Request for Comments. SUMMARY...

  18. 20 CFR 404.1620 - General administrative requirements.

    Science.gov (United States)

    2010-04-01

    ... cause the State to be substantially failing to comply with our regulations or other written guidelines... substantially failing to follow our regulations or other written guidelines. (b) The State is responsible for... Section 404.1620 Employees' Benefits SOCIAL SECURITY ADMINISTRATION FEDERAL OLD-AGE, SURVIVORS AND...

  19. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  20. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  1. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  2. VMware vCloud security

    CERN Document Server

    Sarkar, Prasenjit

    2013-01-01

    VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMware vCloud Director and vCloud Networking and Security.This book is primarily for technical professionals with system administration and security administration skills with significant VMware vCloud experience who want to learn about advanced concepts of vCloud security and compliance.

  3. The story of the social security number.

    Science.gov (United States)

    Puckett, Carolyn

    2009-01-01

    The use of the Social Security number (SSN) has expanded significantly since its inception in 1936. Created merely to keep track of the earnings history of U.S. workers for Social Security entitlement and benefit computation purposes, it has come to be used as a nearly universal identifier. Assigned at birth, the SSN enables government agencies to identify individuals in their records and businesses to track an individual's financial information. This article explores the history and meaning of the SSN and the Social Security card, as well as the Social Security Administration's (SSA's) SSN master file, generally known as the Numident. The article also traces the historical expansion of SSN use and the steps SSA has taken to enhance SSN integrity.

  4. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  5. Student Dissertation Explores Privatization of Global Security

    OpenAIRE

    Naval Postgraduate School Public Affairs Office

    2012-01-01

    NPS national security affairs doctoral student Cmdr. Dan Straub weighs the benefits and challenges of using private security contractors for United Nations peacekeeping efforts in his upcoming dissertation.

  6. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  7. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  8. Analysis of the Risks and Benefits of New Chemical Entities Approved by the US Food and Drug Administration (FDA) and Subsequently Withdrawn From the US Market.

    Science.gov (United States)

    Patriarca, Peter A; Van Auken, R Michael; Kebschull, Scott A

    2018-01-01

    Benefit-risk evaluations of drugs have been conducted since the introduction of modern regulatory systems more than 50 years ago. Such judgments are typically made on the basis of qualitative or semiquantitative approaches, often without the aid of quantitative assessment methods, the latter having often been applied asymmetrically to place emphasis on benefit more so than harm. In an effort to preliminarily evaluate the utility of lives lost or saved, or quality-adjusted life-years (QALY) lost and gained as a means of quantitatively assessing the potential benefits and risks of a new chemical entity, we focused our attention on the unique scenario in which a drug was initially approved based on one set of data, but later withdrawn from the market based on a second set of data. In this analysis, a dimensionless risk to benefit ratio was calculated in each instance, based on the risk and benefit quantified in similar units. The results indicated that FDA decisions to approve the drug corresponded to risk to benefit ratios less than or equal to 0.136, and that decisions to withdraw the drug from the US market corresponded to risk to benefit ratios greater than or equal to 0.092. The probability of FDA approval was then estimated using logistic regression analysis. The results of this analysis indicated that there was a 50% probability of FDA approval if the risk to benefit ratio was 0.121, and that the probability approaches 100% for values much less than 0.121, and the probability approaches 0% for values much greater than 0.121. The large uncertainty in these estimates due to the small sample size and overlapping data may be addressed in the future by applying the methodology to other drugs.

  9. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    .... In this approach, the "level of service" must be within an acceptable range, and can indicate degrees of security with respect to various aspects of assurance, mechanistic strength, administrative diligence, etc...

  10. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  11. 48 CFR 3028.106 - Administration.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 7 2010-10-01 2010-10-01 false Administration. 3028.106 Section 3028.106 Federal Acquisition Regulations System DEPARTMENT OF HOMELAND SECURITY, HOMELAND SECURITY... 3028.106 Administration. ...

  12. Linux Security Cookbook

    CERN Document Server

    Barrett, Daniel J; Byrnes, Robert G

    2003-01-01

    Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-fol

  13. Veterans Health Administration (VHA)

    Data.gov (United States)

    Social Security Administration — The purpose of this agreement is for SSA to verify SSNs and other identifying information for the Department of Veterans Affairs, VHA. DVA will use the information...

  14. 78 FR 46309 - Rules of Administrative Finality

    Science.gov (United States)

    2013-07-31

    ...-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION 20 CFR Parts 404 and 416 [Docket No. SSA 2013-0011] Rules of Administrative Finality AGENCY: Social Security Administration (SSA) ACTION: Notice and request for comments...

  15. Android security cookbook

    CERN Document Server

    Makan, Keith

    2013-01-01

    Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from

  16. Security vs. Safety.

    Science.gov (United States)

    Sturgeon, Julie

    1999-01-01

    Provides administrative advice on how some safety experts have made college campuses safer and friendlier without breaking the budget. Tips on security and advice on safety management that encompasses the whole environment are highlighted. (GR)

  17. Senior Benefits

    Science.gov (United States)

    Information Medicaid Public Health Centers Temporary "Cash" Assistance Senior Benefits Program GovDelivery Skip Navigation Links Health and Social Services > Public Assistance > Senior Benefits Page Content Senior Benefits Senior Benefits Logo Senior Benefits Fact Sheet - June, 2016 Reduction Information

  18. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  19. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  20. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  1. How Should Public Administration Education Curriculum Within Indiana Higher Education Institutions Evolve to Reflect the Complex Homeland Security Issues Faced by Future Public Sector Employees?

    Science.gov (United States)

    2012-03-01

    Administration Research and Theory, 25–57. O’Leary, R. (2010). Traditions, ideas, spirits, event, challenge. Journal of Public Adminstration , 1–36. Purdue...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited HOW SHOULD PUBLIC ... PUBLIC SECTOR EMPLOYEES? by Bryant S. Lucas March 2012 Thesis Advisor: Christopher Bellavita Second Reader: Lauren Wollman THIS PAGE

  2. 77 FR 19680 - Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security

    Science.gov (United States)

    2012-04-02

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration [Docket No. TSA-2006-26514] Extension of Agency Information Collection Activity Under OMB Review: Rail Transportation Security AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice announces that the...

  3. 77 FR 15114 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2012-03-14

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day Notice. SUMMARY: This notice...

  4. 75 FR 2556 - Extension of Agency Information Collection Activity Under OMB Review: Transportation Security...

    Science.gov (United States)

    2010-01-15

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Transportation Security Officer (TSO) Medical Questionnaire AGENCY: Transportation Security Administration, DHS. ACTION: 30-day notice. SUMMARY: This notice...

  5. 75 FR 10507 - Information Security Oversight Office; National Industrial Security Program Policy Advisory...

    Science.gov (United States)

    2010-03-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office; National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... individuals planning to attend must be submitted to the Information Security Oversight Office (ISOO) no later...

  6. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  7. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  8. Removal of regulations on black lung benefits. Final rule.

    Science.gov (United States)

    2012-03-30

    This final rule removes regulations on the Black Lung program from the Social Security Administration's (SSA) chapter of the Code of Federal Regulations (CFR). The Black Lung Consolidation of Administrative Responsibility Act transferred the responsibility for administering Part B of the Black Lung benefits program from SSA to the Department of Labor (DOL), and we are removing the regulations in recognition of the fact that we are no longer responsible for administering any aspect of the Part B Black Lung program. DOL concurs with this final rule removing the regulations.

  9. Benefits at risk

    DEFF Research Database (Denmark)

    Lassen, Jesper; Sandøe, Peter

    2007-01-01

    Herbicide resistant GM plants have been promoted as a tool in the development of more environment-friendly agriculture. The environmental benefits here, however, depend not only on farmer's acceptance of GM crops as such, but also on their willingness to use herbicides in accordance with altered ...... spraying plans. In this paper, we will argue that factors driving the spraying practices of Danish farmers may hamper efforts to secure the environmental benefits of the new crops....

  10. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  11. Flexible Land Administration

    DEFF Research Database (Denmark)

    Enemark, Stig

    2014-01-01

    Security of tenure is widely considered to be the missing piece of the puzzle when it comes to eradication of poverty. And, as explained in the previous issue of Geoinformatics, the European Union is now placing land rights at the heart of EU development policy. This article presents a way forwar...... in terms of building flexible and "fit-for-purpose" land administration systems in developing countries. This will ensure security of tenure for all and sustainable management of the use of land....

  12. Behavioral Public Administration

    DEFF Research Database (Denmark)

    Grimmelikhuijsen, Stephan; Jilke, Sebastian; Olsen, Asmus Leth

    2017-01-01

    on theories and methods from psychology and related fields and point to research in public administration that could benefit from further integration. An analysis of public administration topics through a psychological lens can be useful to confirm, add nuance to, or extend classical public administration...... theories. As such, behavioral public administration complements traditional public administration. Furthermore, it could be a two-way street for psychologists who want to test the external validity of their theories in a political-administrative setting. Finally, four principles are proposed to narrow......Behavioral public administration is the analysis of public administration from the micro-level perspective of individual behavior and attitudes by drawing on insights from psychology on the behavior of individuals and groups. The authors discuss how scholars in public administration currently draw...

  13. USCIS Applications for Immigration Benefits and Naturalization Monthly Statistical Reports

    Data.gov (United States)

    Department of Homeland Security — The 'Application for Immigration Benefits' monthly charts provide data on applications and petitions received by USCIS for immigration benefits. The report exclude...

  14. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  15. SMS security system for smart home detectors

    OpenAIRE

    Cekova, Katerina; Gelev, Saso

    2016-01-01

    Security has always been an important problem everywhere. Home security has been a major issue where crime is increasing and everybody wants home security to protect the home. Safety from theft and flame are the most important requirements of a home security system for people. A remote home security system offers many benefits from keeping homeowners, and their property safe. This paper present controlling of the home security system remotely from Android Application. Owners can turn on or...

  16. Information security management with ITIL V3

    CERN Document Server

    Cazemier, Jacques A; Peters, Louk

    2010-01-01

    This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers:Fundamentals of information security ? providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors.Fundamentals of management of information security - explains what information security manageme

  17. Online benefits solutions--a new trend in managing employee benefits programs.

    Science.gov (United States)

    Ala, Mohammad; Brunaczki, Bernadette

    2003-01-01

    This article focuses on the array of online benefits solutions offered by technology companies and reports the benefits to both employers and employees. Some of the benefits include reduced paperwork, reduced errors, and reduced administration costs. Companies that can deliver these benefits will be in great demand to help manage benefits programs and streamline the administrative processes.

  18. 76 FR 81516 - Homeland Security Advisory Council

    Science.gov (United States)

    2011-12-28

    ... Transportation Security Administration's (TSA) Frequent Traveler Program; examine evolving threats in cyber... Evolving Threats in Cyber Security. Basis for Closure: In accordance with Section 10(d) of the Federal... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0111] Homeland Security Advisory Council...

  19. Department of Homeland Security Semiannual Regulatory Agenda

    Science.gov (United States)

    2010-04-26

    ... NUMERICAL LIMITATIONS Legal Authority: 8 USC 1184(g) Abstract: The Department of Homeland Security is... Stage Transportation Security Administration (TSA) 197. AIRCRAFT REPAIR STATION SECURITY Legal Authority.... MODIFICATION OF THE AVIATION SECURITY INFRASTRUCTURE FEE (ASIF) (MARKET SHARE) Legal Authority: 49 USC 44901...

  20. 20 CFR 633.306 - Retirement benefits.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Retirement benefits. 633.306 Section 633.306 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR MIGRANT AND SEASONAL FARMWORKER PROGRAMS Program Design and Administrative Procedures § 633.306 Retirement benefits. No funds...

  1. SELinux policy administration

    CERN Document Server

    Vermeulen, Sven

    2013-01-01

    A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands.Linux administrators will enjoy the various SELinux features that this book covers and the approach used to guide the admin into understanding how SELinux works. The book assumes that you have basic knowledge in Linux administration, especially Linux permission and user management.

  2. Disability Case Review of Administrative Law Judge Hearing Decisions

    Data.gov (United States)

    Social Security Administration — The Disability Case Review is a post-effectuation quality review of administrative law judge (ALJ) disability hearing decisions. This dataset includes results from...

  3. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  4. Practical Unix and Internet Security

    CERN Document Server

    Garfinkel, Simson; Spafford, Gene

    2003-01-01

    When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world. Focusing on the four most popular Unix varia

  5. Secure virtualization: benefits, risks and constraints

    CSIR Research Space (South Africa)

    Carroll, M

    2011-05-01

    Full Text Available Cloud computing is changing the IT delivery model to provide on-demand self-service access to a shared pool of computing resources (physical and virtual) via broad network access to offer reduced costs, scalability, flexibility, capacity utilization...

  6. Secure cloud computing: benefits, risks and controls

    CSIR Research Space (South Africa)

    Carroll, M

    2011-08-01

    Full Text Available Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilising pools of often virtualized resources. Through these features...

  7. Risk Based Security Management at Research Reactors

    Energy Technology Data Exchange (ETDEWEB)

    Ek, David R. [Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States)

    2015-09-01

    This presentation provides a background of what led to the international emphasis on nuclear security and describes how nuclear security is effectively implemented so as to preserve the societal benefits of nuclear and radioactive materials.

  8. Online, Batch and CICS Social Security Statement

    Data.gov (United States)

    Social Security Administration — A database that contains client preference information for the SSA initiated Social Security Statement as well as other data including SSN, disposition for paper SS...

  9. Youth transitioning out of foster care: an evaluation of a Supplemental Security Income policy change.

    Science.gov (United States)

    King, Laura; Rukh-Kamaa, Aneer

    2013-01-01

    Youths with disabilities face numerous challenges when they transition to adulthood. Those who are aging out of foster care face the additional challenge of losing their foster care benefits, although some will be eligible for Supplemental Security Income (SSI) payments after foster care ceases. However, the time needed to process SSI applications exposes those youths to a potential gap in the receipt of benefits as they move between foster care and SSI. We evaluate the effects of a 2010 Social Security Administration policy change that allows such youths to apply for SSI payments 60 days earlier than the previous policy allowed. The change provides additional time for processing claims before the applicant ages out of the foster care system. We examine administrative records on SSI applications from before and after the policy change to determine if the change has decreased the gap between benefits for the target population.

  10. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  11. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  12. Case and Administrative Support Tools

    Data.gov (United States)

    U.S. Environmental Protection Agency — Case and Administrative Support Tools (CAST) is the secure portion of the Office of General Counsel (OGC) Dashboard business process automation tool used to help...

  13. US Fire Administration Fire Statistics

    Data.gov (United States)

    Department of Homeland Security — The U.S. Fire Administration collects data from a variety of sources to provide information and analyses on the status and scope of the fire problem in the United...

  14. The Land Administration Domain Model

    NARCIS (Netherlands)

    Lemmen, C.; Van Oosterom, P.J.M.; Bennett, R.

    2015-01-01

    Societal drivers including poverty eradication, gender equality, indigenous recognition, adequate housing, sustainable agriculture, food security, climate change response, and good governance, influence contemporary land administration design. Equally, the opportunities provided by technological

  15. 20 CFR 229.45 - Employee benefit.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 1 2010-04-01 2010-04-01 false Employee benefit. 229.45 Section 229.45 Employees' Benefits RAILROAD RETIREMENT BOARD REGULATIONS UNDER THE RAILROAD RETIREMENT ACT SOCIAL SECURITY OVERALL MINIMUM GUARANTEE Computation of the Overall Minimum Rate § 229.45 Employee benefit. The original...

  16. Military veterans and Social Security.

    Science.gov (United States)

    Olsen, Anya

    There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their families and have provided them with benefits through several government programs, including Social Security credits, home loan guarantees, and compensation and pension payments through the Department of Veterans Affairs. It is therefore important to understand the economic and demographic characteristics of this population. Information in this article is based on data from the March 2004 Current Population Survey, a large, nationally representative survey of U.S. households. Veterans are overwhelmingly male compared with all adult Social Security beneficiaries who are more evenly split between males and females. Military veterans receiving Social Security are more likely to be married and to have finished high school compared with all adult Social Security beneficiaries, and they are less likely to be poor or near poor than the overall beneficiary population. Fourteen percent of veterans receiving Social Security benefits have income below 150 percent of poverty, while 25 percent of all adult Social Security beneficiaries are below this level. The higher economic status among veterans is also reflected in the relatively high Social Security benefits they receive. The number of military veterans receiving Social Security benefits will remain high over the next few decades, while their make-up and characteristics will change. In particular, the number of Vietnam War veterans who receive Social Security will increase in the coming decades, while the number of veterans from World War II and the Korean War will decline.

  17. 76 FR 40296 - Declassification of National Security Information

    Science.gov (United States)

    2011-07-08

    ... Declassification of National Security Information AGENCY: National Archives and Records Administration. ACTION... classified national security information in records transferred to NARA's legal custody. The rule incorporates changes resulting from issuance of Executive Order 13526, Classified National Security Information...

  18. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  19. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  20. 28 CFR 700.24 - Security of systems of records.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Security of systems of records. 700.24... Records Under the Privacy Act of 1974 § 700.24 Security of systems of records. (a) The Office Administrator or Security Officer shall be responsible for issuing regulations governing the security of systems...

  1. 34 CFR 668.36 - Social security number.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 3 2010-07-01 2010-07-01 false Social security number. 668.36 Section 668.36 Education... Islands, and the Republic of Palau, the Secretary attempts to confirm the social security number a student... Security Administration. If the Social Security Administration confirms that number, the Secretary notifies...

  2. Command and Control for Homeland Security

    National Research Council Canada - National Science Library

    Greene, Marjorie

    2007-01-01

    ... Analysis of the Toronto SARS Outbreak, Vertical Integration, Vertical Integration in a Military Command Hierarchy, Information flows for a domestic incident, C2 for Homeland Security will benefit...

  3. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  4. Interagency Security Classification Appeals Panel (ISCAP) Decisions

    Data.gov (United States)

    National Archives and Records Administration — This online collection includes documents decided upon by the Interagency Security Classification Appeals Panel (ISCAP) starting in Fiscal Year 2012. The documents...

  5. Selection of the Best Security Controls for Rapid Development of Enterprise-Level Cyber Security

    Science.gov (United States)

    2017-03-01

    investment (ROI) assessment. This ROI assessment entailed consideration of both the likely/expected security benefits of each candidate security control...the top 10–20 cyber security controls, where ranking was based upon a return on investment (ROI) assessment. This ROI assessment entailed...11  II.  CYBER SECURITY: UNDERLYING PRINCIPLES, FUNDAMENTALS AND BEST PRACTICES .................................................13  A

  6. Elements of Social Security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security contains an overview of important benefit schemes in Denmark, Sweden, Finland, Austria, Germany, the Netherlands, Great Britain and Canada. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact on disposable...

  7. Elements of Social Security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, the Netherlands, Great Britain and Canada. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact on disposable income...

  8. Elements of Social Security

    DEFF Research Database (Denmark)

    Hansen, Hans

    Elements of Social Security contains an overview of important benefit schemes in Denmark, Sweden, Finland, Germany, Great Britain, the Netherlands and Canada. The schemes are categorized according to common sets of criteria and compared. Stylized cases illustrate the impact on disposable income...

  9. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  10. 20 CFR 617.60 - Administration requirements. [Reserved

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Administration requirements. [Reserved] 617.60 Section 617.60 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR... Agencies § 617.60 Administration requirements. [Reserved] ...

  11. Using collateral to secure loans

    OpenAIRE

    Yaron Leitner

    2006-01-01

    In “Using Collateral to Secure Loans,” Yaron Leitner asks: Why is collateral used to secure some loans, but not others? And why does collateral potentially involve more risk? He considers these questions, looking at some of the explanations for using collateral, focusing on its benefits and drawbacks.

  12. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  13. 76 FR 67484 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-11-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  14. 76 FR 28099 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-05-13

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting to discuss National Industrial Security Program policy matters...

  15. 76 FR 6636 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2011-02-07

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office... made for the following committee meeting. To discuss National Industrial Security Program policy...

  16. 75 FR 65526 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2010-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: Information Security Oversight Office..., announcement is made for the following committee meeting, to discuss National Industrial Security Program...

  17. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  18. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  19. 49 CFR 1552.23 - Security awareness training programs.

    Science.gov (United States)

    2010-10-01

    ... employee to identify— (i) Uniforms and other identification, if any are required at the flight school, for... SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY FLIGHT SCHOOLS Flight School Security Awareness Training § 1552.23 Security awareness training programs. (a) General. A flight...

  20. 49 CFR 1544.305 - Security Directives and Information Circulars.

    Science.gov (United States)

    2010-10-01

    ... threat assessment or to a specific threat against civil aviation, TSA issues a Security Directive setting... 49 Transportation 9 2010-10-01 2010-10-01 false Security Directives and Information Circulars...) TRANSPORTATION SECURITY ADMINISTRATION, DEPARTMENT OF HOMELAND SECURITY CIVIL AVIATION SECURITY AIRCRAFT OPERATOR...

  1. Comparisons of Food and Drug Administration and European Medicines Agency risk management implementation for recent pharmaceutical approvals: report of the International Society for Pharmacoeconomics and outcomes research risk benefit management working group.

    Science.gov (United States)

    Lis, Yvonne; Roberts, Melissa H; Kamble, Shital; J Guo, Jeff; Raisch, Dennis W

    2012-12-01

    1) To compare the Food and Drug Administration's (FDA's) Risk Evaluation and Mitigation Strategies (REMS) and European Medicines Agency's (EMA's) Risk Management Plan (RMP) guidances and 2) to compare REMS and RMPs for specific chemical entities and biological products. FDA, EMA, and pharmaceutical company Web sites were consulted for details pertaining to REMS and RMPs. REMS requirements include medication guides, communication plans, elements to ensure safe use, implementation systems, and specified assessment intervals. RMP requirements are increased pharmacovigilance and risk minimization activities. We compared these requirements for drugs requiring both REMS and RMPs. We identified 95 drugs on FDA's REMS list as of March 2010. Of these, there were 29 drugs (11 biologics and 18 new chemical entities) with EMA RMPs. REMS and RMPs are similar in objectives, with comparable toolkits. Both allow flexibility in product-specific actions, recognizing adverse effects of potential concern. Of the 29 drugs reviewed, REMS requirements not included in RMPs were patient medication guides (100% of the drugs), provider communication plans (38%), and routine monitoring of REMS (66%). RMP requirements not included in REMS were specific adverse event reporting (45% of the drugs), prospective registry studies (34%), prospective epidemiology studies (24%), additional trial data (28%), and Summary of Product Characteristics contraindications (76%). Both REMS and RMPs provide positive guidance for identification, monitoring, and minimization of risk to patient safety. Currently, neither agency provides specific guidance on how risk should be related to benefit either qualitatively or quantitatively. Copyright © 2012 International Society for Pharmacoeconomics and Outcomes Research (ISPOR). Published by Elsevier Inc. All rights reserved.

  2. 28 CFR 42.714 - Special benefits.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 1 2010-07-01 2010-07-01 false Special benefits. 42.714 Section 42.714 Judicial Administration DEPARTMENT OF JUSTICE NONDISCRIMINATION; EQUAL EMPLOYMENT OPPORTUNITY; POLICIES AND... benefits. If a recipient operating a program or activity provides special benefits to the elderly or to...

  3. Using Common Sense to Effectively Integrate Security Technologies within a School's Security Strategy

    Energy Technology Data Exchange (ETDEWEB)

    Gree, M.W.

    1998-11-03

    Security technologies are not the answer to all school security problems. However, they can be an excellent tool for school administrators and security personnel when incorporated into a total security strategy involving personnel, procedures, and facility layout. Unfortunately, very few of the tougher security problems in schools have solutions that are affordable, effective, and acceptable. Like any other type of facility, a school's security staff must understand the strengths and limitations of the security measures they are csecurity practices, which will rarely increase new building costs if included in the initial planning.

  4. Developing an Undergraduate Information Systems Security Track

    Science.gov (United States)

    Sharma, Aditya; Murphy, Marianne C.; Rosso, Mark A.; Grant, Donna

    2013-01-01

    Information Systems Security as a specialized area of study has mostly been taught at the graduate level. This paper highlights the efforts of establishing an Information Systems (IS) Security track at the undergraduate level. As there were many unanswered questions and concerns regarding the Security curriculum, focus areas, the benefit of…

  5. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  6. Information Security Management in Context of Globalization

    OpenAIRE

    Wawak, Slawomir

    2012-01-01

    Modern information technologies are the engine of globalization. At the same time, the global market influences the way of looking at information security. Information security thus becomes an increasingly important field. The article discuses the results of research on information security management systems in public administration in Poland.

  7. 5 CFR 1312.31 - Security violations.

    Science.gov (United States)

    2010-01-01

    ... States Secret Service when an office/division fails to properly secure classified information. Upon... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Security violations. 1312.31 Section 1312..., DOWNGRADING, DECLASSIFICATION AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION Control and Accountability of...

  8. 25 CFR 40.4 - Security.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...

  9. 15 CFR 742.4 - National security.

    Science.gov (United States)

    2010-01-01

    ... 15 Commerce and Foreign Trade 2 2010-01-01 2010-01-01 false National security. 742.4 Section 742.4... INDUSTRY AND SECURITY, DEPARTMENT OF COMMERCE EXPORT ADMINISTRATION REGULATIONS CONTROL POLICY-CCL BASED CONTROLS § 742.4 National security. (a) License requirements. It is the policy of the United States to...

  10. 36 CFR 1275.22 - Security.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Security. 1275.22 Section... THE NIXON ADMINISTRATION Preservation and Protection § 1275.22 Security. The Archivist is responsible for providing adequate security for the Presidential historical materials. ...

  11. 14 CFR 460.53 - Security.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Security. 460.53 Section 460.53 Aeronautics and Space COMMERCIAL SPACE TRANSPORTATION, FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF....53 Security. An operator must implement security requirements to prevent any space flight participant...

  12. Making Technology Work for Campus Security

    Science.gov (United States)

    Floreno, Jeff; Keil, Brad

    2010-01-01

    The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…

  13. 7 CFR 1738.22 - Loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1738.22 Section 1738.22 Agriculture... RURAL BROADBAND ACCESS LOANS AND LOAN GUARANTEES Loan Purposes and Basic Policies § 1738.22 Loan security. (a) RUS makes loans only if, in the judgment of the Administrator, the security therefore is...

  14. 78 FR 5116 - NASA Information Security Protection

    Science.gov (United States)

    2013-01-24

    ... 2700-AD61 NASA Information Security Protection AGENCY: National Aeronautics and Space Administration..., projects, plans, or protection services relating to the national security; or (h) The development... implement the provisions of Executive Order (E.O.) 13526, Classified National Security Information, and...

  15. 6 CFR 17.525 - Fringe benefits.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Fringe benefits. 17.525 Section 17.525 Domestic... in Employment in Education Programs or Activities Prohibited § 17.525 Fringe benefits. (a) “Fringe benefits” defined. For purposes of these Title IX regulations, the term fringe benefits means any medical...

  16. 24 CFR 241.885 - Insurance benefits.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 2 2010-04-01 2010-04-01 false Insurance benefits. 241.885 Section... § 241.885 Insurance benefits. (a) Method of payment. Payment of claims shall be made in the following... acceptable assignment of the note and security instrument to the Commissioner, the insurance benefits shall...

  17. Marital Biography, Social Security Receipt, and Poverty.

    Science.gov (United States)

    Lin, I-Fen; Brown, Susan L; Hammersmith, Anna M

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social Security and they enjoy relatively high Social Security benefits and very low poverty levels. Among singles, economic well-being varies by marital biography and gender. Gray divorced and never-married women face considerable economic insecurity. Their Social Security benefits are relatively low, and their poverty rates are quite high (over 25%), indicating Social Security alone is not sufficient to prevent these women from falling into poverty. By comparison, gray widoweds are the most advantaged singles.

  18. Costs of children--benefit theory and population control.

    Science.gov (United States)

    Tian, X

    1989-01-01

    In order to stem the rising fertility and growth rates in China, new theories and measures are needed. The author suggests new insights into the relationships between reproductive behavior and economic interests, regulation of individual reproductive behavior by such economic interests, and governmental performance with these interests in mind. Topics are devoted to the benefit theory about the costs of children, trends in Chinese children's costs and benefits, and family planning (FP) based on children's costs and benefits. Natural biological law governed people's reproductive behavior and the number of offspring until there was control over human reproduction. Factors which determine the desired number of children can be economic, cultural, political, historical, or geographical. In modern times and with the commercialism of society, children have been sometimes viewed as commodities and Western economists (Becker and Leibenstein) have theorized the cost benefit ratio to parents. Expected positive benefits are support, labor force contribution, and family happiness. Negative benefits are the direct and indirect costs in time and money raising children. Children are produced where benefits are positive, and where benefits and costs are equal, circumstances will determine the result. No children will be produced when costs exceed benefits. The concept of net costs is described. Chinese trends indicate a direction toward a market oriented economy. Instead of following Western theory, as economic development has advanced rapidly the value of children has grown. The reasons are explained as marginal children may still bring benefits in a market where the function of regulation of a labor market is limited, children still render better support for their parents without a developed social security system, and boys are expected to secure their families fortunes during the changing economic conditions. The author recognizes that other conditions such as the number of

  19. Information risk and security modeling

    Science.gov (United States)

    Zivic, Predrag

    2005-03-01

    This research paper presentation will feature current frameworks to addressing risk and security modeling and metrics. The paper will analyze technical level risk and security metrics of Common Criteria/ISO15408, Centre for Internet Security guidelines, NSA configuration guidelines and metrics used at this level. Information IT operational standards view on security metrics such as GMITS/ISO13335, ITIL/ITMS and architectural guidelines such as ISO7498-2 will be explained. Business process level standards such as ISO17799, COSO and CobiT will be presented with their control approach to security metrics. Top level, the maturity standards such as SSE-CMM/ISO21827, NSA Infosec Assessment and CobiT will be explored and reviewed. For each defined level of security metrics the research presentation will explore the appropriate usage of these standards. The paper will discuss standards approaches to conducting the risk and security metrics. The research findings will demonstrate the need for common baseline for both risk and security metrics. This paper will show the relation between the attribute based common baseline and corporate assets and controls for risk and security metrics. IT will be shown that such approach spans over all mentioned standards. The proposed approach 3D visual presentation and development of the Information Security Model will be analyzed and postulated. Presentation will clearly demonstrate the benefits of proposed attributes based approach and defined risk and security space for modeling and measuring.

  20. Salário mínimo, benefício previdenciário e as famílias de baixa renda Minimum wage, social security benefits and low-income families

    Directory of Open Access Journals (Sweden)

    Cláudio Salvadori Dedecca

    2006-12-01

    Full Text Available Este artigo tem foco nas famílias com rendimento per capita de até ¼ do salário mínimo. São analisadas as condições de inserção no mercado de trabalho e a influência dos benefícios previdenciários para o padrão de renda auferido. A preocupação, portanto, volta-se para a importância dos benefícios da previdência, no sentido de atenuar a fragilidade de renda destas famílias e as conseqüências da desvinculação do valor do seu piso do salário mínimo para este padrão de rendimentos. Analisando-se as características dos componentes das famílias de baixa renda, observa-se que, diante das transformações estruturais no processo de produção e do cenário conjuntural da economia brasileira, aqueles com idade ativa não apresentam os pré-requisitos necessários para se inserirem de forma digna no mundo do trabalho. Dessa forma, o estudo da composição da renda das famílias mais pobres mostra que a renda dos inativos - aposentados e pensionistas - é fundamental para retirar tais famílias do limite da linha de pobreza. O perfil dos componentes das famílias será analisado a partir dos microdados da Pesquisa Nacional por Amostra de Domicílios - PNAD/IBGE - para 2004, segundo idade, nível de escolaridade, cor ou raça e inserção no mercado de trabalho propriamente dita: tipo de atividade exercida e posição na ocupação. A comparação do perfil dos componentes das famílias mais carentes com o do total das famílias mostrará que as rendas de aposentadoria e pensão tornam-se fundamentais não apenas para diminuição da desigualdade, mas, fundamentalmente, para redução da pobreza.This article discusses families with per capita income of up to ¼ of the minimum monthly wage in Brazil. The conditions of participation in the labor market and the influence of social security benefits on the pattern of income earned are analyzed. The concern, therefore, is with the importance of social security benefits in attenuating

  1. Administrating Solr

    CERN Document Server

    Mohan, Surendra

    2013-01-01

    A fast-paced, example-based guide to learning how to administrate, monitor, and optimize Apache Solr.""Administrating Solr"" is for developers and Solr administrators who have a basic knowledge of Solr and who are looking for ways to keep their Solr server healthy and well maintained. A basic working knowledge of Apache Lucene is recommended, but this is not mandatory.

  2. Administrative Synergy

    Science.gov (United States)

    Hewitt, Kimberly Kappler; Weckstein, Daniel K.

    2012-01-01

    One of the biggest obstacles to overcome in creating and sustaining an administrative professional learning community (PLC) is time. Administrators are constantly deluged by the tyranny of the urgent. It is a Herculean task to carve out time for PLCs, but it is imperative to do so. In this article, the authors describe how an administrative PLC…

  3. Multiple Benefits.

    Science.gov (United States)

    Kreider, Beth

    1997-01-01

    Discusses the benefits of dome architecture for a community's middle- and high-school multi-purpose facility. The dome construction is revealed as being cost effective in construction and in maintenance and energy costs. (GR)

  4. 76 FR 65558 - Rescission of Social Security Ruling 97-2p

    Science.gov (United States)

    2011-10-21

    ...-800-325-0778, or visit our Internet site, Social Security Online, at http://www.socialsecurity.gov... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA 2007-0092] Rescission of Social Security Ruling 97-2p AGENCY: Social Security Administration. ACTION: Notice of rescission of Social Security Ruling...

  5. 20 CFR 628.310 - Administration.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Administration. 628.310 Section 628.310 Employees' Benefits EMPLOYMENT AND TRAINING ADMINISTRATION, DEPARTMENT OF LABOR PROGRAMS UNDER TITLE II OF THE JOB TRAINING PARTNERSHIP ACT State Programs § 628.310 Administration. Funds provided to the...

  6. Análise comparativa do registro médico-pericial do diagnóstico de transtornos mentais de segurados do Instituto Nacional do Seguro Social requerentes de auxílio-doença Comparative analysis of the expertise recordings of mental disorders diagnoses of secured citizens of the Brazilian National Institute of Social Security requiring sickness benefit

    Directory of Open Access Journals (Sweden)

    Adriana Kelmer Siano

    2010-01-01

    Full Text Available OBJETIVOS: Analisar comparativamente os registros médico-periciais dos diagnósticos de segurados do INSS requerentes de auxílio-doença apresentando transtorno mental. MÉTODO: Estudo retrospectivo de registros de perícias iniciais realizadas em agências da Previdência Social de Juiz de Fora, MG, entre julho/2004 e dezembro/2006. Foram realizadas análises bivariadas de acordo com o local de realização da perícia, categoria de perito médico examinador e período da avaliação RESULTADOS: Transtornos depressivos leves ou moderados e transtornos persistentes do humor (39,6% e os transtornos de ansiedade (34,5% - quadros mais leves que não comprometeriam tanto a capacidade laborativa - foram os diagnósticos mais frequentemente registrados. Dentre as comorbidades, transtornos mentais foram mais frequentes (33,6% que quadros clínicos, especialmente na agência Riachuelo, entre peritos concursados após 2005 e no quarto período estudado. A concordância entre o diagnóstico do benefício atual e o do benefício anterior foi baixa, inferior a 50% na maioria dos casos, mesmo para transtornos mentais graves e com características clínicas mais bem definidas, como as psicoses. A maior taxa de concordância ocorreu com os transtornos por uso de substâncias psicoativas entre peritos credenciados (66,7%. CONCLUSÃO: Este estudo evidencia possíveis falhas no treinamento dos peritos médicos de Juiz de Fora no que se refere ao registro do diagnóstico dos transtornos mentais dos segurados avaliados.OBJECTIVES: Comparative analysis of the expertise recordings of diagnoses of the secured citizens of the Brazilian National Institute of Social Security (INSS requiring sickness benefit and presenting mental disorders. METHOD: Retrospective study of the recordings of initial expertise examinations performed in the INSS offices in Juiz de Fora, MG, Brazil, between July/2004 and December/2006. Bivariate analyses according to the site where the

  7. A mapping of information security in health Information Systems in Latin America and Brazil.

    Science.gov (United States)

    Pereira, Samáris Ramiro; Fernandes, João Carlos Lopes; Labrada, Luis; Bandiera-Paiva, Paulo

    2013-01-01

    In health, Information Systems are patient records, hospital administration or other, have advantages such as cost, availability and integration. However, for these benefits to be fully met, it is necessary to guarantee the security of information maintained and provided by the systems. The lack of security can lead to serious consequences such as lawsuits and induction to medical errors. The management of information security is complex and is used in various fields of knowledge. Often, it is left in the background for not being the ultimate goal of a computer system, causing huge financial losses to corporations. This paper by systematic review methodologies, presented a mapping in the literature, in order to identify the most relevant aspects that are addressed by security researchers of health information, as to the development of computerized systems. They conclude through the results, some important aspects, for which the managers of computerized health systems should remain alert.

  8. 5 CFR 630.1209 - Health benefits.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Health benefits. 630.1209 Section 630... LEAVE Family and Medical Leave § 630.1209 Health benefits. An employee enrolled in a health benefits plan under the Federal Employees Health Benefits Program (established under chapter 89 of title 5...

  9. 28 CFR 104.22 - Advance Benefits.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Advance Benefits. 104.22 Section 104.22... Filing for Compensation; Application for Advance Benefits § 104.22 Advance Benefits. (a) Advance Benefits. Eligible Claimants may apply for immediate “Advance Benefits” in a fixed amount as follows: (1) $50,000 for...

  10. Administrative Circulars

    CERN Document Server

    Département des Ressources humaines

    2004-01-01

    Administrative Circular N° 2 (Rev. 2) - May 2004 Guidelines and procedures concerning recruitment and probation period of staff members This circular has been revised. It cancels and replaces Administrative Circular N° 2 (Rev. 1) - March 2000. Administrative Circular N° 9 (Rev. 3) - May 2004 Staff members contracts This circular has been revised. It cancels and replaces Administrative Circular N° 9 (Rev. 2) - March 2000. Administrative Circular N° 26 (Rev. 4) - May 2004 Procedure governing the career evolution of staff members This circular has also been revised. It Administrative Circulars Administrative Circular N° 26 (Rev. 3) - December 2001 and brings up to date the French version (Rev. 4) published on the HR Department Web site in January 2004. Operational Circular N° 7 - May 2004 Work from home This circular has been drawn up. Operational Circular N° 8 - May 2004 Dealing with alcohol-related problems...

  11. 6 CFR 13.44 - Right to administrative offset.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Right to administrative offset. 13.44 Section 13.44 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.44 Right to administrative offset. The amount of any penalty or assessment that has become...

  12. Security of M-Commerce transactions

    OpenAIRE

    Ion IVAN; Daniel MILODIN; Alin ZAMFIROIU

    2013-01-01

    In this material electronic market are defined. How they are structured. Security in E-Commerce applications is very important both at the administrative level and from the user perspective. The new trend in the field is the M-commerce that involves making purchases through mobile devices. And for M-commerce transactions the security is a very important thing. Here’s how to analyze the security of M-commerce transactions and ways to increase security for these transactions taki...

  13. Security measures required for HIPAA privacy.

    Science.gov (United States)

    Amatayakul, M

    2000-01-01

    HIPAA security requirements include administrative, physical, and technical services and mechanisms to safeguard confidentiality, availability, and integrity of health information. Security measures, however, must be implemented in the context of an organization's privacy policies. Because HIPAA's proposed privacy rules are flexible and scalable to account for the nature of each organization's business, size, and resources, each organization will be determining its own privacy policies within the context of the HIPAA requirements and its security capabilities. Security measures cannot be implemented in a vacuum.

  14. 77 FR 12623 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-03-01

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... discuss National [[Page 12624

  15. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  16. CYBER SECURITY FOR AIRPORTS

    OpenAIRE

    Kasthurirangan Gopalakrishnan; Manimaran Govindarasu; Doug W. Jacobson; Brent M. Phares

    2013-01-01

    In today’s information age, government organizations and business enterprises are heavily relying on interconnected computer systems to manage a variety of public services including energy, transportation, water, etc. While this increased connectivity has many operational advantages benefitting the public, they have also become vulnerable to cyber attacks such as Corporate Security Breaches, Spear Phishing, and Social Media Fraud. The aviation sector is one the critical infrastructure systems...

  17. Cloud Computing Security: A Survey

    Directory of Open Access Journals (Sweden)

    Issa M. Khalil

    2014-02-01

    Full Text Available Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

  18. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  19. Administrative Reform

    DEFF Research Database (Denmark)

    Plum, Maja

    Through the example of a Danish reform of educational plans in early childhood education, the paper critically addresses administrative educational reforms promoting accountability, visibility and documentation. Drawing on Foucaultian perspectives, the relation between knowledge and governing...... of administrative technology, tracing how the humanistic values of education embed and are embedded within ‘the professional nursery teacher' as an object and subject of administrative practice. Rather than undermining the humanistic potential of education, it is argued that the technology of accounting...

  20. An Analysis of the Use of the Social Security Number as Veteran Identification as it Relates to Identity Theft; A Cost Benefit Analysis of Transitioning the Department of Defense and Veterans Administration to a Military Identification Number

    National Research Council Canada - National Science Library

    Opria, George R; Maraska, Donald G

    2007-01-01

    .... This functionality creep has led to the SSN becoming an almost de facto national ID number. Employers, universities, credit agencies and financial institutions began using the SSN as a unique personal identifier...

  1. An Analysis of the Use of the Social Security Number as Veteran Identification as it Relates to Identity Theft; A Cost Benefit Analysis of Transitioning the Department of Defense and Veterans Administration to a Military Identification Number

    Science.gov (United States)

    2007-03-01

    50 million over the 2007-2011 period. However, if the VA were to experience another data breach similar to the recent incident involving 17...compromised in some manner. Excluding the recent incident, the average number of people affected by a data breach has been about 50,000. The...suggests that all of the financial losses to a company that experiences a data breach of privacy information will quickly be reflected in the stock

  2. 26 CFR 301.7701-11 - Social security number.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Social security number. 301.7701-11 Section 301... ADMINISTRATION PROCEDURE AND ADMINISTRATION Definitions § 301.7701-11 Social security number. For purposes of this chapter, the term social security number means the taxpayer identifying number of an individual or...

  3. 28 CFR 501.2 - National security cases.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false National security cases. 501.2 Section... ADMINISTRATION SCOPE OF RULES § 501.2 National security cases. (a) Upon direction of the Attorney General, the... unauthorized disclosure of such information would pose a threat to the national security and that there is a...

  4. 10 CFR 725.24 - Administration.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 4 2010-01-01 2010-01-01 false Administration. 725.24 Section 725.24 Energy DEPARTMENT OF ENERGY PERMITS FOR ACCESS TO RESTRICTED DATA Permits § 725.24 Administration. With respect to each permit... designate a DOE or National Nuclear Security Administration office which will: (a) Process all personnel...

  5. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  6. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  7. Benefits | NREL

    Science.gov (United States)

    flexible work environment that enables and encourages a good work/life balance A growing, changing exceptional work. A woman riding her bike past the NREL entrance sign. Hundreds of NREL employees opt out of their cars, cycling to work, to take part in Bike To Work Day each year. Benefits Package NREL's

  8. Fringe Benefits.

    Science.gov (United States)

    Podgursky, Michael

    2003-01-01

    Uses statistics from the National Center for Education Statistics and the Bureau of Labor Statistics to examine teacher salaries and benefits. Discusses compensation of teachers compared with nonteachers. Asserts that statistics from the American Federation of Teachers and the National Education Association underestimate teacher compensation…

  9. Secure Learning and Learning for Security: Research in the Intersection

    OpenAIRE

    Rubinstein, Benjamin

    2010-01-01

    Statistical Machine Learning is used in many real-world systems, such as web search, network and power management, online advertising, finance and health services, in which adversaries are incentivized to attack the learner, motivating the urgent need for a better understanding of the security vulnerabilities of adaptive systems. Conversely, research in Computer Security stands to reap great benefits by leveraging learning for building adaptive defenses and even designing intelligent attacks ...

  10. Spatially enabled land administration

    DEFF Research Database (Denmark)

    Enemark, Stig

    2006-01-01

    enabling of land administration systems managing tenure, valuation, planning, and development will allow the information generated by these activities to be much more useful. Also, the services available to private and public sectors and to community organisations should commensurably improve. Knowledge....... In other words: Good governance and sustainable development is not attainable without sound land administration or - more broadly – sound land management. The paper presents a land management vision that incorporates the benefits of ICT enabled land administration functions. The idea is that spatial...... the communication between administrative systems and also establish more reliable data due to the use the original data instead of copies. In Denmark, such governmental guidelines for a service-oriented ITarchitecture in support of e-government are recently adopted. Finally, the paper presents the role of FIG...

  11. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  12. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  13. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  14. IPv6 Security

    Science.gov (United States)

    Babik, M.; Chudoba, J.; Dewhurst, A.; Finnern, T.; Froy, T.; Grigoras, C.; Hafeez, K.; Hoeft, B.; Idiculla, T.; Kelsey, D. P.; López Muñoz, F.; Martelli, E.; Nandakumar, R.; Ohrenberg, K.; Prelz, F.; Rand, D.; Sciabà, A.; Tigerstedt, U.; Traynor, D.; Wartel, R.

    2017-10-01

    IPv4 network addresses are running out and the deployment of IPv6 networking in many places is now well underway. Following the work of the HEPiX IPv6 Working Group, a growing number of sites in the Worldwide Large Hadron Collider Computing Grid (WLCG) are deploying dual-stack IPv6/IPv4 services. The aim of this is to support the use of IPv6-only clients, i.e. worker nodes, virtual machines or containers. The IPv6 networking protocols while they do contain features aimed at improving security also bring new challenges for operational IT security. The lack of maturity of IPv6 implementations together with the increased complexity of some of the protocol standards raise many new issues for operational security teams. The HEPiX IPv6 Working Group is producing guidance on best practices in this area. This paper considers some of the security concerns for WLCG in an IPv6 world and presents the HEPiX IPv6 working group guidance for the system administrators who manage IT services on the WLCG distributed infrastructure, for their related site security and networking teams and for developers and software engineers working on WLCG applications.

  15. 77 FR 70796 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... privacy issues, please contact: Jonathan Cantor, (202-343-1717), Acting Chief Privacy Officer, Privacy... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  16. 77 FR 70795 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ... 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan Cantor, (202-343... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  17. 77 FR 70792 - Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security...

    Science.gov (United States)

    2012-11-27

    ..., VA 20598-6036; email: [email protected] . For privacy issues please contact: Jonathan R. Cantor... DEPARTMENT OF HOMELAND SECURITY Office of the Secretary Privacy Act of 1974; Retirement of Department of Homeland Security Transportation Security Administration System of Records AGENCY: Privacy...

  18. 28 CFR 345.57 - Administrative pay.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Administrative pay. 345.57 Section 345.57... (FPI) INMATE WORK PROGRAMS Inmate Pay and Benefits § 345.57 Administrative pay. An inmate excused from a job assignment may receive administrative pay for such circumstances as a general recall for an...

  19. Social Security: a financial appraisal for the median voter.

    Science.gov (United States)

    Galasso, V

    product of the joint employer/employee Old-Age and Survivors Insurance (OASI) tax rate and employee earnings. Data on actual contributions are available for median voters in the 1964 to 1976 elections; Social Security Administration (SSA) estimates are used for future tax rates and average wage growth rates. Data on actual old-age, retirement, and survivor benefits, as well as estimates of future benefits, are also available from SSA. Analysis of ex-post returns from "investing" in Social Security and from a buy-and-hold strategy applied to three alternative assets--the Standard & Poor's Composite Index (S&P), the Dow Jones Industrial Average (DJIA), and U.S. government bonds--shows surprising results. In 1964 and 1968, Social Security largely outperformed the other three assets. In 1972, Social Security and the stock market performed almost equally. In 1976, however, the median voter would have been better off in the stock market. The expected returns for median voters in later elections cannot be directly compared with realized returns from alternative assets. However, estimates range from 5.7 percent in 1984 to 7.0 percent in 1996 and thus compare favorably with average returns of 5.6 percent for S&P, 5.3 percent for DJIA, and 2.1 percent for government bonds over the 1964-1996 period. Although these findings must be taken with caution since they compare ex-post returns, they show that, despite a continuous reduction in profitability, Social Security still represents a safe, high-return asset for a majority of families.

  20. Identifying the Key Weaknesses in Network Security at Colleges.

    Science.gov (United States)

    Olsen, Florence

    2000-01-01

    A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)

  1. 12 CFR 605.501 - Information Security Officer.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Information Security Officer. 605.501 Section... Information Security Officer. (a) The Information Security Officer of the Farm Credit Administration shall be responsible for implementation and oversight of the information security program and procedures adopted by the...

  2. 14 CFR 1203.201 - Information security objectives.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Information security objectives. 1203.201 Section 1203.201 Aeronautics and Space NATIONAL AERONAUTICS AND SPACE ADMINISTRATION INFORMATION SECURITY PROGRAM NASA Information Security Program § 1203.201 Information security objectives. The objectives of...

  3. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  4. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  5. Roadmap on optical security

    Science.gov (United States)

    Javidi, Bahram; Carnicer, Artur; Yamaguchi, Masahiro; Nomura, Takanori; Pérez-Cabré, Elisabet; Millán, María S.; Nishchal, Naveen K.; Torroba, Roberto; Fredy Barrera, John; He, Wenqi; Peng, Xiang; Stern, Adrian; Rivenson, Yair; Alfalou, A.; Brosseau, C.; Guo, Changliang; Sheridan, John T.; Situ, Guohai; Naruse, Makoto; Matsumoto, Tsutomu; Juvells, Ignasi; Tajahuerce, Enrique; Lancis, Jesús; Chen, Wen; Chen, Xudong; Pinkse, Pepijn W. H.; Mosk, Allard P.; Markman, Adam

    2016-08-01

    : Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.

  6. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  7. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  8. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  9. Who benefits?

    DEFF Research Database (Denmark)

    Hjorth, Frederik Georg

    2016-01-01

    Cross-border welfare rights for citizens of European Union member states are intensely contested, yet there is limited research into voter opposition to such rights, sometimes denoted ‘welfare chauvinism’. We highlight an overlooked aspect in scholarly work: the role of stereotypes about benefici...... recipient identity. These effects are strongest among respondents high in ethnic prejudice and economic conservatism. The findings imply that stereotypes about who benefits from cross-border welfare rights condition public support for those rights....

  10. Will Pre-Funding Provide Security for Social Security? A Review of the Literature

    OpenAIRE

    Robert L. Brown

    2000-01-01

    President Clinton has proposed creating larger social security funds and investing a portion of them in the private sector. Others have suggested more radical reforms such as moving social security from a defined-benefit scheme to a defined contribution plan based on the Chilean model. These proposals are based on the goal of creating higher investment returns, which would make social security benefits easier to finance in the long run. After an extensive review of the literature, this paper ...

  11. 29 CFR 4901.17 - Exhaustion of administrative remedies.

    Science.gov (United States)

    2010-07-01

    ... (including any extension) for making such determination or decision, the requester's administrative remedies....17 Labor Regulations Relating to Labor (Continued) PENSION BENEFIT GUARANTY CORPORATION INTERNAL AND ADMINISTRATIVE RULES AND PROCEDURES EXAMINATION AND COPYING OF PENSION BENEFIT GUARANTY CORPORATION RECORDS...

  12. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  13. IT Convergence and Security 2012

    CERN Document Server

    Chung, Kyung-Yong

    2013-01-01

    The proceedings approaches the subject matter with problems in technical convergence and convergences of security technology. This approach is new because we look at new issues that arise from techniques converging. The general scope of the proceedings content is convergence security and the latest information technology. The intended readership are societies, enterprises, and research institutes, and intended content level is mid- to highly educated personals. The most important features and benefits of the proceedings are the introduction of the most recent information technology and its related ideas, applications and problems related to technology convergence, and its case studies and finally an introduction of converging existing security techniques through convergence security. Overall, through the proceedings, authors will be able to understand the most state of the art information strategies and technologies of convergence security.

  14. Security Problems in Cloud Computing

    Directory of Open Access Journals (Sweden)

    Rola Motawie

    2016-12-01

    Full Text Available Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks.

  15. Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in nearest future in practical context.

    Science.gov (United States)

    Kasztelowicz, Piotr; Czubenko, Marek; Zieba, Iwona

    2003-01-01

    The informatical revolution in computer age, which gives significant benefit in transfer of medical information requests to pay still more attention for aspect of network security. All known advantages of network technologies--first of all simplicity of copying, multiplication and sending information to many individuals can be also dangerous, if illegal, not permitted persons get access to medical data bases. Internet is assumed to be as especially "anarchic" medium, therefore in order to use it in professional work any security principles should be bewared. In our presentation we will try to find the optimal security solution in organisational and technological aspects for any medical network. In our opinion the harmonious co-operation between users, medical authorities and network administrators is core of the success.

  16. Supplemental Security Income Public-Use Microdata File, 2001 Data

    Data.gov (United States)

    Social Security Administration — The SSI Public-Use Microdata File contains an extract of data fields from SSA's Supplemental Security Record file and consists of a 5 percent random, representative...

  17. Social Security Programs Throughout the World: Africa, 2015

    Data.gov (United States)

    Social Security Administration — This report, which is part of a four-volume series, provides a cross-national comparison of the social security systems in 48 countries in Africa. It summarizes the...

  18. FAA computer security : recommendations to address continuing weaknesses

    Science.gov (United States)

    2000-12-01

    In September, testimony before the Committee on Science, House of Representatives, focused on the Federal Aviation Administration's (FAA) computer security program. In brief, we reported that FAA's agency-wide computer security program has serious, p...

  19. Poverty Mapping Project: Poverty and Food Security Case Studies

    Data.gov (United States)

    National Aeronautics and Space Administration — The Poverty and Food Security Case Studies dataset consists of small area estimates of poverty, inequality, food security and related measures for subnational...

  20. Top Ten Challenges Facing the Next Secretary of Homeland Security

    National Research Council Canada - National Science Library

    2008-01-01

    In an effort to assist with the first Presidential administration transition of the Department of Homeland Security, the Homeland Security Advisory Council has identified ten key challenges that will...

  1. Protecting the Privacy and Security of Your Health Information

    Science.gov (United States)

    ... can be used and shared with others. The Security Rule sets rules for how your health information must be kept secure with administrative, technical, and physical safeguards. You may have additional protections and health information rights under your State's laws. ...

  2. Air Traffic Control: Weak Computer Security Practices Jeopardize Flight Safety

    Science.gov (United States)

    1998-05-01

    Given the paramount importance of computer security of Air Traffic Control (ATC) systems, Congress asked the General Accounting Office to determine (1) whether the Fedcral Aviation Administration (FAA) is effectively managing physical security at ATC...

  3. Title XVI / Supplemental Security Record Point In Time (SSRPT)

    Data.gov (United States)

    Social Security Administration — This is the point-in-time database to house temporary Supplemental Security Record (SSR) images produced during the course of the operating day before they can be...

  4. Offentlig administration

    DEFF Research Database (Denmark)

    Nielsen, Elof Nellemann; Rehr, Preben René

    En undervisningsbog der henvender sig til administrationsbacheloruddannelsen. Kapitlerne er inddelt efter modulerne på uddannelsen og indeholder derfor elementer af administration, forvaltning, økonomistyring, innovation, samfundsvidenskabelige metoder og politisk styrede organisationer.......En undervisningsbog der henvender sig til administrationsbacheloruddannelsen. Kapitlerne er inddelt efter modulerne på uddannelsen og indeholder derfor elementer af administration, forvaltning, økonomistyring, innovation, samfundsvidenskabelige metoder og politisk styrede organisationer....

  5. SAT administrator

    International Nuclear Information System (INIS)

    Havas, A.

    1998-01-01

    SAT Administrator is the Information System for Nuclear Power Plant Personnel Training Program Design. It supports the design of training programs in the following phases: job analysis; task analysis; competency analysis; task competency association; definition of learning objectives to competencies; training program design; definition of test items. The general structure of the database and management software supports application of the SAT Administrator in any nuclear power installation

  6. Competition, Speculative Risks, and IT Security Outsourcing

    Science.gov (United States)

    Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan

    Information security management is becoming a more critical and, simultaneously, a challenging function for many firms. Even though many security managers are skeptical about outsourcing of IT security, others have cited reasons that are used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for firms' decisions to outsource IT security. We show that if competitive externalities are ignored, then a firm will outsource security if and only if the MSSP offers a quality (or a cost) advantage over in-house operations, which is consistent with the traditional explanation for security outsourcing. However, a higher quality is neither a prerequisite nor a guarantee for a firm to outsource security. The competitive risk environment and the nature of the security function outsourced, in addition to quality, determine firms' outsourcing decisions. If the reward from the competitor's breach is higher than the loss from own breach, then even if the likelihood of a breach is higher under the MSSP the expected benefit from the competitive demand externality may offset the loss from the higher likelihood of breaches, resulting in one or both firms outsourcing security. The incentive to outsource security monitoring is higher than that of infrastructure management because the MSSP can reduce the likelihood of breach on both firms and thus enhance the demand externality effect. The incentive to outsource security monitoring (infrastructure management) is higher (lower) if either the likelihood of breach on both firms is lower (higher) when security is outsourced or the benefit (relative to loss) from the externality is higher (lower). The benefit from the demand externality arising out of a security breach is higher when more of the customers that leave the breached firm switch to the non-breached firm.

  7. Tax Compliance and Social Security Contributions – The Case Of Slovenia

    Directory of Open Access Journals (Sweden)

    Tomaz LESNIK

    2014-06-01

    Full Text Available In this paper, we will examine the causes behind the higher level of compliance with social security contributions in comparison with other tax categories in the case of Slovenia. The results of econometric models suggest that the activities of the Tax Administration of the Republic of Slovenia, which were more stringently performed in the area of social security contributions in the most recent period, are an important – but not the only factor – behind the higher level of compliance in connection with social security contributions. At the same time, the decrease in tax compliance with other taxes (income tax, corporate income tax, and VAT did not essentially influence the higher level of compliance with social security contributions. The more consistent treatment of unpaid social security contributions as a criminal offence and the higher public awareness about the importance of paying social security contributions in the latest period are recognized as important factors which simultaneously constitute the main difference between social security contributions and other taxes. The higher level of public awareness about the benefits that result from public services financed with taxes is recognized as a possible way to more optimally collect taxes in Slovenia.

  8. Evaluation of Data Security Measures in a Network Environment Towards Developing Cooperate Data Security Guidelines

    OpenAIRE

    Ayub Hussein Shirandula; Dr. G. Wanyembi; Mr. Maina karume

    2012-01-01

    Data security in a networked environment is a topic that has become significant in organizations. As companies and organizations rely more on technology to run their businesses, connecting system to each other in different departments for efficiency data security is the concern for administrators. This research assessed the data security measures put in place at Mumias Sugar Company and the effort it was using to protect its data. The researcher also highlighted major security issues that wer...

  9. ICS security in maritime transportation : a white paper examining the security and resiliency of critical transportation infrastructure

    Science.gov (United States)

    2013-07-29

    The John A. Volpe National Transportation Systems Center was asked by the Office of Security of the Maritime Administration to examine the issue of industrial control systems (ICS) security in the Maritime Transportation System (MTS), and to develop ...

  10. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  11. 78 FR 9431 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-02-08

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  12. 78 FR 38077 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-06-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-13-0030] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  13. 78 FR 64024 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2013-10-25

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office [NARA-2014-001] National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and... following committee meeting to discuss National Industrial Security Program policy matters. DATES: The...

  14. 77 FR 63893 - National Industrial Security Program Policy Advisory Committee (NISPPAC)

    Science.gov (United States)

    2012-10-17

    ... NATIONAL ARCHIVES AND RECORDS ADMINISTRATION Information Security Oversight Office National Industrial Security Program Policy Advisory Committee (NISPPAC) AGENCY: National Archives and Records... meeting to discuss National Industrial Security Program policy matters. DATES: The meeting will be held on...

  15. 75 FR 29567 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2010-05-26

    ... business card that directs customers to an online portal. All responses are voluntary and there is no... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  16. 78 FR 46594 - Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer...

    Science.gov (United States)

    2013-08-01

    ... business card that directs customers to an online portal, a customer satisfaction card with survey... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Extension of Agency Information Collection Activity Under OMB Review: Aviation Security Customer Satisfaction Performance...

  17. 76 FR 10529 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-02-25

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... electronic system security protection for the aircraft control domain and airline information domain from... identified and assessed, and that effective electronic system security protection strategies are implemented...

  18. 76 FR 36863 - Special Conditions: Gulfstream Model GVI Airplane; Electronic Systems Security Protection From...

    Science.gov (United States)

    2011-06-23

    ... Security Protection From Unauthorized External Access AGENCY: Federal Aviation Administration (FAA), DOT... for Gulfstream GVI airplanes. 1. The applicant must ensure electronic system security protection for... that effective electronic system security protection strategies are implemented to protect the airplane...

  19. 2010 Administrative Law Judge Initial Decisions

    Data.gov (United States)

    Securities and Exchange Commission — The initial decisions issued by administrative law judges in 2010 that contains findings of fact, legal conclusions, and an order that often contains a sanction....

  20. 2009 Administrative Law Judge Initial Decisions

    Data.gov (United States)

    Securities and Exchange Commission — The initial decisions issued by administrative law judges in 2009 that contains findings of fact, legal conclusions, and an order that often contains a sanction....

  1. Social security financing.

    Science.gov (United States)

    1980-05-01

    After nearly 2 years of study, the 1979 Advisory Council on Social Security submitted its findings and recommendations in December. In February the Bulletin published the Executive Summary of the Council's report. Because of the continuing wide public interest in the future of social security financing, the Council's detailed findings and recommendations on that subject are published below. The Council unanimously reports that all current and future beneficiaries can count on receiving the payments to which they are entitled. Among the recommendations it calls for are partial financing with nonpayroll-tax revenues. Suggested changes include hospital insurance (HI) financed through portins of personal and corporate income taxes and a part of the HI insurance payroll tax diverted to cash benefits with the balance of this tax repealed. The Council also recommends that the social security cash benefits program be brought into long-run actuarial balance--with a payroll-tax rate increase in the year 2005. It rejects the idea of a value-added tax as being inflationary. Parenthetical remarks represent additional views of the Council members cited.

  2. 76 FR 68243 - Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66...

    Science.gov (United States)

    2011-11-03

    ..., Social Security Online, at http://www.socialsecurity.gov . SUPPLEMENTARY INFORMATION: SSRs make available... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2011-0068] Social Security Rulings, SSR 91-1c and SSR 66-18c; Rescission of Social Security Rulings (SSR) 66-18c and SSR 91-1c AGENCY: Social Security...

  3. Zen and the art of information security

    CERN Document Server

    Winkler, Ira

    2007-01-01

    While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves. Even highly technical people have misperceptions about security concerns and will also benefit from Ira Winkler's experiences making security understandable to the business world. Mr. Winkler is one of the most popular and highly rated speakers in the field of security, and lectures to tens of thousands of people a year. Zen and the Art of Information Security is based on one of his most well received international presentations.

  4. Private Benefits in Corporate Control Transactions

    DEFF Research Database (Denmark)

    Poulsen, Thomas

    2011-01-01

    This paper presents an analytical framework from which it can be inferred whether sellers or buyers in block transactions value private benefits highest. I am thus able to suggest an answer to the question: Are blocks of shares traded because the buyer has high security benefits, or because the b...

  5. 77 FR 51842 - Social Security Acquiescence Ruling (AR) 12-X(8); Petersen v. Astrue, 633 F.3d 633 (8th Cir. 2011...

    Science.gov (United States)

    2012-08-27

    ..., 1-800-772-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0046] Social Security Acquiescence Ruling (AR... Social Security Act AGENCY: Social Security Administration. ACTION: Notice of Social Security...

  6. Brazilian Hybrid Security in South America

    Directory of Open Access Journals (Sweden)

    Rafael Duarte Villa

    2017-10-01

    Full Text Available Abstract Existing research on security governance in South America functions on dichotomous lines. Analysis of Brazil’s security practices is a case in point. On the one hand, scholars point out the balance of power and hegemonic institutions as the main discourse in the security practices between Brazil and its South American neighbors. On the other hand, some other emphasize the importance of democracy, cooperation on defense and security, and peaceful conflict resolution between states in the region as indicators for the emergence of a security community between Brazil and its neighbors in the South American region. The way in which multiple orders coexist is not given adequate attention in empirical research. This article seeks to overcome this dichotomy. By foregrounding Brazil’s regional security practices, particularly during the Lula and Rousseff administration, I show the hybrid and sometimes ambivalent security governance system in Brazil, where mechanisms of balance of power and security community overlap in important ways.

  7. 5 CFR 1604.8 - Death benefits.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 3 2010-01-01 2010-01-01 false Death benefits. 1604.8 Section 1604.8... benefits. The account balance of a deceased service member will be paid as described at 5 CFR part 1651... benefit, a service member must file a valid beneficiary designation form. If the TSP maintains a service...

  8. 28 CFR 54.525 - Fringe benefits.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Fringe benefits. 54.525 Section 54.525... in Employment in Education Programs or Activities Prohibited § 54.525 Fringe benefits. (a) “Fringe benefits” defined. For purposes of these Title IX regulations, fringe benefits means: Any medical, hospital...

  9. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  10. SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Amina AIT OUAHMAN

    2014-10-01

    Full Text Available Today, cloud computing is defined and talked about across the ICT industry under different contexts and with different definitions attached to it. It is a new paradigm in the evolution of Information Technology, as it is one of the biggest revolutions in this field to have taken place in recent times. According to the National Institute for Standards and Technology (NIST, “cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction” [1]. The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in successive years by companies and organizations. Clouds bring out tremendous benefits for both individuals and enterprises. Clouds support economic savings, outsourcing mechanisms, resource sharing, any-where any-time accessibility, on-demand scalability, and service flexibility. Clouds minimize the need for user involvement by masking technical details such as software upgrades, licenses, and maintenance from its customers. Clouds could also offer better security advantages over individual server deployments. Since a cloud aggregates resources, cloud providers charter expert security personnel while typical companies could be limited with a network administrator who might not be well versed in cyber security issues. The new concepts introduced by the clouds, such as computation outsourcing, resource sharing, and external data warehousing, increase the security and privacy concerns and create new security challenges. Moreover, the large scale of the clouds, the proliferation of mobile access devices (e

  11. ATLAS TDAQ System Administration:

    CERN Document Server

    Lee, Christopher Jon; The ATLAS collaboration; Bogdanchikov, Alexander; Ballestrero, Sergio; Contescu, Alexandru Cristian; Dubrov, Sergei; Fazio, Daniel; Korol, Aleksandr; Scannicchio, Diana; Twomey, Matthew Shaun; Voronkov, Artem

    2015-01-01

    The ATLAS Trigger and Data Acquisition (TDAQ) system is responsible for the online processing of live data, streaming from the ATLAS experiment at the Large Hadron Collider (LHC) at CERN. The online farm is composed of ̃3000 servers, processing the data readout from ̃100 million detector channels through multiple trigger levels. During the two years of the first Long Shutdown (LS1) there has been a tremendous amount of work done by the ATLAS TDAQ System Administrators, implementing numerous new software applications, upgrading the OS and the hardware, changing some design philosophies and exploiting the High Level Trigger farm with different purposes. During the data taking only critical security updates are applied and broken hardware is replaced to ensure a stable operational environment. The LS1 provided an excellent opportunity to look into new technologies and applications that would help to improve and streamline the daily tasks of not only the System Administrators, but also of the scientists who wil...

  12. 77 FR 67724 - Rescission of Social Security Acquiescence Ruling 05-1(9)

    Science.gov (United States)

    2012-11-13

    ...-1213 or TTY 1-800-325-0778, or visit our Internet site, Social Security Online, at http://www... SOCIAL SECURITY ADMINISTRATION [Docket No. SSA-2012-0058] Rescission of Social Security Acquiescence Ruling 05-1(9) AGENCY: Social Security Administration. [[Page 67725

  13. 28 CFR 17.13 - National Security Division; interpretation of Executive Orders.

    Science.gov (United States)

    2010-07-01

    ... for National Security, who shall refer such questions to the Office of Legal Counsel, as appropriate... 28 Judicial Administration 1 2010-07-01 2010-07-01 false National Security Division... NATIONAL SECURITY INFORMATION AND ACCESS TO CLASSIFIED INFORMATION Administration § 17.13 National Security...

  14. Security classification of information

    Energy Technology Data Exchange (ETDEWEB)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  15. Network Security: Policies and Guidelines for Effective Network Management

    Directory of Open Access Journals (Sweden)

    Jonathan Gana KOLO

    2008-12-01

    Full Text Available Network security and management in Information and Communication Technology (ICT is the ability to maintain the integrity of a system or network, its data and its immediate environment. The various innovations and uses to which networks are being put are growing by the day and hence are becoming complex and invariably more difficult to manage by the day. Computers are found in every business such as banking, insurance, hospital, education, manufacturing, etc. The widespread use of these systems implies crime and insecurity on a global scale. In addition, the tremendous benefits brought about by Internet have also widened the scope of crime and insecurity at an alarming rate. Also, ICT has fast become a primary differentiator for institution/organization leaders as it offers effective and convenient means of interaction with each other across the globe. This upsurge in the population of organizations depending on ICT for business transaction has brought with it a growing number of security threats and attacks on poorly managed and secured networks primarily to steal personal data, particularly financial information and password.This paper therefore proposes some policies and guidelines that should be followed by network administrators in organizations to help them ensure effective network management and security of ICT facilities and data.

  16. DATA Act File C Award Financial - Social Security

    Data.gov (United States)

    Social Security Administration — The DATA Act Information Model Schema Reporting Submission Specification File C. File C includes the agency award information from the financial accounting system at...

  17. Japanese management. Implications for nursing administration.

    Science.gov (United States)

    Smith, H L; Reinow, F D; Reid, R A

    1984-09-01

    Does Japanese management possess sufficient practical validity to warrant retraining of nursing administrators and their staffs? Can Japanese management really address the complexities of contemporary nursing administration? Before espousing the benefits of Theory Z and implementing quality circles in your hospital, read this analysis of the advantages and disadvantages of Japanese management--the benefits can be substantial but so can the costs!

  18. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  19. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  20. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  1. Behavioral Public Administration:Combining Insights from Public Administration and Psychology

    OpenAIRE

    Grimmelikhuijsen, Stephan; Jilke, Sebastian; Olsen, Asmus Leth; Tummers, Lars

    2017-01-01

    We propose behavioral public administration as a designated subfield in public administration which explicitly deals with the integration of theories and methods from psychology into the study of public administration. We discuss how scholars in public administration currently draw on both methodological and theoretical innovations in psychology and point to research questions in public administration which could benefit from further integration. Behavioral public administration cannot, and s...

  2. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ..., %%Strategy for Victory," the Bush Administration indicates that U.S. forces will remain in Iraq until the country is able to provide for its own security and does not serve as a host for radical Islamic terrorists...

  3. Meeting Complex Challenges Through National Security Reform

    National Research Council Canada - National Science Library

    Gockel, Kathy

    2008-01-01

    .... The Obama administration will have no shortage of advice pouring in from myriad sources on how to address the dynamic nature of security given the wars in Iraq and Afghanistan and the global financial turmoil...

  4. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    The Administration is claiming success in reversing the deterioration in security that had become acute by the end of 2006, attributing the gains to a troop surge strategy announced by President Bush on January 10, 2007...

  5. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  6. Southwestern Power Administration Annual Report 2008

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-12-01

    Dear Secretary Chu, I am pleased to present the financial statements and operating data for Southwestern Power Administration (Southwestern) for Fiscal Year (FY) 2008. In FY 2008, Southwestern delivered over 7.3 billion kilowatt-hours of energy to its wholesale customers – nearly 31% more than average due to numerous record rainfall amounts in the southwest region. These record amounts produced revenues which exceeded the average annual revenue requirement by nearly $20 million and resulted in over $200 million in economic benefits to the region. Yet even as Southwestern exceeded its goals of marketing and delivering Federal hydroelectric power to our customers, we stayed focused on safety, security, and reliability. For example, we maintained our nearly 1,400 miles of high-voltage transmission lines, substations, and communications sites while achieving a Recordable Accident Frequency Rate of 0.0, a record that reflects Southwestern’s safety achievement of no recordable injuries for every 200,000 hours worked. We kept our rights-of-way secure from vegetation and other obstacles, work that not only supports our mission but also promotes reliability of the regional and National grid. We exceeded all North American Electric Reliability Corporation (NERC) Control Performance Standards (CPS- 1 and CPS-2), and maintained regulation and reserve obligations and reactive reserve margins to ensure the reliability of the bulk electric system, even during extended periods of restricted hydro operations due to unusually high project inflows. Finally, we continued our partnerships with the Department of Energy, the U.S. Army Corps of Engineers, our customers, and other Federal power stakeholders, partnerships that are vital to our continued success in marketing and delivering carbon-free, renewable, and domestically produced energy to our customers and to the Nation. Sincerely, Jon Worthington Administrator

  7. Administrative circular

    CERN Multimedia

    2003-01-01

    • N° 21 - August 2003 Special leave This circular has been amended. Copies of this circular are available in the Divisional Secretariats. In addition, administrative and operational circulars, as well as the lists of those in force, are available for consultation on the Web at: http://cern.ch/hr-div/internal/admin_services/admincirc/listadmincirc.asp Human Resources Division Tel. 74128

  8. Database Administrator

    Science.gov (United States)

    Moore, Pam

    2010-01-01

    The Internet and electronic commerce (e-commerce) generate lots of data. Data must be stored, organized, and managed. Database administrators, or DBAs, work with database software to find ways to do this. They identify user needs, set up computer databases, and test systems. They ensure that systems perform as they should and add people to the…

  9. Administrative IT

    Science.gov (United States)

    Grayson, Katherine, Ed.

    2006-01-01

    When it comes to Administrative IT solutions and processes, best practices range across the spectrum. Enterprise resource planning (ERP), student information systems (SIS), and tech support are prominent and continuing areas of focus. But widespread change can also be accomplished via the implementation of campuswide document imaging and sharing,…

  10. Secure Authentication of Cloud Data Mining API

    OpenAIRE

    Bhadauria, Rohit; Borgohain, Rajdeep; Biswas, Abirlal; Sanyal, Sugata

    2013-01-01

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different...

  11. 20 CFR 638.528 - Social Security.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Social Security. 638.528 Section 638.528... TITLE IV-B OF THE JOB TRAINING PARTNERSHIP ACT Center Operations § 638.528 Social Security. The Act provides that students are covered by title II of the Social Security Act (42 U.S.C. 401 et seq.) and shall...

  12. Marital Biography, Social Security Receipt, and Poverty

    OpenAIRE

    Lin, I-Fen; Brown, Susan L.; Hammersmith, Anna M.

    2017-01-01

    Increasingly, older adults are unmarried, which could mean a larger share is at risk of economic disadvantage. Using data from the 2010 Health and Retirement Study, we chart the diverse range of marital biographies, capturing marital sequences and timing, of adults who are age eligible for Social Security and examine three indicators of economic well-being: Social Security receipt, Social Security benefit levels, and poverty status. Partnereds are disproportionately likely to receive Social S...

  13. PBX Security and Forensics A Practical Approach

    CERN Document Server

    Androulidakis, Iosif I

    2013-01-01

    PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.

  14. Social Security and Part-Time Employment.

    Science.gov (United States)

    Euzeby, Alain

    1988-01-01

    Discusses rules governing social security and their implications for part-time employees in various countries. Topics include (1) methods of financing social security, (2) benefits, (3) measures concerning the unemployed, (4) a floor for employers' contributions, (5) graduated contribution rates, and (6) financial incentives. (CH)

  15. Contribution of Renewables to Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  16. ADP Security Plan, Math Building, Room 1139

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.

    1985-08-27

    This document provides the draft copy of an updated (ADP) Security Plan for an IBM Personal Computer to be used in the Math Building at PNL for classified data base management. Using the equipment specified in this document and implementing the administrative and physical procedures as outlined will provide the secure environment necessary for this work to proceed.

  17. 49 CFR 176.162 - Security.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 2 2010-10-01 2010-10-01 false Security. 176.162 Section 176.162 Transportation Other Regulations Relating to Transportation PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION... Class 1 (Explosive) Materials Precautions During Loading and Unloading § 176.162 Security. A responsible...

  18. 7 CFR 1735.22 - Loan security.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Loan security. 1735.22 Section 1735.22 Agriculture... GENERAL POLICIES, TYPES OF LOANS, LOAN REQUIREMENTS-TELECOMMUNICATIONS PROGRAM Loan Purposes and Basic Policies § 1735.22 Loan security. (a) RUS makes loans only if, in the judgment of the Administrator, the...

  19. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  20. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...