WorldWideScience

Sample records for defense privacy program

  1. 77 FR 46653 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2012-08-06

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed rule with request for comments. SUMMARY: The Defense Logistics Agency (DLA) is proposing to amend the DLA Privacy Program Regulation. The DLA Privacy...

  2. 78 FR 25853 - Defense Logistics Agency Privacy Program

    Science.gov (United States)

    2013-05-03

    ... of the Secretary 32 CFR Part 323 RIN 0790-AI86 Defense Logistics Agency Privacy Program AGENCY: Defense Logistics Agency, DoD. ACTION: Final rule. SUMMARY: The Defense Logistics Agency (DLA) is revising... Defense Logistics Agency's implementation of the Privacy Act of 1974, as amended. In addition, DLA...

  3. Privacy Training Program

    Science.gov (United States)

    Recognizing that training and awareness are critical to protecting agency Personally Identifiable Information (PII), the EPA is developing online training for privacy contacts in its programs and regions.

  4. 77 FR 35432 - Privacy Act of 1974, Computer Matching Program: United States Postal Service and the Defense...

    Science.gov (United States)

    2012-06-13

    ... Numbers, names, and dates of birth for TRS-enrolled Selected Reservists or TRR-enrolled Retired Reservists.... TRS Program--TRICARE Reserve Select, a premium based TRICARE military health plan for members of the... Retired Reserve, a premium based TRICARE military health plan for members of the Retired Reserve of...

  5. More Than Defense in Daily Experience of Privacy: The Functions of Privacy in Digital and Physical Environments.

    Science.gov (United States)

    Lombardi, Debora Benedetta; Ciceri, Maria Rita

    2016-02-01

    The purpose of the current study was to investigate the experience of privacy, focusing on its functional role in personal well-being. A sample (N = 180) comprised subjects between 18 and 50 years of age were asked to spontaneously provide accounts of their experiences with privacy and answer close-ended questions to acquire a description of a daily experience of privacy. The results showed the importance attributed to the function of privacy related to the "defense from social threats", and the twofold function of privacy related to an "achieved state of privacy", in the terms of both "system maintenance" and "system development". The results also shed light on the role of the environment in shaping one's experience of privacy. Specifically, the participants recognized more easily the function of defense from threats related to seeking privacy while interacting in digital environments, whereas they seemed to benefit from positive functions related to an achieved state of privacy in physical environments. The findings sustain the notion of privacy as a supportive condition for some psychological processes involved in the positive human functioning and confirm previous studies conducted on the role of privacy in human well-being.

  6. DEFENSE PROGRAMS RISK MANAGEMENT FRAMEWORK

    Directory of Open Access Journals (Sweden)

    Constantin PREDA

    2012-01-01

    Full Text Available For the past years defense programs have faced delays in delivering defense capabilities and budget overruns. Stakeholders are looking for ways to improve program management and the decision making process given the very fluid and uncertain economic and political environment. Consequently, they have increasingly resorted to risk management as the main management tool for achieving defense programs objectives and for delivering the defense capabilities strongly needed for the soldiers on the ground on time and within limited defense budgets. Following a risk management based decision-making approach the stakeholders are expected not only to protect program objectives against a wide range of risks but, at the same time, to take advantage of the opportunities to increase the likelihood of program success. The prerequisite for making risk management the main tool for achieving defense programs objectives is the design and implementation of a strong risk management framework as a foundation providing an efficient and effective application of the best risk management practices. The aim of this paper is to examine the risk management framework for defense programs based on the ISO 31000:2009 standard, best risk management practices and the defense programs’ needs and particularities. For the purposes of this article, the term of defense programs refers to joint defense programs.

  7. 76 FR 56744 - Privacy Act of 1974; Notice of a Computer Matching Program

    Science.gov (United States)

    2011-09-14

    ... Agencies: Participants in this computer matching program are the Social Security Administration (SSA) and... pertaining to computer matching at 54 FR 25818, June 1989. The legal authority for this exchange is sections... of the Secretary Privacy Act of 1974; Notice of a Computer Matching Program AGENCY: Defense...

  8. Defense Meteorological Satellite Program (DMSP)

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) satellites collect visible and infrared cloud imagery as well as monitoring the atmospheric, oceanographic,...

  9. 78 FR 15730 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-03-12

    ... SECURITY Office of the Secretary Privacy Act of 1974; Computer Matching Program AGENCY: U.S. Citizenship...: Privacy Act of 1974; Computer Matching Program between the Department of Homeland Security, U.S... notice of the existence of a computer matching program between the Department of Homeland Security,...

  10. AFRL Defensive IO Programs

    Science.gov (United States)

    2007-11-02

    Wireless Information Assurance • Steganography • Air Force Enterprise Defense (AFED) 10 Distributed Agents for Information Warfare Operational...information (images, documents, overlays, audio , links, etc.) •multi-level data release to coalition forces; key-based access •covert communication...maximize throughput of communication channels Data Hiding/Embedding Steganography Watermarking Steganalysis 14 Payoffs • Integrates existing

  11. Risk Management Programs for Defense Acquisition Systems

    Science.gov (United States)

    2007-11-02

    The audit objective was to evaluate the effectiveness of risk management programs for Defense acquisition systems. Specifically, we determined whether DoD risk management policies and procedures for Defense acquisition systems were effectively implemented and what impact risk management programs bad on reducing program risks and costs. We also reviewed management controls as they applied to the audit objectives.

  12. 76 FR 11435 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2011-03-02

    ... the Social Security Administration (SSA) (source agency). This renewal of the computer matching... Privacy Act of 1974; Computer Matching Program AGENCY: Department of Education. ACTION: Notice--Computer Matching between the U.S. Department of Education and the Social Security Administration. SUMMARY:...

  13. 75 FR 61450 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-10-05

    ... are available from the FOIA/PA Program Manager, Corporate Communications, Defense Finance and... Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, 8899 East... Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager,...

  14. Defense Meteorological Satellite Program (DMSP) Film

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The United States Air Force Defense Meteorological Satellite Program (DMSP) Operational Linescan System (OLS) is a polar orbiting meteorological sensor with two...

  15. 32 CFR 701.119 - Privacy and the web.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Privacy and the web. 701.119 Section 701.119... THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.119 Privacy and the web. DON activities shall consult SECNAVINST 5720.47B for guidance on what may be posted on a Navy Web site....

  16. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2013-03-01

    Radios, Joint Land Attack Cruise Missile Defense Elevated Netter Sensor System, C-130 Avionics Modernization Program, or National Polar-orbiting...investigation of hypoxia-like physiological symptoms experienced by some F- 22A pilots, an issue identified as being significant starting in 2008 and

  17. 78 FR 71591 - Privacy Act of 1974; Computer Matching Program between the U.S. Department of Education (ED) and...

    Science.gov (United States)

    2013-11-29

    ... Privacy Act of 1974; Computer Matching Program between the U.S. Department of Education (ED) and the U.S.... SUPPLEMENTARY INFORMATION: Pursuant to the Privacy Act of 1974, as amended (Privacy Act) (5 U.S.C. 552a), the..., the Computer Matching and Privacy Protection Act of 1988, 54 FR 25818 (June 19, 1989), and...

  18. Affordability of Defense Acquisition Programs

    Science.gov (United States)

    2015-02-01

    2 The study team constructed a representation of the Army investment program and plans through fiscal year 2030 using...shares are used to project resources available in each category through approximately 2030 . By fixing the topline at the level of the end of the...scenario development that takes place in the Analytic Agenda process. In that context, the Assessment Division (N-81) in the Office of the Chief of 31

  19. 76 FR 5729 - Department of Defense Personnel Security Program (PSP)

    Science.gov (United States)

    2011-02-02

    ... of the Secretary 32 CFR Part 156 Department of Defense Personnel Security Program (PSP) AGENCY... for the Department of Defense (DoD) Personnel Security Program (PSP) in accordance with the provisions... Department of Defense Directive (DoDD) 5200.2, Personnel Security Program (PSP), codified at 32 CFR 156,...

  20. 76 FR 28165 - Supplemental Nutrition Assistance Program: Privacy Protections of Information From Applicant...

    Science.gov (United States)

    2011-05-16

    ... determined that this rule has no impact on any of the protected classes. These changes affect the privacy of... in 7 CFR Part 272 Alaska, Civil rights, Claims, SNAP, Grant programs--social programs, Reporting...

  1. Defense Institution Reform Initiative Program Elements Need to Be Defined

    Science.gov (United States)

    2012-11-09

    DSCA Defense Security Cooperation Agency DASD PSO Deputy Assistant Secretary of Defense for MoDA Ministry of Defense Advisors Partnership Strategy...to the USD(P) Chief of Staff. 2 According to the DASD PSO, his office provided program management for the MoDA Program. However, according to a DASD

  2. Second Line of Defense Spares Program Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

    2012-11-20

    The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

  3. 77 FR 74913 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-12-18

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA)/Office of Personnel Management (OPM))--Match Number 1307 AGENCY: Social Security Administration....

  4. 75 FR 5166 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration...

    Science.gov (United States)

    2010-02-01

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration/Railroad Retirement Board (SSA/RRB))-- Match Number 1308 AGENCY: Social Security Administration...

  5. Second Line of Defense Spares Program

    Energy Technology Data Exchange (ETDEWEB)

    Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

    2012-11-20

    During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

  6. 75 FR 63524 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2010-10-15

    ... Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State Medicare... required by the Computer Matching and Privacy Protection Act of ] 1988, the RRB is issuing a public notice... Matching and Privacy Protection Act of 1988, Public Law 100-503, requires a Federal agency participating...

  7. 78 FR 69926 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Centers for Medicare & Medicaid...

    Science.gov (United States)

    2013-11-21

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Centers for Medicare & Medicaid... accordance with the provisions of the Privacy Act, as amended, this notice announces a renewal of an existing... Act of 1988 (Pub. L 100-503), amended the Privacy Act (5 U.S.C. 552a) by describing the...

  8. 78 FR 69925 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Fiscal Service...

    Science.gov (United States)

    2013-11-21

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Bureau of the Fiscal Service..., 2013. SUMMARY: In accordance with the provisions of the Privacy Act, as amended, this notice announces... INFORMATION: A. General The Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503),...

  9. Department of Defense DOD Freedom of Information Act Program

    Science.gov (United States)

    1998-09-01

    processor in previous example. WHITE, Sally 400 .2 Processed FOIA’s part-time while working as paralegal in General Counsel’s Office. PETERS, 1,000 .5 Part...Under Secretary of Defense (Industrial Affairs & Installations) Assistant to the Secretary of Defense (Nuclear, Chemical & Biological Defense Programs

  10. 75 FR 69988 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-11-16

    ...Section 421(a)(1) of the Controlled Substances Act (21 U.S.C. 862(a)(1)) includes provisions regarding the judicial denial of Federal benefits. Section 421 of the Controlled Substances Act, which was originally enacted as section 5301 of the Anti-Drug Abuse Act of 1988, and which was amended and redesignated as section 421 of the Controlled Substances Act by section 1002(d) of the Crime Control Act of 1990, Public Law 101-647 (hereinafter referred to as ``section 5301''), authorizes Federal and State judges to deny certain Federal benefits (including student financial assistance under Title IV of the Higher Education Act of 1965, as amended (HEA)) to individuals convicted of drug trafficking or possession of a controlled substance. In order to ensure that Title IV, HEA student financial assistance is not awarded to individuals subject to denial of benefits under court orders issued pursuant to section 5301, the Department of Justice and the Department of Education implemented a computer matching program. The 18-month computer matching agreement (CMA) was recertified for an additional 12 months on December 19, 2009. The 12-month recertification of the CMA will automatically expire on December 17, 2010. The Department of Education must continue to obtain from the Department of Justice identifying information regarding individuals who are the subject of section 5301 denial of benefits court orders for the purpose of ensuring that Title IV, HEA student financial assistance is not awarded to individuals subject to denial of benefits under court orders issued pursuant to the Denial of Federal Benefits Program. The purpose of this notice is to announce the continued operation of the computer matching program and to provide certain required information concerning the computer matching program. In accordance with the Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act of 1988 (Pub. L. 100-503) and Office of Management and

  11. 32 CFR 806b.51 - Privacy and the Web.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Privacy and the Web. 806b.51 Section 806b.51... PROGRAM Disclosing Records to Third Parties § 806b.51 Privacy and the Web. Do not post personal information on publicly accessible DoD web sites unless clearly authorized by law and implementing...

  12. Department of Defense Management of Unobligated Funds for Acquisition Programs

    Science.gov (United States)

    2015-04-30

    CGFM, MBA, Senior Staff Accountant, Office of the Under Secretary of Defense (Comptroller), Financial Improvement and Audit Readiness (FIAR), 703...This research analyzes financial obligation rates for acquisition programs and acquisition program contract awards made in the last quarter of the...Postgraduate School since September 2010. Prior to that, he taught acquisition and business, cost estimating, and financial management courses at the Defense

  13. Defense Acquisitions: Assessment of Institute for Defense Analyses C-130 Avionics Modernization Program Analysis

    Science.gov (United States)

    2014-05-29

    Page 1 GAO-14-547R C-130 Avionics Modernization Program 441 G St. N.W. Washington, DC 20548 May 29, 2014...Congressional Committees Defense Acquisitions: Assessment of Institute for Defense Analyses’ C-130 Avionics Modernization Program Analysis The Air...Force’s C-130 Avionics Modernization Program (AMP), which entered development in 2001, was to standardize and upgrade the cockpit and avionics for

  14. A Privacy Data-Oriented Hierarchical MapReduce Programming Model

    Directory of Open Access Journals (Sweden)

    Haiwen Han

    2013-08-01

    Full Text Available To realize privacy data protection efficiently in hybrid cloud service, a hierarchical control architecture based multi-cluster MapReduce programming model (the Hierarchical MapReduce Model,HMR is presented. Under this hierarchical control architecture,  data isolation and placement among private cloud and public clouds according to the data privacy characteristic is implemented by the control center in private cloud.  And then, to perform the corresponding distributed parallel computation correctly under the multi-clusters mode that is different to the conventional single-cluster mode, the Map-Reduce-GlobalReduce three stage scheduling process is designed. Limiting the computation about privacy data in private cloud while outsourcing the computation about non-privacy data to public clouds as much as possible, HMR reaches the performance of both security and low cost.  

  15. 32 CFR 701.101 - Privacy program terms and definitions.

    Science.gov (United States)

    2010-07-01

    ... may include a combination of gender, race, birth date, geographic indicator, and other descriptors... records must be maintained in a system of records. (o) Privacy Impact Assessment (PIA). An ongoing... page” and the linked subordinate information. (x) Working day. All days excluding Saturday, Sunday,...

  16. 77 FR 43639 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-07-25

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA.... ACTION: Notice of a renewal of an existing computer matching program that expired on May 10,...

  17. 77 FR 54943 - Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA...

    Science.gov (United States)

    2012-09-06

    ... From the Federal Register Online via the Government Publishing Office SOCIAL SECURITY ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (Social Security Administration (SSA.... ACTION: Notice of a renewal of an existing computer matching program that will expire on October 1,...

  18. 78 FR 46799 - Supplemental Nutrition Assistance Program: Privacy Protections of Information From Applicant...

    Science.gov (United States)

    2013-08-02

    .... Russell National School Lunch Act or the School Breakfast Program established under the Child Nutrition... / Friday, August 2, 2013 / Rules and Regulations#0;#0; ] DEPARTMENT OF AGRICULTURE Food and Nutrition Service 7 CFR Part 272 RIN 0584-AD91 Supplemental Nutrition Assistance Program: Privacy Protections...

  19. Department of Defense Chemical and Biological Defense Program. Volume 2: FY2002-2004 Performance Plan

    Science.gov (United States)

    2003-04-01

    Complete research studies for the development of vaccine candidates for WEE virus. Defense Advanced Research Projects Agency (DARPA) Program...encephalitic alphaviruses. Continue research for the development of vaccine candidates for EEE virus infection. Test promising vaccine candidates for

  20. Defense programs beryllium good practice guide

    Energy Technology Data Exchange (ETDEWEB)

    Herr, M.

    1997-07-01

    Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to

  1. Defense Meteorological Satellite Program (DMSP) - Space Weather Sensors

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Defense Meteorological Satellite Program (DMSP) maintains a constellation of sun-synchronous, near-polar orbiting satellites. The orbital period is 101 minutes...

  2. An Optimal Algorithm towards Successive Location Privacy in Sensor Networks with Dynamic Programming

    Science.gov (United States)

    Zhao, Baokang; Wang, Dan; Shao, Zili; Cao, Jiannong; Chan, Keith C. C.; Su, Jinshu

    In wireless sensor networks, preserving location privacy under successive inference attacks is extremely critical. Although this problem is NP-complete in general cases, we propose a dynamic programming based algorithm and prove it is optimal in special cases where the correlation only exists between p immediate adjacent observations.

  3. 78 FR 5787 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-28

    ..., Department of Defense. LDIA 0450 System name: Drug-Free Workplace Files (September 9, 2009, 74 FR 46418). Changes: * * * * * System name: Delete entry and replace with ``Drug Testing Program Files.'' System... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency,...

  4. 78 FR 29786 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2013-05-21

    ... Privacy Act Systems of Records notices on our public Web site at: ( http://www.rrb.gov/bis/privacy_act... in the records will consist of beneficiary identifying information such as: name, Social Security... ongoing computer matching program. In this match, we provide certain Medicare and benefit rate information...

  5. 75 FR 12226 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2010-03-15

    ... to the Office of Management and Budget (OMB) Final Guidance Interpreting the Provisions of Public Law... Talent Grant Program; the Iraq and Afghanistan Service Grant Program; the Federal Perkins Loan Program... Comments or Inquires. Mr. Leroy Everett, Management and Program Analyst, U.S. Department of...

  6. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2015-03-01

    Assessment 56 Figure 13: Examples of Knowledge Scorecards 58 Contents Page v GAO-15-342SP Assessments of Selected Weapon Programs Abbreviations...efficiencies realized through contract negotiations (13 programs), • design trades to balance affordability and capability (10 programs), • changed...at the time of our review with a scorecard and narrative summary at the bottom of the first page of each assessment. As illustrated in figure 12

  7. 76 FR 24564 - Privacy Act of 1974: Computer Matching Program

    Science.gov (United States)

    2011-05-02

    ... Department of Health & Social Services. 4. Arizona Department of Economic Security. 5. Arkansas Department of... a program listed below: (1) A state program funded under part A of Title IV of the Social Security... Security Act; (3) Supplemental security income benefits under Title XVI of the Social Security Act,...

  8. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2016-03-01

    of contractors delivering the 10 costliest programs have performed well relative to broad-based market indices, indicating that investors expect...16-329SP Assessments of Major Weapon Programs Two programs—the B-2 Extremely High Frequency Satellite Communications and Computer...expected. The B-2 Extremely High Frequency Satellite Communications and Computer Increment 1 date was revised to reflect the actual delivery of

  9. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2017-03-01

    Missile Submarine (SSBN 826) 117 Ship to Shore Connector Amphibious Craft (SSC) 119 VH-92A Presidential Helicopter Replacement Program 121... Sight Terminals (FAB-T) 143 Global Positioning System III (GPS III) 145 KC-46 Tanker Modernization Program (KC-46A) 147 Military GPS User Equipment...been incorporated into the DOD Instruction 5000.02. These and other reforms address sound management practices, such as realistic cost estimating

  10. Privacy Impact Assessment for the Wellness Program Medical Records

    Science.gov (United States)

    The Wellness Program Medical Records System collects contact information and other Personally Identifiable Information (PII). Learn how this data is collected, used, accessed, the purpose of data collection, and record retention policies.

  11. Theater Ballistic Missile Defense Policy, Missions and Programs: Current Status

    Science.gov (United States)

    2007-11-02

    destroy its target. A French-Italian program called SAMP/T (Sol-Air Moyenne Portee/ Terrestre ) is being considered for a point defense system; further...Patriot PAC-3 missile. The Multimode Missile includes semi-active track- via -missile guidance, improved propulsion and uses an aimed blast

  12. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2008-03-01

    108Program Performance (fiscal year 2008 dollars in millions) Figures shown are based on the December 2006 Selected Acqusition Report and do not reflect... language to permit it to contract for quantities of WIN-T Increment 1 nodes in fiscal year 2008 to support operational needs, even if prior to the

  13. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2014-03-01

    a new initiative to reduce complexity within the cryptography required to encrypt and decrypt communications. In last year’s assessment, the program...TRL) 6. Demonstration in a realistic environment is TRL 7. See app . V for detailed description of TRLs. Page 27 GAO-14-340SP Assessments of

  14. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2011-03-01

    cover the JPALS ship system-radio, antenna, receiver, racks , and console. The program also tracks requirement changes to monitor design stability...with stowage cradle) and berthing modules around the LCS 2 mission bay. Navy officials also report that testing of LCS 2’s twin- boom extensible

  15. 78 FR 45513 - Privacy Act of 1974; Computer Matching Program

    Science.gov (United States)

    2013-07-29

    .... DESCRIPTION OF COMPUTER MATCHING PROGRAM: Each participating SPAA will send ACF an electronic file of eligible public assistance client information. These files are non- Federal computer records maintained by the... on no more than 10,000,000 public assistance beneficiaries. 2. The DMDC computer database...

  16. Review of Defense Display Research Programs

    Science.gov (United States)

    2001-01-01

    Programs Flat Panel Autostereoscopic N-perspective 3D High Definition DMD Digital Projector Light Piping & Quantum Cavity Displays Solid State Laser...Megapixel Displays • Size Commonality • 67 % Weight Reduction • > 200 sq. in. per Display 20-20 Vision Simulators True 3D , sparse symbols Foldable Display...megapixel 2D and True 3D Display Technology 25M & T3D FY02-FY06 New service thrusts

  17. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2017-03-01

    more stable. However, the portfolio increased its buying power by $10.7 billion— meaning DOD is able to buy more goods or services for the same... experience cost and schedule overruns. GAO continues to emphasize the need for DOD and Congress to hold programs accountable by ensuring that they...Alternatively a program’s cost can decrease due to a reduction in quantity and may still experience a buying power gain or loss. Table 2 shows our

  18. Defense Acquisitions: Assessments of Selected Weapon Programs

    Science.gov (United States)

    2012-03-01

    Inc 3 Soldier Network Extension WIN-T Inc 3 Tact i lca Communications Node (While Mobile) Program/development start (7/03) Low-rate decision (4/15...Davidson, Ramzi N. Nemo Littoral Combat Ship (LCS) Rebecca A. Wilson, Molly W. Traci Littoral Combat Ship–Mission Modules Laurier R. Fish , Mya Dinh...Warfighter Information Network-Tactical (WIN-T) Increment 2 James P. Tallon, Laurier R. Fish Warfighter Information Network-Tactical (WIN-T) Increment 3

  19. Secure Linear Programming Using Privacy-Preserving Simplex

    CERN Document Server

    Saxena, Amitabh; Hoogh, Sebastiaan J

    2009-01-01

    The SecureSCM project (www.securescm.org) aims to develop cryptographic solutions to the problem of data sharing in Supply Chain Optimization (SCO). The SCO problem has a precise mathematical structure. It is an instance of the general Linear Programming (LP) problem. However, standard techniques for LP problems are not suitable for this purpose because they require participants to reveal private data needed as input to the algorithm. The risk of revealing this information far exceeds the benefits gained. Therefore, the aim of the project is to develop efficient techniques for securely solving LP problems. In this paper we give a summary of work done in the cryptographic aspects of the project. We describe the state-of-the art building blocks for secure linear programming along with an analysis of their complexity.

  20. FY 1972-1976 Defense Program and the 1972 Defense Budget.

    Science.gov (United States)

    1971-03-01

    Thai Government. This assessment was given me by Thai officials during my recent visit there. Insurgents along the Thai/ Malaysian border are under the...Development and Initial Procurement of Maverick Air-to-Ground Missile 31 87 Air Superiority and Air Defense Continued Procurement of F-4 Air Force Fighter... MAVERICK . The MAVERICK is another program that is of importance in providing increased capabilities for support of troops on the battlefield. MAVERICK is

  1. Department of Defense Chemical and Biological Defense Programs. Annual Report to Congress 2007

    Science.gov (United States)

    2007-04-01

    challenges. (see Figure 1.) The program depends on support in three priority areas: (1) Stable funding for the Transformational Medical Technolgies ...defense, speed of mass (life and mobility ) and information, fiscal barriers, values, and attitudes. The principles of jointness and developing an...Battlefield anti-intrusion Detection System (BaiS) an/PrS9 (Fue 2QFY06) 13. mobile Detection assessment response System (mDarS) (1QFY07) 14. Joint

  2. 78 FR 14281 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN... Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150. Request..., Defense Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager,...

  3. 76 FR 71417 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Law Enforcement Agencies (LEA...

    Science.gov (United States)

    2011-11-17

    ... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Law Enforcement Agencies (LEA... General Counsel. Notice of Computer Matching Program, SSA With the Law Enforcement Agency (LEA) A... establish terms, conditions, and safeguards under which we will conduct a computer matching program with law...

  4. An Analysis of the Relationship Between the Professionalism of Defense Acquisition Program Managers and Program Outcomes

    Science.gov (United States)

    2011-11-30

    for example, Fox & Miller, 2006; Kronenberg , 1990) have noted the high level of complexity in defense acquisition programs. Several interviewees in...CA: Berrett–Koehler. Kronenberg , P. S. (1990). Public administration and the Defense Department: Examination of a prototype. In G. Wamsley et al

  5. Analysis to Support Execution of the Defense Environmental International Cooperation (DEIC) Program

    Science.gov (United States)

    2012-05-01

    IDA Document D-4605 May 2012 Analysis to Support Execution of the Defense Environmental International Cooperation ( DEIC ) Program Susan L. Clark...Execution of the Defense Environmental International Cooperation ( DEIC ) Program Susan L. Clark-Sestak iii Executive Summary The Defense...Environmental International Cooperation ( DEIC ) program is managed by the Director of Environmental Readiness and Safety (ERS) in the Office of the Deputy

  6. A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes

    OpenAIRE

    Jung, Ho-Won; El Emam, Khaled

    2014-01-01

    Background A linear programming (LP) model was proposed to create de-identified data sets that maximally include spatial detail (e.g., geocodes such as ZIP or postal codes, census blocks, and locations on maps) while complying with the HIPAA Privacy Rule’s Expert Determination method, i.e., ensuring that the risk of re-identification is very small. The LP model determines the transition probability from an original location of a patient to a new randomized location. However, it has a limitati...

  7. 75 FR 77607 - Privacy Act of 1974; Proposed New System of Records; Veterinary Medicine Loan Repayment Program

    Science.gov (United States)

    2010-12-13

    ... Office of the Secretary Privacy Act of 1974; Proposed New System of Records; Veterinary Medicine Loan... of Agriculture system of records notice titled, ``Veterinary Medicine Loan Repayment Program Records... select applicants for the Veterinary Medicine Loan Repayment Program (VMLRP); (2) monitor loan...

  8. 77 FR 32709 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Department of Homeland Security...

    Science.gov (United States)

    2012-06-01

    ... us. DHS will disclose two separate data files through a computer matching operation for our use in... ADMINISTRATION Privacy Act of 1974, as Amended; Computer Matching Program (SSA/ Department of Homeland Security... an existing computer matching program that will expire on July 18, 2012. SUMMARY: In accordance...

  9. 77 FR 39748 - Computer Matching and Privacy Protection Act of 1988; Report of Matching Program: RRB and State...

    Science.gov (United States)

    2012-07-05

    ...] [FR Doc No: 2012-16384] RAILROAD RETIREMENT BOARD Computer Matching and Privacy Protection Act of 1988...: Notice of a renewal of an existing computer matching program due to expire on August 12, 2012. SUMMARY..., information obtained from state agencies in ongoing computer matching programs regarding individuals...

  10. 77 FR 38611 - Privacy Act of 1974; System of Records-Study of Promising Features of Teacher Preparation Programs

    Science.gov (United States)

    2012-06-28

    ... Teacher Preparation Programs'' (18-13-29). The National Center for Education Evaluation and Regional... Privacy Act of 1974; System of Records--Study of Promising Features of Teacher Preparation Programs AGENCY... Abt Associates to conduct a rigorous study of the effect on student learning of teachers who...

  11. Privacy Concerns Related to the Collection of Personal Information Under the Personal Identify Verification (PIV) Program

    Science.gov (United States)

    2008-03-01

    entities (such as marketers or other businesses). Citibank and MNBA, for example, both specifically state in their privacy policies that all... Citibank . (2004). Citigroup privacy promise for consumers. Retrieved May 10, 2005, from http://www.citibank.hu/privacy/index.htm Clarke, R. (2001, April

  12. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 5. Governmental Responsibilities for Civil Defense.

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    A description of the laws and orders that provide necessary legal authorization for civil defense activities is provided. In addition, an outline of the responsibilities of all governments and the role of the private sector in civil defense is presented. Topics discussed include: (1) Legal authority for civil defense, (2) Civil defense…

  13. Civil Defense, U. S. A.: A Programmed Orientation to Civil Defense. Unit 1. Civil Defense - Protection Against What?

    Science.gov (United States)

    Defense Civil Preparedness Agency (DOD), Battle Creek, MI.

    An explanation of the need for civil defense in nuclear and natural disasters is presented. A brief historical background of civil defense is given. Major topics include: (1) Types of disasters, (2) Probable objectives of a nuclear attack on the United States, (3) The major defensive measures against a nuclear attack, (4) Some reasons for low…

  14. 78 FR 21600 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-11

    ... System name: DLA Drug-Free Workplace Program Records (May 20, 2010; 75 FR 28242) Reason: Records are... notice OPM/Govt-10, entitled ``Employee Medical File System Records'' last published in the Federal... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD....

  15. 75 FR 21248 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-23

    ..., Corporate Communications and Legislative Liaison, Defense Finance and Accounting Service, DFAS-HKC/IN, 8899..., Corporate Communications and Legislative Liaison, 8899 E. 56th Street, Indianapolis, IN 46249-0150. Written... Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications and...

  16. 75 FR 16171 - Privacy Act of 1974; Notice of Modification of Existing Computer Matching Program Between the...

    Science.gov (United States)

    2010-03-31

    ... Individuals Covered by the System, Categories of Records in the System, Purposes of the System, and Routine Uses of Records Maintained in the System, Including Categories of Users and Purposes of Such Users. The... URBAN DEVELOPMENT Privacy Act of 1974; Notice of Modification of Existing Computer Matching Program...

  17. 77 FR 62469 - Defense Logistics Agency Freedom of Information Act Program

    Science.gov (United States)

    2012-10-15

    ..., Wright-Patterson AFB, Ohio-- Editing/routing of logistics transactions, network interoperability and e... of the Secretary 32 CFR Part 300 Defense Logistics Agency 32 CFR Part 1285 RIN 0790-AI87 Defense Logistics Agency Freedom of Information Act Program AGENCY: Defense Logistics Agency, DoD. ACTION: Proposed...

  18. SITREP: The NPS Maritime Defense and Security Research Program Newsletter ; v. 38 (April 2009)

    OpenAIRE

    2009-01-01

    This April 2009 issue of the Naval Postgraduate School (NPS) Maritime Defense and Security Research Program Newsletter highlights the following research: "Join MDA [Maritime Defense and Awareness] Outreach on ODNI [Office of the Director of National Intelligence] Bridge" and "NPS Cooperative Operations and Applied Science & Technology Studies." It also provides links to future events, reports, articles, and NPS Theses regarding maritime defense and security.

  19. 75 FR 69693 - Privacy Act of 1974; Department of Homeland Security National Protection and Programs Directorate...

    Science.gov (United States)

    2010-11-15

    ... including scars, marks, and tattoos; Automobile registration information; Watch list information; Medical... obtain forms for this purpose from the Chief Privacy Officer and Chief Freedom of Information Act...

  20. Defense High-Level Waste Leaching Mechanisms Program. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Mendel, J.E. (compiler)

    1984-08-01

    The Defense High-Level Waste Leaching Mechanisms Program brought six major US laboratories together for three years of cooperative research. The participants reached a consensus that solubility of the leached glass species, particularly solubility in the altered surface layer, is the dominant factor controlling the leaching behavior of defense waste glass in a system in which the flow of leachant is constrained, as it will be in a deep geologic repository. Also, once the surface of waste glass is contacted by ground water, the kinetics of establishing solubility control are relatively rapid. The concentrations of leached species reach saturation, or steady-state concentrations, within a few months to a year at 70 to 90/sup 0/C. Thus, reaction kinetics, which were the main subject of earlier leaching mechanisms studies, are now shown to assume much less importance. The dominance of solubility means that the leach rate is, in fact, directly proportional to ground water flow rate. Doubling the flow rate doubles the effective leach rate. This relationship is expected to obtain in most, if not all, repository situations.

  1. Defense programs industrial partnerships at Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Freese, K.B. [Los Alamos National Lab., NM (United States). Industrial Partnership Office

    1996-10-01

    The US Department of Energy`s Defense Programs face unprecedented challenges of stewardship for an aging nuclear stockpile, cessation of nuclear testing, reduced federal budgets, and a smaller manufacturing complex. Partnerships with industry are essential in developing technology, modernizing the manufacturing complex, and maintaining the safety and reliability of the nation`s nuclear capability. The past decade of federal support for industrial partnerships has promoted benefits to US industrial competitiveness. Recent shifts in government policy have re-emphasized the importance of industrial partnerships in accomplishing agency missions. Nevertheless, abundant opportunities exist for dual-benefit, mission-driven partnerships between the national laboratories and industry. Experience at Los Alamos National Laboratory with this transition is presented.

  2. Defense programs occurrence analysis report for third quarter CY-1991

    Energy Technology Data Exchange (ETDEWEB)

    1991-12-01

    The quarterly Defense Programs Occurrence Analysis Report (DPOAR) is compiled by the Office of Self-Assessment and Emergency Management (DP-9). It utilizes the Occurrence Reporting and Processing System (ORPS) data to assess the quality and effectiveness of the reporting process and the significance of the occurrences. In addition, areas where further improvement and corrective actions are necessary is fully demonstrated by an analysis of the data. The results of the assessment may also be used as the basis for conducting other evaluations such as the diagnostic and augmented evaluations. This quarterly report provides feedback to DOE/DP and contractor management to improve the control of operations and achieve a higher standard of excellence. The report analyzes one year of ORPS data at the end of each calendar quarter, therefore, the performance of DP Field Offices and facilities will be continuously compared to their past quarter and yearly performances. During this assessment from 1 October 1990 through 30 September 1991, there were a number of initiatives that were undertaken by Field Office management to improve the overall performance and the quality of the Occurrence Reporting and Processing System. These initiatives include the training of their staff for self-assessment activities. These intiatives can be found in the programs implemented according to the DOE Conduct of Operations and Occurrence Reporting and Processing of Operations Information Orders. These initiatives were found to be, based on the ORPS data, stronger at Albuquerque, Nevada, Oak Ridge Field Offices and Richland DP facilities.

  3. An Efficient Context-Aware Privacy Preserving Approach for Smartphones

    Directory of Open Access Journals (Sweden)

    Lichen Zhang

    2017-01-01

    Full Text Available With the proliferation of smartphones and the usage of the smartphone apps, privacy preservation has become an important issue. The existing privacy preservation approaches for smartphones usually have less efficiency due to the absent consideration of the active defense policies and temporal correlations between contexts related to users. In this paper, through modeling the temporal correlations among contexts, we formalize the privacy preservation problem to an optimization problem and prove its correctness and the optimality through theoretical analysis. To further speed up the running time, we transform the original optimization problem to an approximate optimal problem, a linear programming problem. By resolving the linear programming problem, an efficient context-aware privacy preserving algorithm (CAPP is designed, which adopts active defense policy and decides how to release the current context of a user to maximize the level of quality of service (QoS of context-aware apps with privacy preservation. The conducted extensive simulations on real dataset demonstrate the improved performance of CAPP over other traditional approaches.

  4. A linear programming model for preserving privacy when disclosing patient spatial information for secondary purposes

    Science.gov (United States)

    2014-01-01

    Background A linear programming (LP) model was proposed to create de-identified data sets that maximally include spatial detail (e.g., geocodes such as ZIP or postal codes, census blocks, and locations on maps) while complying with the HIPAA Privacy Rule’s Expert Determination method, i.e., ensuring that the risk of re-identification is very small. The LP model determines the transition probability from an original location of a patient to a new randomized location. However, it has a limitation for the cases of areas with a small population (e.g., median of 10 people in a ZIP code). Methods We extend the previous LP model to accommodate the cases of a smaller population in some locations, while creating de-identified patient spatial data sets which ensure the risk of re-identification is very small. Results Our LP model was applied to a data set of 11,740 postal codes in the City of Ottawa, Canada. On this data set we demonstrated the limitations of the previous LP model, in that it produces improbable results, and showed how our extensions to deal with small areas allows the de-identification of the whole data set. Conclusions The LP model described in this study can be used to de-identify geospatial information for areas with small populations with minimal distortion to postal codes. Our LP model can be extended to include other information, such as age and gender. PMID:24885457

  5. 78 FR 63458 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-10-24

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Secretary of Defense... Research Approval Process'', in its inventory of record systems subject to the Privacy Act of 1974, as... of the Secretary of Defense notices for systems of records subject to the Privacy Act of 1974 (5...

  6. EGRP Privacy Policy & Disclaimers

    Science.gov (United States)

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  7. EGRP Privacy Policy & Disclaimers

    Science.gov (United States)

    The Epidemiology and Genomics Research Program complies with requirements for privacy and security established by the Office of Management and Budget, Department of Health and Human Services, the National Institutes of Health, and the National Cancer Institute.

  8. Analysis of Defense Industry Consolidation Effects on Program Acquisition Costs

    Science.gov (United States)

    2007-12-01

    Industry Mergers. 15 April 1997. Suhan, Kensinger, Keown , and Martin , “Do Strategic Alliances Create Value,” Journal of Financial Economics, 46 2 (1997...aerospace and defense contractors (Lockheed- Martin , Northrop-Grumman, Boeing, Raytheon, and General Dynamics) (See the figures in the Appendix...overhead costs. Also in 1993, Norman R. Augustine, then CEO of Lockheed Martin , headed an effort involving other major defense industry executives

  9. Establishing a Department of Defense Program Management Body of Knowledge

    Science.gov (United States)

    1991-09-01

    Initiation, Implementation, and Termination (19:10-11). Another definition can be gained from Dr David Cleland, in his text Project Management Strategies...The Defense Systems Management College (DSMC) was established in 1971 under the direction of Deputy Secretary of Defense David Packard (5:5).. The...intelligence activities, cryptological activities, omand and control, equipment that is an integral part of a weapon or weapon system, equipment critical

  10. Who Pays for National Defense? Financing Defense Programs in the United States, 1947-2007

    Science.gov (United States)

    Heo, Uk; Bohte, John

    2012-01-01

    Past studies on military expenditures in the United States have primarily focused on the extent to which guns versus butter trade-offs are prevalent without examining this relationship in the context of how other fiscal policy tools are used to pay for defense. Using annual data from 1947-2007, this study examines the relative importance of…

  11. A Comparison of Earned Value and Earned Schedule Duration Forecast Methods on Department of Defense Major Defense Acquisition Programs

    OpenAIRE

    Bruchey, William J.

    2012-01-01

    Approved for public release; distribution is unlimited Earned value management is a project management tool that integrates project scope with cost, schedule, and performance elements for optimum project planning and control. Earned value management is required by the Department of Defense for cost and incentive type contracts equal or greater than $20 million as part of a comprehensive approach to improving critical acquisitions. It is used to forecast the programs schedule performance us...

  12. Environmental assessment of defense environmental restoration program activities on St. Lawrence Island

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The magnitude and extent of environmental impacts associated with Defense environmental Restoration Program activities at Gambell and Northeast Cape varies. The...

  13. Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

  14. Information privacy fundamentals for librarians and information professionals

    CERN Document Server

    Givens, Cherie L

    2014-01-01

    This book introduces library and information professionals to information privacy, provides an overview of information privacy in the library and information science context, U.S. privacy laws by sector, information privacy policy, and key considerations when planning and creating a privacy program.

  15. Chemical and Biological Defense Program Annual Report to Congress

    Science.gov (United States)

    2006-03-01

    state public health systems, to expand existing biosurveillance efforts, and to fund research on medical countermeasures against potential bioterror...Detection System (JBSDS) • Joint Portal Shield • Biological Identification System (BIDS) • Dry Filter Units (DFUs) Table 2-3 Biological Defense...Detection System (BIDS) • Joint Portal Shield Network Sensor System • Automated biological remote detection and early warning capabilities

  16. Department of Defense Enhanced Particulate Matter Surveillance Program (EPMSP)

    Science.gov (United States)

    2008-02-01

    relation to five rural IMPROVE sites (Dome Land NWA, Joshua Tree NP, Bosque del Apache NWR, Salt Creek, and San Andres NWR) and five urban STN sites...The five rural sites are at Dome Land National Wildlife Area (NWA), Joshua Tree National Park, Bosque del Apache National Wildlife Refuge (NWR), Salt...Department of Defense (DoD) lands in the southwestern U.S. in relation to five rural IMPROVE sites (Dome Land NWA, Joshua Tree NP, Bosque del Apache NWR

  17. Evaluation of the Department of Defense Combating Trafficking in Persons Program

    Science.gov (United States)

    2014-06-16

    DODIG-2014-079 │ 1 Introduction Prior to 2000, allegations of sexual slavery, sex with minors, and human trafficking involving U.S. contractors in...1 6 , 2 0 1 4 Evaluation of the Department of Defense Combating Trafficking in Persons Program Report No. DODIG-2014-079 Report Documentation...3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Evaluation of the Department of Defense Combating Trafficking in Persons

  18. 39 CFR 262.5 - Systems (Privacy).

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Systems (Privacy). 262.5 Section 262.5 Postal... DEFINITIONS § 262.5 Systems (Privacy). (a) Privacy Act system of records. A Postal Service system containing... individual. (c) Computer matching program. A “matching program,” as defined in the Privacy Act, 5 U.S.C. 552a...

  19. Identifying Enterprise Leverage Points in Defense Acquisition Program Performance

    Science.gov (United States)

    2009-09-01

    Planning Guidance SPI Schedule Efficiency SPO System Program Office SPOC Special Access Required (SAR) Programs Oversight Committee SPRG...Air Force office of Financial Management and Budget; SES = Senior Executive Service; SPOC /SPRG/SAR = classified financial review system for

  20. Defense Acquisitions: Assessments of Selected Major Weapon Programs

    Science.gov (United States)

    2006-03-01

    Common Name: C-130 AMPC -130 Avionics Modernization Program (C-130 AMP)The Air Force’s C-130 AMP standardizes the cockpit configurations and avionics for...GAO-06-391 Assessments of Selected Major Weapon Programs Common Name: C-130 AMPC -130 AMP Program Technology Maturity All of the C-130 AMP’s six...Selected Major Weapon Programs Common Name: C-5 AMPC -5 Avionics Modernization Program (C-5 AMP)The Air Force’s C-5 AMP is the first of two major upgrades

  1. Location Privacy

    Science.gov (United States)

    Meng, Xiaofeng; Chen, Jidong

    With rapid development of sensor and wireless mobile devices, it is easy to access mobile users' location information anytime and anywhere. On one hand, LBS is becoming more and more valuable and important. On the other hand, location privacy issues raised by such applications have also gained more attention. However, due to the specificity of location information, traditional privacy-preserving techniques in data publishing cannot be used. In this chapter, we will introduce location privacy, and analyze the challenges of location privacy-preserving, and give a survey of existing work including the system architecture, location anonymity and query processing.

  2. Compendium of Programs to Assist the Transition. Annex G to Adjusting to the Drawdown. Report to the Defense Conversion Commission,

    Science.gov (United States)

    1993-02-01

    5235 (for civilian registrants) The Defense Outplacement Referral System (DORS). The DORS is an automated registry of "mini-resumes" of military...identifying employers who are interested in hiring former Army personnel. The existing DoD databanks, such as the Defense Outplacement Referral...Training Partnership Act Ine Secretary of Defense may coordinate this program with the Defense Outplacement Referral System (DORS) and other automated job

  3. Department of Defense Biological Defense Program Needs for Strategic Biotechnology Development

    Science.gov (United States)

    2013-05-16

    Command and Control 4 Bacteria /Rickettsia Viruses Toxins Anthrax Smallpox Botulinum Brucellosis Rift Valley Fever Ricin Cholera Crimean-Congo SEB Plague...structural biology − Establish research programs in aerobiological research, forensic genomics and certified forensic biological threat agent capability

  4. 76 FR 14669 - Privacy Act of 1974; CMS Computer Match No. 2011-02; HHS Computer Match No. 1007

    Science.gov (United States)

    2011-03-17

    ... HUMAN SERVICES Centers for Medicare & Medicaid Services Privacy Act of 1974; CMS Computer Match No. 2011... Medicare & Medicaid Services (CMS). ACTION: Notice of computer matching program. SUMMARY: In accordance... matching agreement between CMS and the Department of Defense (DoD). We have provided background...

  5. Implementation and Sustainability of the Russian Federation Ministry of Defense Nuclear Personnel Reliability Program

    Energy Technology Data Exchange (ETDEWEB)

    LataPhD, Vasiliy [Aspect Conversion; Coates, Cameron W [ORNL

    2010-01-01

    Through a cooperative effort between the US Department of Energy and the Russian Federation (RF) Ministry of Defense (MOD) a Personnel Reliability Program (PRP) for the nuclear handlers within the RF MOD is at the stage of implementation. Sustaining the program is of major significance for long term success. This paper will discuss the elements of the RF PRP and the equipment needs for implementation. Program requirements, documentation needs, training, and assurances of appropriate equipment use will be addressed.

  6. Digging Out the Root Cause: Nunn-McCurdy Breaches in Major Defense Acquisition Programs

    Science.gov (United States)

    2014-04-30

    Acquisition Programs Bill Shelton, RAND Corporation Irv Blickstein, RAND Corporation Jerry Sollinger, RAND Corporation Charles Nemfakos, RAND...to become a research sponsor, or to print additional copies of reports, please contact any of the staff listed on the Acquisition Research Program...Out the Root Cause: Nunn-McCurdy Breaches in Major Defense Acquisition Programs Bill Shelton, RAND Corporation Irv Blickstein, RAND Corporation

  7. Department of Defense Chemical and Biological Defense Program. Volume 1: Annual Report to Congress

    Science.gov (United States)

    2003-04-01

    Program Annual Report E-46 • Cloned and sequenced regions of the polymerase gene (E9L) from 35 variola isolates, as well as cidofovir -resistant...IC50) of cidofovir and 3-hexadecyloxy-1- propanol (HDP)- cidofovir against 40 strains of variola, monkeypox, cowpox, and vaccinia. All viruses... cidofovir in vitro against a panel of orthopoxviruses at USAMRIID and variola at the Centers for Disease Control and Prevention (CDC). Determined that

  8. FY 1975 Defense Budget and FY 1975-1979 Defense Program

    Science.gov (United States)

    1975-01-01

    ecological , or biological dangers to the area in which it is installed. 77 L The need for a more survivable communications link to our ballistic...Ship 32 61 58 Acquisition of Patrol Hydrofoil Missile Ship 30 23 108 Anti-Ship Missiles Acquisition of the HARPOON Anti-Ship Missile 60 81 136...force will be augmented by the first two of a new class of Patrol Hydrofoil Missile ships (PHM). The PHM is a cooperative NATO development program in

  9. Implementing Effective Affordability Constraints for Defense Acquisition Programs

    Science.gov (United States)

    2014-03-01

    between 1999 and 2009. Since several of those programs advertised themselves as employing the CAIV concept, the IDA team was able to draw on that...and mutable to yield to stereotyped or routinized processes. The processes associated with CAIV are tools that can help achieve powerful results if...Vehicle (EELV). Each of these FPPs, as well as four other prominent programs that advertised use of CAIV, will be reviewed in this appendix to help to

  10. Regulatory Burden and Poor Defense Acquisition Program Outcomes

    Science.gov (United States)

    2014-05-01

    drive program improvements • Econometric modeling lesson is that this is opportunity for better understanding of cause, effect, and explanation of...Agenda • Overview • Previous Work • Method • Data • Models • Results • Interpretation • Conclusions • Future Work © 2014 by the University of Tennessee...regulation or reforms? – Previously modeled as the correlation and direction of change for a key performance metric for a program in the years following the

  11. SDI (Strategic Defense Initiative) Software Technology Program Plan

    Science.gov (United States)

    1987-06-01

    Computing Initiative program under Simpson and Sears . Industrial research labs are studying fundamental issues of the man-machine interface to formulate...Reform," The Brookings Review, Summer 1986, pp. 11-16. [Maidique 80] Maidique, Modesto , "Entrepreneurs, Champions, and % Technological Innovation...Management Tasks Area," from Computer t. Special Issue on STARS Program, (November 1983), pp. 56-62. [Maidique 80] Maidique, Modesto A., "Entrepreneurs

  12. The Need for Reforming the Department of Defense Retirement Program

    Science.gov (United States)

    2010-06-04

    year vestment and immediate annuity is one of the best pension program available to a non-disabled employee in America. No other governmental of civil... pension programs have the potential to provide a retirement annuity for twice as long as the employment status. Even at a portion of the employment...such a way that is fair to current and retired service members it must grandfather the basic annuity . Furthermore, failure to act now will only delay

  13. 76 FR 1409 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-01-10

    ... system of records notice from its existing inventory of record systems subject to the Privacy Act of 1974... delete one system of records notice from its inventory of record systems subject to the Privacy Act of... system are also covered by Defense Finance and Accounting Service records notice T7332, Defense...

  14. 32 CFR 806b.30 - Evaluating information systems for Privacy Act compliance.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Evaluating information systems for Privacy Act... systems for Privacy Act compliance. Information system owners and developers must address Privacy Act... cycle of the information system. This is accomplished with a Privacy Impact Assessment. (a) The...

  15. 76 FR 55883 - Department of Defense Program for Construction, Renovation, Repair or Expansion of Public Schools...

    Science.gov (United States)

    2011-09-09

    ....'' OEA is establishing a one-time non-competitive program, as described in this notice, to administer... Secretary of Defense for Personnel and Readiness, attention: Russell Roberts, Chief, Logistics Division..., and to structure proposals to take best advantage of other contributions. OEA may waive part or...

  16. Defense Small Business Innovation Research Program (SBIR). Abstracts of Phase I Awards. 1985.

    Science.gov (United States)

    1985-01-01

    34CANNED" PROGRAM. THE SYNERGY OF HELICAL SCAN AND CGI IS A TECHNICAL ADVANTAGE BY CON- CENTRATING THE PERCEIVED INFORMATION IN THE ROBOT PICK-UP RASTER...COUNT * NEEDED FOR THE CALCULATION. * NW SYSTEMS SDIO $ 0 36 PANORAMA TRAIL ROCHESTER, NY 14525 DR CAROL A NIZNIK TITLE: STRATEGIC DEFENSE DATA BASE

  17. Modeling an integrative physical examination program for the Departments of Defense and Veterans Affairs.

    Science.gov (United States)

    Goodrich, Scott G

    2006-10-01

    Current policies governing the Departments of Defense and Veterans Affairs physical examination programs are out of step with current evidence-based medical practice. Replacing periodic and other routine physical examination types with annual preventive health assessments would afford our service members additional health benefit at reduced cost. Additionally, the Departments of Defense and Veterans Affairs repeat the physical examination process at separation and have been unable to reconcile their respective disability evaluation systems to reduce duplication and waste. A clear, coherent, and coordinated strategy to improve the relevance and utility of our physical examination programs is long overdue. This article discusses existing physical examination programs and proposes a model for a new integrative physical examination program based on need, science, and common sense.

  18. Nursing professional facing patient privacy

    Directory of Open Access Journals (Sweden)

    Fidel López Espuela

    2010-05-01

    Full Text Available Privacy of patients admitted to the hospital is played down in favour of other needs considered more basic by the healthcare system and more related to the disease than to patients themselves. Situations and factors where privacy is damaged are frequent, but it is known that when these are avoided by professionals’ attitude, through strategies and different mechanisms, it becomes one of the most satisfactory elements to patients.Objectives: To identify and analyze situations and factors which affect privacy in hospital environment as well as the adaptation capacity of patients to them.Methodology: Phenomenological, qualitative research. By means of discussion groups with professionals, the following questions where answered: ‘What do professionals understand by privacy? Which situations and factors jeopardize it during the hospital stay? How do they think patients get adapted?Results: The concept of privacy is complex, personal and non-transferable. Situations in which it is jeopardized were divided in 5 main areas. Numerous behaviors regarding adaptation of patients to these were collected.Discussion: Although there is little nursery research referring to privacy and its defense in the professional-patient relationship field, concern about this aspect always shown by nursery staff stands out.As a conclussion, we observe the need to complement this research with the perception patients have about these same questions, establishing the importance they give to privacy.

  19. Defense Surplus Equipment Disposal, Including the Law Enforcement 1033 Program

    Science.gov (United States)

    2014-09-05

    Helicopters 7- High Mobility Multipurpose Vehicles 2 -Night vision equipment 2 - Robots Other general property Firefighting Support Program Title...to the Secretary of Agriculture and the Secretary of Homeland Security for use by the Forest Service and the U.S. Coast Guard.31 P.L. 112-81 (H.R

  20. Defense Acquisition University (DAU) Program Managers Tool Kit

    Science.gov (United States)

    2008-03-01

    addtonal KPPs are requred for selected programs: system tranng and energy effic ency. • The MDA may add other sgnficant performance parameters...plans and other AT&L products accurately and effic ently. The followng PPLTs have been developed: • Prcng Support Tool <http://prcngtool.dau.ml

  1. Defense Manufacturing Management Guide for Program Managers, Third Edition

    Science.gov (United States)

    1989-04-01

    they speak to the utility of the product actions such as recalls. In the military in its end use environment. The degree to environment, there Is...represent goals. In speaking , the higher the rate, the lower the practice, contractors usually produce, and unit production cost. program management offices...referred to as computer 4. Obtain from current users: numerical control (CNC). Such a system a. Level of operator skiil usually containL a large

  2. A Best Practices Based Approach to Major Defense Acquisition Programs

    Science.gov (United States)

    2010-04-26

    EBSCO . Web. 10 Apr. 2010. Heberling, Michael E. "Open Issues in Acquisition Reform. 11 National Contract Management Journal27.2 (1996): 43-58...1325-1326. America: History & Life. EBSCO . Web. 10 Apr. 2010. Kraft, Jonathan. 11 The Evolution of Program Budgeting in the United States Government...34 Armed Forces Comptroller 54.1 (2009): 40-41. International Security & Counter Terrorism Reference Center. EBSCO . Web. 11 Apr. 2010. Li, Allen

  3. Defense Transportation’s EDI Program: A Security Risk Assessment

    Science.gov (United States)

    1993-05-01

    available when needed. One way to provide proof of system-security procedures is to follow the guide- lines in the Inteinal Management Control Program ( IMCP ...as mandated by the Federal Manager’s Financial Integrity Act (FMFIA). The IMCP prescribes both general and specific standards for maintaining...appropriate internal controls. For 12 example, the IMCP states that control systems shall be properly documented, trans- actions and other significant

  4. Defense Standardization Program Journal. April/June 2011

    Science.gov (United States)

    2011-06-01

    I he system was designed with a standard global positioning systems small serial interface, required (o lisp ilia mil meet MIL-STD-461...Savings related to this effort are on the order ot $14.5 million. lisp ilia mil Standardization has been further advanced by researching part number...from sand erosion lisp illu mil Program News I Navy-led team, for developing a Joint Counter Radio-Controlled Improvised Ex- plosive Device (IED

  5. Schedule-Driven Costs in Major Defense Programs

    Science.gov (United States)

    2012-04-30

    Systems  Army Contracting Command, U.S. Army Materiel Command ^Åèìáëáíáçå=oÉëÉ~êÅÜ=moldo^jW= `êÉ~íáåÖ=póåÉêÖó=Ñçê=fåÑçêãÉÇ=`Ü~åÖÉ= -= ii ...in World War II in the rapid mobilization of the industrial base to provide the number of needed vehicles for the war. On the other hand, programs...and standardized integrated master schedules (IMS) using the principles of the Generally Accepted Scheduling Practices ( GASP ). The guide emphasizes

  6. Privacy Act

    Science.gov (United States)

    Learn about the Privacy Act of 1974, the Electronic Government Act of 2002, the Federal Information Security Management Act, and other information about the Environmental Protection Agency maintains its records.

  7. 数据库驱动认知无线电网络位置隐私的攻击与保护%Attack and defense of location privacy in database-driven cognitive radio networks

    Institute of Scientific and Technical Information of China (English)

    张龙; 高昭瑜; 朱浩瑾; 邢凯

    2014-01-01

    The threats of location privacy leaking in database-driven CRNs are investigated.Two attacks:coverage complement at-tack and channel switch attack are proposed to infer SU’s locations according to their usage of channels without directly learning the query messages.To address the above issues,a novel privacy preserving spectrum querying scheme is devised exploiting the blinding approach.Further,optimization on channel selection is applied to ensure the privacy of SU’s location.In the attack ex-periments with real data,it is shown that the position of SU could be located with high precision.The defense experiments with simulation data verify the effectiveness and efficiency of the proposed privacy preserving schemes.%针对数据库驱动认知无线电网络(cognitive radio networks)存在的位置隐私泄露风险,提出两种攻击方法:覆盖交集攻击和频道切换攻击,可根据二级用户(secondary user,SU)频道使用情况,在不直接获取查询信息中的位置信息的前提下,间接推断SU位置。为应对上述攻击,提出查询信息盲化机制来实现隐私保护的频谱查询,同时对频道选择方案进行优化使得SU能够最大程度地保护自身位置隐私。根据真实数据进行的攻击实验提高了对SU的定位精度,基于模拟数据的隐私保护方案验证实验证明了本文提出的保护方案的有效性和效率。

  8. Concentrated Differential Privacy

    OpenAIRE

    Dwork, Cynthia; Rothblum, Guy N.

    2016-01-01

    We introduce Concentrated Differential Privacy, a relaxation of Differential Privacy enjoying better accuracy than both pure differential privacy and its popular "(epsilon,delta)" relaxation without compromising on cumulative privacy loss over multiple computations.

  9. National Defense: Department of Defense’s Waiver of Competitive Prototyping Requirement for the Navy’s Fleet Replenishment Oiler Program

    Science.gov (United States)

    2014-10-08

    Defense: Department of Defense’s Waiver of Competitive Prototyping Requirement for the Navy’s Fleet Replenishment Oiler Program The Weapon Systems...Department of Defense’s Waiver of Competitive Prototyping Requirement for the Navy’s Fleet Replenishment Oiler Program 5a. CONTRACT NUMBER 5b. GRANT...15, 2014, we received notice from DOD that it had waived the competitive prototyping requirement for the Fleet Replenishment Oiler (T-AO(X)) program

  10. 78 FR 69551 - Privacy Act; Implementation

    Science.gov (United States)

    2013-11-20

    ... of the Secretary 32 CFR Part 319 Privacy Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: Defense Intelligence Agency (DIA) is..., Safety, Health, and Environmental Management Records. This direct final rule makes...

  11. 78 FR 42080 - Privacy Act of 1974; CMS Computer Match No. 2013-07; HHS Computer Match No. 1303; DoD-DMDC Match...

    Science.gov (United States)

    2013-07-15

    ... HUMAN SERVICES Centers for Medicare & Medicaid Services Privacy Act of 1974; CMS Computer Match No. 2013... Services (CMS), Department of Health and Human Services (HHS). ACTION: Notice of Computer Matching Program... announces the establishment of a CMP that CMS plans to conduct with the Department of Defense (DoD),...

  12. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition

    Science.gov (United States)

    2012-07-01

    evidenced in our other case studies. However, with the rapid production and deployment of the vehicles in 2007–2008, the operators began to experience...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...The program sponsors of the Patriot also desired to take advantage of technological innovation and information superiority to enhance overall

  13. Managing the Service Supply Chain in Department of Defense: Implications for the Program Management Infrastructure

    Science.gov (United States)

    2007-04-30

    Supply Chain in Department of Defense: Implications for the Program Management Infrastructure Published: 30 April 2007 by Rene G. Rendon, Lecturer, and Uday Apte, Professor, Naval Postgraduate School 4th Annual Acquisition Research Symposium of the Naval Postgraduate School: Approved for public release, distribution unlimited. Prepared for: Naval Postgraduate School, Monterey, California 93943 Acquisition Research: Creating Synergy for Informed Change May 16-17, 2007 Report Documentation Page Form ApprovedOMB No. 0704-0188

  14. FY 1978 Budget, FY 1979 Authorization Request and FY 1978-1982 Defense Programs,

    Science.gov (United States)

    1977-01-17

    petroleum comes from external sources, and more than 33 percent of that total is imported from the Persian Gulf. We draw on tin from Malaysia , Thailand and...This system, supporting laser-guided, modular glide bombs or a forward- fired weapon such as the Maverick guided missile, will provide improved...program. An additional 900 Shrike antiradiation missiles are being procured for defense suppression tasks. Some 100 laser-guided Maverick ground attack

  15. 78 FR 14286 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN... Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E... Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899...

  16. 75 FR 2114 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-01-14

    ... Service, Corporate Communications and Legislative Liaison, Freedom of Information Act/Privacy Act Program..., Corporate Communications and Legislative Liaison, Freedom of Information Act/Privacy Act Program Manager..., Corporate Communications and Legislative Liaison, Freedom of Information Act/Privacy Act Program...

  17. 78 FR 14285 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ... Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN... Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E... Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899...

  18. 78 FR 41918 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    .../Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN... of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th... Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899...

  19. 77 FR 58106 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-19

    ... Information/Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th Street.../Privacy Act Program Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th Street, Indianapolis, IN.../Privacy Act Program Manager, Corporate Communications, DFAS- ] HKC/IN, 8899 E. 56th Street,...

  20. A self-defense program reduces the incidence of sexual assault in Kenyan adolescent girls.

    Science.gov (United States)

    Sinclair, Jake; Sinclair, Lee; Otieno, Evans; Mulinge, Munyae; Kapphahn, Cynthia; Golden, Neville H

    2013-09-01

    To determine the effect of a standardized 6-week self-defense program on the incidence of sexual assault in adolescent high school girls in an urban slum in Nairobi, Kenya. Population-based survey of 522 high school girls in the Korogocho-Kariobangi locations in Nairobi, Kenya, at baseline and 10 months later. Subjects were assigned by school attended to either a "No Means No Worldwide" self-defense course (eight schools; N = 402) or to a life-skills class (two schools; N = 120). Both the intervention and the life-skills classes were taught in the schools by trained instructors. Participants were administered the same survey at baseline and follow-up. A total of 522 girls (mean age, 16.7 ± 1.5 years; range, 14-21 years) completed surveys at baseline, and 489 at 10-month follow-up. At baseline, 24.5% reported sexual assault in the prior year, with the majority (90%) reporting assault by someone known to them (boyfriend, 52%; relative, 17%; neighbor, 15%; teacher or pastor, 6%). In the self-defense intervention group, the incidence of sexual assault decreased from 24.6% at baseline to 9.2% at follow-up (p < .001), in contrast to the control group, in which the incidence remained unchanged (24.2% at baseline and 23.1% at follow-up; p = .10). Over half the girls in the intervention group reported having used the self-defense skills to avert sexual assault in the year after the training. Rates of disclosure increased in the intervention group, but not in controls. A standardized 6-week self-defense program is effective in reducing the incidence of sexual assault in slum-dwelling high school girls in Nairobi, Kenya. Copyright © 2013 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  1. Advanced research in data privacy

    CERN Document Server

    Torra, Vicenç

    2015-01-01

    This book provides an overview of the research work on data privacy and privacy enhancing technologies carried by the participants of the ARES project. ARES (Advanced Research in Privacy an Security, CSD2007-00004) has been one of the most important research projects funded by the Spanish Government in the fields of computer security and privacy. It is part of the now extinct CONSOLIDER INGENIO 2010 program, a highly competitive program which aimed to advance knowledge and open new research lines among top Spanish research groups. The project started in 2007 and will finish this 2014. Composed by 6 research groups from 6 different institutions, it has gathered an important number of researchers during its lifetime. Among the work produced by the ARES project, one specific work package has been related to privacy. This books gathers works produced by members of the project related to data privacy and privacy enhancing technologies. The presented works not only summarize important research carried in the proje...

  2. 76 FR 42769 - Privacy Act of 1974; Report of Matching Program

    Science.gov (United States)

    2011-07-19

    ... match are the VA system of records, ``Compensation, Pension, Education, and Vocational Rehabilitation... continue a recurring computer program matching Internal Revenue Service (IRS) records with VA pension and... match records of veterans, surviving spouses and children who receive pension, and parents who...

  3. Security Vs. Liberty: How to Measure Privacy Costs in Domestic Surveillance Programs

    Science.gov (United States)

    2014-03-01

    online retailers . . . . I for one doubt that people would accept without complaint the warrantless disclosure to the Government of a list of every...5 D. PROBLEMS AND HYPOTHESES ...............................................................7 E . METHODS AND SOURCES...NSA: SHAMROCK .................................................................14 e . FBI: Counterintelligence Program

  4. Survey of Laboratories and Implementation of the Federal Defense Laboratory Diversification Program

    Science.gov (United States)

    1994-02-01

    Defense Technology Transfer Working Group AGENCY...Director, Defense Research and Engineering. ACTION: solicitation in inputs for defense technology transfer . The Defense Technology Transfer Working...DAILY, 2.3 July 1993 Detense Nuclear Agency, 6801 Telegraph Road, Alexandria,, VA 22310D-3398 A - SOURCES SOUGHT FOR INPUTS FOR DEFENSE TECHNOLOGY TRANSFER

  5. 76 FR 20341 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-04-12

    ... Liaison Officer, Department of Defense. S190.24 System name: Biography File (May 26, 2009, 74 FR 24831....24 System name: Biography File. System location: Headquarters, Defense Logistics Agency (DLA), Public... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency,...

  6. 75 FR 28242 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-20

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system...: Federal Docket Management System Office, 1160 Defense Pentagon, Washington, DC 20301-1160....

  7. 75 FR 10473 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-03-08

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency proposes to amend a...: Federal Docket Management System Office, 1160 Defense Pentagon, Washington, DC 20301-1160....

  8. 76 FR 72691 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-11-25

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, Department of Defense (DoD). ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency... submitting comments. Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower,...

  9. 75 FR 17910 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-04-08

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Logistics Agency proposes to delete a...: Federal Docket Management System Office, 1160 Defense Pentagon, Washington, DC 20301-1160....

  10. 76 FR 65185 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-10-20

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, Department of Defense. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is... submitting comments. * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower,...

  11. 75 FR 48655 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-08-11

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system.... Mail: Federal Docket Management System Office, Room 3C843 Pentagon, 1160 Defense Pentagon,...

  12. 76 FR 12076 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-03-04

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system... instructions for submitting comments. * Mail: Federal Docket Management System Office, 1160 Defense...

  13. 75 FR 6000 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2010-02-05

    ... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Logistics Agency proposes to delete a...: Federal Docket Management System Office, 1160 Defense Pentagon, Washington, DC 20301-1160....

  14. 78 FR 22525 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-16

    ..., or by phone at (703)767-5045. SUPPLEMENTARY INFORMATION: The Defense Logistics Agency's system of... replace with ``Defense Logistics Agency Human Resources, Labor and Employee Relations Policy, 8725 John J... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD....

  15. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid

  16. Privacy transparency patterns

    NARCIS (Netherlands)

    Siljee B.I.J.

    2015-01-01

    This paper describes two privacy patterns for creating privacy transparency: the Personal Data Table pattern and the Privacy Policy Icons pattern, as well as a full overview of privacy transparency patterns. It is a first step in creating a full set of privacy design patterns, which will aid softwar

  17. From Data Privacy to Location Privacy

    Science.gov (United States)

    Wang, Ting; Liu, Ling

    Over the past decade, the research on data privacy has achieved considerable advancement in the following two aspects: First, a variety of privacy threat models and privacy principles have been proposed, aiming at providing sufficient protection against different types of inference attacks; Second, a plethora of algorithms and methods have been developed to implement the proposed privacy principles, while attempting to optimize the utility of the resulting data. The first part of the chapter presents an overview of data privacy research by taking a close examination at the achievements from the above two aspects, with the objective of pinpointing individual research efforts on the grand map of data privacy protection. As a special form of data privacy, location privacy possesses its unique characteristics. In the second part of the chapter, we examine the research challenges and opportunities of location privacy protection, in a perspective analogous to data privacy. Our discussion attempts to answer the following three questions: (1) Is it sufficient to apply the data privacy models and algorithms developed to date for protecting location privacy? (2) What is the current state of the research on location privacy? (3) What are the open issues and technical challenges that demand further investigation? Through answering these questions, we intend to provide a comprehensive review of the state of the art in location privacy research.

  18. Common Privacy Myths

    Science.gov (United States)

    ... Health Information home > privacy + phrs > common privacy myths Common Privacy Myths With the new federal laws protecting ... Here are the truths to some of the common myths: Health information cannot be faxed – FALSE Your ...

  19. Effects of Department of Defense Instruction 5000.02 on Joint Program Executive Office Chemical Biological Defense (JPEO-CBD) Effectiveness

    Science.gov (United States)

    2016-09-01

    Table 6 (continued) LRIP Quantity 2015 X X 2008 X Market Research 2015 X X X 2008 X X OTA Report of OT&E Results...JOINT PROGRAM EXECUTIVE OFFICE – CHEMICAL BIOLOGICAL DEFENSE (JPEO-CBD) EFFECTIVENESS September 2016 By: Emily C. Whaley Advisors...Michael Boudreau Kate Ong Approved for public release. Distribution is unlimited. THIS PAGE INTENTIONALLY LEFT BLANK i REPORT DOCUMENTATION PAGE

  20. 75 FR 35847 - Privacy Act of 1974, Computer Matching Program-U.S. Small Business Administration and U.S...

    Science.gov (United States)

    2010-06-23

    ... Case Files (April 1, 2009, 74 FR 14911) system of records. SBA uses its Disaster Credit Management... Credit Management System (DCMS), to the records extracted and provided by DHS/FEMA from its DHS/FEMA 008... Business Administration Disaster Credit Management System Privacy Impact Assessment and Small...

  1. 75 FR 18251 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Internal Revenue Service (IRS...

    Science.gov (United States)

    2010-04-09

    ... the Privacy Act, as amended. ] Dated: March 31, 2010. Michael G. Gallagher, Deputy Commissioner for... File) system of records, SSA/ORSIS 60-0321, originally published at 69 FR 77816 (December 28, 2004), and as revised at 71 FR 42159 (July 25, 2006). IRS extracts return information with respect...

  2. 78 FR 73195 - Privacy Act of 1974: CMS Computer Matching Program Match No. 2013-01; HHS Computer Matching...

    Science.gov (United States)

    2013-12-05

    ... HUMAN SERVICES Centers for Medicare & Medicaid Services Privacy Act of 1974: CMS Computer Matching... & Medicaid Services (CMS), Department of Health and Human Services (HHS). ACTION: Notice of Computer Matching... amended, this notice announces the renewal of a CMP that CMS plans to conduct with the Purchased Care...

  3. Catalase prevents maternal diabetes-induced perinatal programming via the Nrf2-HO-1 defense system.

    Science.gov (United States)

    Chang, Shiao-Ying; Chen, Yun-Wen; Zhao, Xin-Ping; Chenier, Isabelle; Tran, Stella; Sauvé, Alexandre; Ingelfinger, Julie R; Zhang, Shao-Ling

    2012-10-01

    We investigated whether overexpression of catalase (CAT) in renal proximal tubular cells (RPTCs) could prevent the programming of hypertension and kidney disease in the offspring of dams with maternal diabetes. Male offspring of nondiabetic and diabetic dams from two transgenic (Tg) lines (Hoxb7-green fluorescent protein [GFP]-Tg [controls] and Hoxb7/CAT-GFP-Tg, which overexpress CAT in RPTCs) were studied from the prenatal period into adulthood. Nephrogenesis, systolic blood pressure, renal hyperfiltration, kidney injury, and reactive oxygen species (ROS) generation were assessed. Gene expression of transforming growth factor-β1 (TGF-β1), nuclear factor erythroid 2p45-related factor-2 (Nrf2), and heme oxygenase-1 (HO-1) was tested in both in vitro and in vivo studies. Renal dysmorphogenesis was observed in offspring of Hoxb7-GFP-Tg dams with severe maternal diabetes; the affected male offspring displayed higher renal ROS generation and developed hypertension and renal hyperfiltration as well as renal injury with heightened TGF-β1 expression in adulthood. These changes were ameliorated in male offspring of diabetic Hoxb7/CAT-GFP-Tg dams via the Nrf2-HO-1 defense system. CAT promoted Nrf2 nuclear translocation and HO-1 gene expression, seen in both in vitro and in vivo studies. In conclusion, CAT overexpression in the RPTCs ameliorated maternal diabetes-induced perinatal programming, mediated, at least in part, by triggering the Nrf2-HO-1 defense system.

  4. Semantic Security: Privacy Definitions Revisited

    OpenAIRE

    Jinfei Liu; Li Xiong; Jun Luo

    2013-01-01

    In this paper we illustrate a privacy framework named Indistinguishabley Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party computation. We introduce three representative privacy notions in the literature, Bayes-optimal privacy for privacy preserving data publishing, differential privacy for statistical data release, and privacy w.r.t. semi-honest behavior in the secure...

  5. Just in Time Research: Privacy Practices

    Science.gov (United States)

    Grama, Joanna Lyn

    2014-01-01

    The January 2014 edition of the ECAR Update subscriber newsletter included an informal poll on information privacy practices. The poll was intended to collect a quick snapshot of the higher education community's thoughts on this important topic during Data Privacy Month. Results of the poll will be used to inform EDUCAUSE research, programs,…

  6. 78 FR 66803 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-06

    ... AFFAIRS Privacy Act of 1974; System of Records AGENCY: Department of Veterans Affairs (VA). ACTION: Notice of Amendment to System of Records. SUMMARY: As required by the Privacy Act of 1974, 5 U.S.C. 552a(e... systems or programs. The Privacy Act permits VA to disclose information about individuals without...

  7. Overview of the Defense Programs Research and Technology Development Program for Fiscal Year 1993

    Energy Technology Data Exchange (ETDEWEB)

    1993-09-30

    This documents presents a programmatic overview and program element plan summaries for conceptual design and assessment; physics; computation and modeling; system engineering science and technology; electronics, photonics, sensors, and mechanical components; chemistry and materials; special nuclear materials, tritium, and explosives.

  8. Building Partner Capacity: DOD Should Improve Its Reporting to Congress on Challenges to Expanding Ministry of Defense Advisors Program

    Science.gov (United States)

    2015-02-11

    Ministry of Defense Advisors ( MODA ) program more slowly than planned. It had 2 advisors in the field in Kosovo and Montenegro for most of fiscal year...approval process and with advisor recruitment and training. DOD has met most but not all legislative requirements for the MODA program. As required by...of each Global MODA deployment, which could help Congress assess the value of the program in relation to other capacity-building efforts (see figure

  9. Privacy og selvbeskrivelse

    DEFF Research Database (Denmark)

    Rosengaard, Hans Ulrik

    2015-01-01

    En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse......En beskrivelse af feltet for forskning i Privacy med særligt henblik på privacys betydning for muligheden for at styre sin egen selvbeskrivelse...

  10. Privacy vs security

    CERN Document Server

    Stalla-Bourdillon, Sophie; Ryan, Mark D

    2014-01-01

    Securing privacy in the current environment is one of the great challenges of today's democracies. Privacy vs. Security explores the issues of privacy and security and their complicated interplay, from a legal and a technical point of view. Sophie Stalla-Bourdillon provides a thorough account of the legal underpinnings of the European approach to privacy and examines their implementation through privacy, data protection and data retention laws. Joshua Philips and Mark D. Ryan focus on the technological aspects of privacy, in particular, on today's attacks on privacy by the simple use of today'

  11. A Bacterial Inhibitor of Host Programmed Cell Death Defenses is an E3 Ubiquitin Ligase

    Energy Technology Data Exchange (ETDEWEB)

    Janjusevic,R.; Abramovitch, R.; Martin, G.; Stebbins, C.

    2005-01-01

    The Pseudomonas syringae protein AvrPtoB is translocated into plant cells, where it inhibits immunity-associated programmed cell death (PCD). The structure of a C-terminal domain of AvrPtoB that is essential for anti-PCD activity reveals an unexpected homology to the U-box and RING-finger components of eukaryotic E3 ubiquitin ligases, and we show that AvrPtoB has ubiquitin ligase activity. Mutation of conserved residues involved in the binding of E2 ubiquitin-conjugating enzymes abolishes this activity in vitro, as well as anti-PCD activity in tomato leaves, which dramatically decreases virulence. These results show that Pseudomonas syringae uses a mimic of host E3 ubiquitin ligases to inactivate plant defenses.

  12. Trends in Nunn-McCurdy Cost Breaches for Major Defense Acquisition Programs

    Science.gov (United States)

    2011-03-09

    Demilitarization - Chemical Materials Agency Bechtel National Inc., Westinghouse, Washington Demil Co., EG&G Defense Materials, Parsons Infra...Engineers & Construction, Raytheon Demil Company, Bechtel National, Inc., EG&G Defense Materials Comanche Reconnaissance Attack Helicopter Boeing

  13. 77 FR 22326 - Privacy Act of 1974, as Amended by Public Law 100-503; Notice of a Computer Matching Program

    Science.gov (United States)

    2012-04-13

    ... HUMAN SERVICES Administration for Children and Families Privacy Act of 1974, as Amended by Public Law... 1974, as amended by Public Law 100-503. SUMMARY: In compliance with the Privacy Act of 1974, as amended by Public Law 100-503, the Computer Matching and Privacy Protection Act of 1988, ACF is publishing...

  14. Predicting Schedule Duration for Defense Acquisition Programs: Program Initiation to Initial Operational Capability

    Science.gov (United States)

    2016-03-24

    65  x Figure 22: Pie Chart of Standard Betas ... Corporation found that increases in schedule effort tend to be the reason for increases in the cost of acquiring a new weapons system due to, at a minimum...in-depth finance and schedule data for selected programs (Brown et al., 2015). We also give extra focus on Research Development Test & Evaluation

  15. Defense Infrastructure: Continuing Challenges in Managing DOD Lodging Programs as Army Moves to Privatize Its Program

    Science.gov (United States)

    2006-12-01

    4) develop and manage the lodging facilities, (5) assure sound financial management and accountability reflective of the hospitality industry , and...reflective of the hospitality industry , and (6) pursue efficiencies through interservice cooperative efforts. The DOD Lodging Program Standards task...goals. DOD lodging officials with work experience in private hotels told us that it is a common practice in the hospitality industry to use benchmarks

  16. Microfiche/Telex Oriented Document Services Center Established in Sylvania Library Through Cooperative Test Program with Defense Documentation Center.

    Science.gov (United States)

    Little, Dean K.

    In a cooperative program with Defense Documentation Center Headquarters, Sylvania arranged for procurement of 70,000 unclassified-unlimited documents without DDC Form I cards and 30,000 unclassified-limited and classified documents with Form I's. This was done in order to overcome effects of an in-house documents inventory/selective destruction…

  17. Program Manager: Journal of the Defense Systems Management College. Volume 22, Number 3, May-June 1993

    Science.gov (United States)

    1993-06-01

    lr __________ r onM eth S()4 Greg Caruth _________________ William J. Perry, Typography and Design DEPSECDEF 43 Paula Croisetlere 3 Program Manager...the DSMC Press to be such a link to the govern- for publication consideration in either the brand ment and private sector defense acquisition com- new

  18. 77 FR 21976 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-04-12

    ... (March 18, 2010, 75 FR 13089) Changes: * * * * * System name: Delete entry and replace with ``DIA Military Recognition and Awards Files.'' System location: Delete entry and replace with ``Defense... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency,...

  19. 78 FR 65976 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-04

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to add a new System of Records. SUMMARY: The Defense Logistics Agency proposes to add a new system.... * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor,...

  20. 77 FR 26261 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Defense Logistics Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Logistics Agency proposes... Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor, Suite 02G09, Alexandria, VA...

  1. 77 FR 21755 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-04-11

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a system of records. SUMMARY: The Defense Logistics Agency is proposing to amend a system... the instructions for submitting comments. Mail: Federal Docket Management System Office, 4800...

  2. 78 FR 22854 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-04-17

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Logistics Agency proposes to alter a system of...: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor, Suite...

  3. 76 FR 76149 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2011-12-06

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to Amend a System of Records. SUMMARY: The Defense Logistics Agency is proposing to amend a system.... * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor,...

  4. 78 FR 17386 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-21

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to alter a System of Records. SUMMARY: The Defense Logistics Agency proposes to alter a system of...: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor, Suite...

  5. 77 FR 26260 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to alter a system of records. SUMMARY: The Defense Logistics Agency proposes to alter a system of... the instructions for submitting comments. * Mail: Federal Docket Management System Office, 4800...

  6. 77 FR 3238 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-01-23

    ...-0008] Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice To Amend a System of Records. SUMMARY: The Defense Logistics Agency is proposing to amend a system of... the instructions for submitting comments. * Mail: Federal Docket Management System Office, 4800...

  7. 78 FR 6078 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-29

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to delete a System of Records. SUMMARY: The Defense Logistics Agency is deleting a system of.... * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor,...

  8. 78 FR 17385 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-21

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Logistics Agency, DoD. ACTION: Notice to amend a System of Records. SUMMARY: The Defense Logistics Agency is amending a system of.... * Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd Floor,...

  9. 77 FR 21975 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-04-12

    ... counterintelligence personnel who conduct or support strategic intelligence interrogations. Categories of Records in... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency, DoD. ACTION: Notice to add a system of records. SUMMARY: The Defense Intelligence Agency is proposing to add...

  10. 78 FR 69392 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-11-19

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Finance and Accounting Service is deleting a system of records notices in its existing inventory of record systems subject to...

  11. 78 FR 27194 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-09

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete two Systems of Records. SUMMARY: The Defense Finance and Accounting Service is deleting two systems of records notices in its existing inventory of record systems subject...

  12. 78 FR 6078 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-01-29

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete a system of records. SUMMARY: The Defense Finance and Accounting Service is deleting a system of records notice in its existing inventory of record systems subject to...

  13. 77 FR 60400 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-03

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service. ACTION: Notice to delete two systems of records. SUMMARY: The Defense Finance and Accounting Service is deleting two systems of records notices in its existing inventory of record systems subject...

  14. 78 FR 27195 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-09

    ... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete two Systems of Records. SUMMARY: The Defense Finance and Accounting Service is deleting two systems of records notices in its existing inventory of record systems subject...

  15. 77 FR 65370 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-26

    ... Office of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Finance and Accounting Service, DoD. ACTION: Notice to delete a Systems of Records. SUMMARY: The Defense Finance and Accounting Service is deleting a system of records notice in its existing inventory of record systems subject to...

  16. The DoD Manufacturing Technology Program Strategic Plan: Delivering Defense Affordability

    Science.gov (United States)

    2009-03-01

    laboratories and RDECs to RDECOM SOSI. The first level of review for ATO-Ms is the Warfighter Technical Council ( WTC ). The WTC is a one-star level body that...and cost. Tracked efforts: this category consists of smaller stand-alone ManTech projects. Typically, the WTC approves tracked efforts...National Defense Authorization Act NDE non- destructive examination NDIA National Defense Industrial Association NDS National Defense Strategy Net

  17. 77 FR 8837 - Termination of the Department of Defense Web-Based TRICARE Assistance Program Demonstration

    Science.gov (United States)

    2012-02-15

    ... family difficulties and pressures, crisis intervention, anxiety, self-esteem, loneliness, and critical... Demonstration AGENCY: Department of Defense, DoD. ACTION: Notice of demonstration termination. SUMMARY:...

  18. THE PLANNING, PROGRAMING, BUDGETING SYSTEM AND ITS IMPLEMENTATION IN THE SERBIAN MINISTRY OF DEFENSE

    Directory of Open Access Journals (Sweden)

    Sasa RADUSKI

    2010-01-01

    Full Text Available The main purpose of introducing the PPBES to the Serbian Ministry of Defense and the Serbian Armed Forces is to provide a rational management of resources and to maintain and build capacity of the Ministry and the Serbian Armed Forces in order to achieve their goals, objectives and missions.Expected results of implementation of the PPBES are reflected in increasing the efficiency and rationalization of the defense planning to a higher level, ensuring compatibility with defense planning and budgeting system of the state and developing a foundation for the effective management of defense resources.

  19. 78 FR 47309 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-05

    .../Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN.../Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN... Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN...

  20. Defense Small Business Innovation Research Program (SBIR). Volume 4. Defense Agencies Abstracts of Phase 1 Awards 1987.

    Science.gov (United States)

    1988-04-01

    CHANNEL) . THE -0 SMALL BUSINESS INNOVATION RESEARCH ( SBR ) PROGRAM - PHASE I PAGE 628 0 BY SERVICE FISCAL YEAR 1987 DNA SJBMTTFD BY NATURE OF THE...OXYGEN CONTAMINATION. THEIR HIGH PYROLYSIS TEMPERATURES CAUSE PROBLEMS SUCH AS INABILITY TO CONTROL THE AS/P RATIO IN ALLOYS CONTAINING BOTH ELEMENTS...LUBRICITY. GRAPHITE FIBER GROWN FROM PYROLYSIS OF HYDROCARBON GAS, WHICH IS THEN PROCESSED TO YIELD USEFUL VALUES FOR ELECTRICAL CONDUCTIVITY, IS A MATERIAL

  1. 32 CFR Appendix M to Part 275 - Format for Certificate of Compliance With the Right to Financial Privacy Act of 1978

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Format for Certificate of Compliance With the Right to Financial Privacy Act of 1978 M Appendix M to Part 275 National Defense Department of Defense... INSTITUTIONS: RIGHT TO FINANCIAL PRIVACY ACT OF 1978 Pt. 275, App. M Appendix M to Part 275—Format...

  2. A typology of privacy

    NARCIS (Netherlands)

    Koops, Bert Jaap; Newell, Bryce; Timan, Tjerk; Skorvánek, Ivan; Chokrevski, Tomislav; Galič, Maša

    2017-01-01

    Despite the difficulty of capturing the nature and boundaries of privacy, it is important to conceptualize it. Some scholars develop unitary theories of privacy in the form of a unified conceptual core; others offer classifications of privacy that make meaningful distinctions between different types

  3. Privacy and Social Interaction

    NARCIS (Netherlands)

    B. Roessler; D. Mokrosinska

    2013-01-01

    This article joins in and extends the contemporary debate on the right to privacy. We bring together two strands of the contemporary discourse on privacy. While we endorse the prevailing claim that norms of informational privacy protect the autonomy of individual subjects, we supplement it with an a

  4. Department of Defense Small Business (SB) Program: A Knowledge-Level Analysis of How Customer Education Relates to Meeting SB Goals

    Science.gov (United States)

    2014-12-01

    7 B. SMALL BUSINESS PROGRAM OVERVIEW ...........................................7 1. Women -Owned Small ...of Defense DSB Director of Small Business DTRA Defense Threat Reduction Agency EDWOSB economically disadvantaged women -owned small businesses EO...USTRANSCOM U.S. Transportation Command VOSB veteran-owned small business WMD weapons of mass destruction WOSB women -owned small business xiv

  5. Knockout of Arabidopsis accelerated-cell-death11 encoding a sphingosine transfer protein causes activation of programmed cell death and defense

    DEFF Research Database (Denmark)

    Brodersen, Peter; Petersen, Morten; Pike, Helen M

    2002-01-01

    by avirulent pathogens. Global transcriptional changes during programmed cell death (PCD) and defense activation in acd11 were monitored by cDNA microarray hybridization. The PCD and defense pathways activated in acd11 are salicylic acid (SA) dependent, but do not require intact jasmonic acid or ethylene...

  6. Privacy encounters in Teledialogue

    DEFF Research Database (Denmark)

    Andersen, Lars Bo; Bøge, Ask Risom; Danholt, Peter

    2016-01-01

    Privacy is a major concern when new technologies are introduced between public authorities and private citizens. What is meant by privacy, however, is often unclear and contested. Accordingly, this article utilises grounded theory to study privacy empirically in the research and design project...... Teledialogue aimed at introducing new ways for public case managers and placed children to communicate through IT. The resulting argument is that privacy can be understood as an encounter, that is, as something that arises between implicated actors and entails some degree of friction and negotiation....... An argument which is further qualified through the philosophy of Gilles Deleuze. The article opens with a review of privacy literature before continuing to present privacy as an encounter with five different foci: what technologies bring into the encounter; who is related to privacy by implication; what...

  7. The Defense Threat Reduction Agency's Technical Nuclear Forensics Research and Development Program

    Science.gov (United States)

    Franks, J.

    2015-12-01

    The Defense Threat Reduction Agency (DTRA) Technical Nuclear Forensics (TNF) Research and Development (R&D) Program's overarching goal is to design, develop, demonstrate, and transition advanced technologies and methodologies that improve the interagency operational capability to provide forensics conclusions after the detonation of a nuclear device. This goal is attained through the execution of three focus areas covering the span of the TNF process to enable strategic decision-making (attribution): Nuclear Forensic Materials Exploitation - Development of targeted technologies, methodologies and tools enabling the timely collection, analysis and interpretation of detonation materials.Prompt Nuclear Effects Exploitation - Improve ground-based capabilities to collect prompt nuclear device outputs and effects data for rapid, complementary and corroborative information.Nuclear Forensics Device Characterization - Development of a validated and verified capability to reverse model a nuclear device with high confidence from observables (e.g., prompt diagnostics, sample analysis, etc.) seen after an attack. This presentation will outline DTRA's TNF R&D strategy and current investments, with efforts focusing on: (1) introducing new technical data collection capabilities (e.g., ground-based prompt diagnostics sensor systems; innovative debris collection and analysis); (2) developing new TNF process paradigms and concepts of operations to decrease timelines and uncertainties, and increase results confidence; (3) enhanced validation and verification (V&V) of capabilities through technology evaluations and demonstrations; and (4) updated weapon output predictions to account for the modern threat environment. A key challenge to expanding these efforts to a global capability is the need for increased post-detonation TNF international cooperation, collaboration and peer reviews.

  8. Defense AR Journal. Issue 56, Volume 17, Number 4. Measuring Programs and Progress

    Science.gov (United States)

    2010-10-01

    DEFENSE ACQUISITION REVIEW JOURNAL October 2010 Vol. 17 No. 4 | ISSUE 56 508 THE P-51 MUSTANG: A CASE STUDY IN DEFENSE ACQUISITION Alan Haggerty and Roy...time and money by exploring new test and analyses methods to assess aeromedical equipment for safety certification. The final article by Alan ...Fasanella, Tabiei, Brinkley , and Shemwell (2008) studied a crash test dummy model for NASA’s Orion crew module landings using FEA. Viisoreanu, Rutman, and

  9. Influences on the Timing and Frequency of Cancellations and Truncations of Major Defense Acquisition Programs

    Science.gov (United States)

    2017-03-01

    TPP) when it was judged to be practicable and, when not, a Fixed Price Incentive Fee (FPIF) or Cost Plus Incentive Fee (CPIF) contract. By 1966...left off, he ruled out the use of TPP and discouraged the use of FPIF for development contracts in favor of CPIF. ( Cost Plus Award Fee may not have...CPIF Cost Plus Incentive Fee CY Calendar Year DAB Defense Acquisition Board DAMIR Defense Acquisition Management Information Retrieval DCP

  10. Patriot/Medium Extended Air Defense System Combined Aggregate Program (Patriot/MEADS CAP)

    Science.gov (United States)

    2013-12-01

    FUE - First Unit Equipped IOT &E - Initial Operational Test and Evaluation Missile Milestones SAR Baseline Dev Est Current APB Development...Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense Switched Network Econ...Milestone c FUE IOT &E Start Complete Full Rate Production Deci... AcQuisition Increment 2 Milestone C Lightweight Launcher FUE IOT &E Start

  11. Program Manager: Journal of the Defense Systems Management College. Volume 19. Number 3

    Science.gov (United States)

    1990-06-01

    years. Fayol , Henri . General and Industrial Seatl, Washin"tn. He isa 1989groduate The current effort-the Defense Management. Toronto, Canada: Sir of...Institute, noted and Acquisition Costs," (Abellera); General Charles Henry , USA; and there are many congressional "Exchange Rates and Product Cost," Major...has been a Defense Systems Management College tions. Each Service has professional deterioration since 1986. The crucial were Mr. Henry Alberts, Dr

  12. Evaluating the privacy properties of telephone metadata

    OpenAIRE

    2016-01-01

    Privacy protections against government surveillance are often scoped to communications content and exclude communications metadata. In the United States, the National Security Agency operated a particularly controversial program, collecting bulk telephone metadata nationwide. We investigate the privacy properties of telephone metadata to assess the impact of policies that distinguish between content and metadata. We find that telephone metadata is densely interconnected, can trivially be reid...

  13. 75 FR 63703 - Privacy Act of 1974; Privacy Act Regulation

    Science.gov (United States)

    2010-10-18

    ... CFR Part 261a Privacy Act of 1974; Privacy Act Regulation AGENCY: Board of Governors of the Federal...) is issuing a final rule to amend its regulation implementing the Privacy Act of 1974 (Privacy Act..., and applicants for Board employment, for access to their records under the Privacy Act; the amendment...

  14. Choose Privacy Week: Educate Your Students (and Yourself) about Privacy

    Science.gov (United States)

    Adams, Helen R.

    2016-01-01

    The purpose of "Choose Privacy Week" is to encourage a national conversation to raise awareness of the growing threats to personal privacy online and in day-to-day life. The 2016 Choose Privacy Week theme is "respecting individuals' privacy," with an emphasis on minors' privacy. A plethora of issues relating to minors' privacy…

  15. 78 FR 41919 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150 or at... Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E..., Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E....

  16. 78 FR 41916 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ... Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150 or at..., Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th.../Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis,...

  17. 77 FR 69444 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-11-19

    ... Manager, Corporate Communications, DFAS-HKC/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150 or at... Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E... Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th...

  18. 78 FR 52518 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-08-23

    ... Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate Communications, DFAS-ZCF/IN..., Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150.'' * * * * * BILLING... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager,...

  19. 76 FR 75603 - Family Educational Rights and Privacy

    Science.gov (United States)

    2011-12-02

    ... privacy. Protecting student privacy helps achieve a number of important goals, including avoiding... adopted in these final regulations provide clarification on many important issues that have arisen over... School Breakfast Programs (School Meals Programs or SMPs) in connection with an audit or evaluation...

  20. Participatory Privacy: Enabling Privacy in Participatory Sensing

    CERN Document Server

    De Cristofaro, Emiliano

    2012-01-01

    Participatory Sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensor-equipped devices, e.g., to monitor temperature, pollution level or consumer pricing information. While research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not participate. In this article, we focus on privacy protection in Participatory Sensing and introduce a suitable privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers (i.e., users providing sensed information) and consumers (i.e., applications accessing the data). Then, we propose an efficient solution designed for mobile phone users, which incurs very low overhead. Finally, we di...

  1. Contributions of the Department of Defense Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Programs to Training and Education: FY1999-FY2004

    Science.gov (United States)

    2006-01-01

    allows visual tracking, free-floating Magnetic Levitation ( Maglev ) haptic feedback with real surgical tools and sce- nario-based training that can be...Defense Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Programs to Training and Education: FY1999–FY2004 J.D...Department of Defense Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) Programs to Training and Education: FY1999

  2. Privacy, Democracy and Surveillance

    OpenAIRE

    Lever, Annabelle

    2013-01-01

    How should we think about our claims to privacy and their relationship to security? Must we suppose that privacy should give way before the demands of security whenever the two cannot both be fully protected? This is the position presented by Sir David Omand on numerous occasions and, most recently, in his response to the revelations of Edward Snowden. However, this article shows, Omand's reasoning and conclusions are both problematic, as the protection of privacy is necessary to a democratic...

  3. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  4. Practical Privacy Assessment

    DEFF Research Database (Denmark)

    Peen, Søren; Jansen, Thejs Willem; Jensen, Christian D.

    2008-01-01

    This chapter proposes a privacy assessment model called the Operational Privacy Assessment Model that includes organizational, operational and technical factors for the protection of personal data stored in an IT system. The factors can be evaluated in a simple scale so that not only the resulting...... graphical depiction can be easily created for an IT system, but graphical comparisons across multiple IT systems are also possible. Examples of factors presented in a Kiviat graph are also presented. This assessment tool may be used to standardize privacy assessment criteria, making it less painful...... for the management to assess privacy risks on their systems....

  5. Program Management at the National Nuclear Security Administration Office of Defense Nuclear Security: A Review of Program Management Documents and Underlying Processes

    Energy Technology Data Exchange (ETDEWEB)

    Madden, Michael S.

    2010-05-01

    The scope of this paper is to review the National Nuclear Security Administration Office of Defense Nuclear Security (DNS) program management documents and to examine the underlying processes. The purpose is to identify recommendations for improvement and to influence the rewrite of the DNS Program Management Plan (PMP) and the documentation supporting it. As a part of this process, over 40 documents required by DNS or its stakeholders were reviewed. In addition, approximately 12 other documents produced outside of DNS and its stakeholders were reviewed in an effort to identify best practices. The complete list of documents reviewed is provided as an attachment to this paper.

  6. Defense Data Network/TOPS-20 Tutorial. An Interative Computer Program.

    Science.gov (United States)

    1985-12-01

    GRUP SB-GOUP Defense Data Network, DDN, TOPS-20, computer FIEL GRUP SB-GOUP networking. 19 ABSTRACT (Continue on roverse if necessary and identify by...switching network dedicated to meeting the data communica- tion requirements of the DoD. The network is subdivided into " two functional areas: (1) the

  7. Joint Program Executive Office for Chemical and Biological Defense Collaboration Study

    Science.gov (United States)

    2011-03-01

    87 14. SUBJECT TERMS Technology Transition, Collaboration, Organizational Design Components, Chemical Biological Defense 16. PRICE CODE 17...Biological Medical Systems (JPM CBMS) JPM CBMS centrally manages and employs government and commercial pharmaceutical development best practices to oversee...none have been previously done on technology transfer and collaboration. Professor Sazali Wahab et al. of Universiti Putra Malaysia examined the

  8. Program Manager: Journal of the Defense Management College. Volume 16, Number 5, September-October 1987,

    Science.gov (United States)

    1987-10-01

    Defense Systems Knowledge of civilian and military engineering or Management .- , current DOD segments of DOD engineering College production/ improve... markt ur h’elin isthat pric gstrategy i -a fit a rc "-js Iten pt,turt he h firm can take m, le tnliuenCTd hv financial con ’tagc. Since executives

  9. Joint Program Executive Office for Chemical and Biological Defense Strategic Plan FY13-18

    Science.gov (United States)

    2012-06-01

    strategy calls for a global Biosurveillance network for timely disease surveillance of biological pathogens whether intentionally made or naturally... Biosurveillance . The President and Secretary of Defense provided renewed emphasis on rapidly and efficiently developing and manufacturing effective medical... Biosurveillance . Our ability to obtain early warning about the deliberate use or natural emergence of dangerous pathogens hinges upon the

  10. 76 FR 38048 - Defense Federal Acquisition Regulation Supplement; Pilot Program for Acquisition of Military...

    Science.gov (United States)

    2011-06-29

    .... E-mail: dfars@osd.mil . Include DFARS Case 2011-D034 in the subject line of the message. Fax: 703... preceding the solicitation of sources by DoD for the procurement or transaction, any of the following for Do... least the one- year period preceding the solicitation of sources by the Department of Defense for...

  11. Program Manager: Journal of the Defense Management College, Volume 23 Number 4, July-August 1994

    Science.gov (United States)

    1994-08-01

    Caruth Typography and Design Paula Croisetiere P’rograim Ma1nager (ISSN OtQY-7t 14) is Published bimonthly by the Defense Systems EQ 0 Management College...provides a standard black-and-white cover without illustrations showing the title, author, TR number and DSMC logo and similar title page. -The TRs

  12. Defense Transuranic Waste Program. Transuranic waste transportation assessment and guidance report

    Energy Technology Data Exchange (ETDEWEB)

    1985-08-01

    The Transportation Assessment and Guidance Report (TAGR) is designed to provide DOE-managed defense sites with guidance and citable analyses addressing National Environmental Policy Act (NEPA) requirements for qualifying and transporting transuranic (TRU) wastes to the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico.

  13. Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress

    Science.gov (United States)

    2016-10-25

    developments in Australia, Japan , and South Korea. 93 Justin Doubleday, “MDA Looking to Integrate European Allies into Missile Defense Architecture ...12 Japan ................................................................................................................................. 12 Other...building, or are planning to build Aegis-equipped ships include Japan , South Korea, Australia, Spain, and Norway.2 Aegis BMD System3 Aegis ships

  14. 78 FR 43868 - Privacy Act of 1974; System of Records; Correction

    Science.gov (United States)

    2013-07-22

    ... and Civil Liberties Web site at http://dpclo.defense.gov/privacy/SORNs/component/ngia/index.html . The... related to investigations, criminal activity or evidence of waste, fraud and abuse.'' * * * * * BILLING...

  15. Standing Up a Narcotic Confirmation Laboratory for the Russian Federation Ministry of Defense Nuclear Personnel Reliability Program

    Energy Technology Data Exchange (ETDEWEB)

    LukyanenkoMD, Victor [Russian Federation Ministry of Defense; Eisele, Gerhard R [ORNL; Coates, Cameron W [ORNL

    2010-01-01

    Through a cooperative effort between the U. S. Department of Energy and the Russian Federation (RF) Ministry of Defense (MOD) a Personnel Reliability Program (PRP) for the nuclear handlers within the RF MOD has been implemented. A key element in the RF MOD PRP is the detection and confirmation of narcotic use in subject military and civilian personnel. This paper describes the process of narcotics screening and testing in the RF MOD and explains the confirmation process once screening has shown a positive result. Issues of laboratory certification, employee certification, employee training, sample chain-of-custody, and equipment needs will be addressed.

  16. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  17. Privacy and Publicity

    DEFF Research Database (Denmark)

    2013-01-01

    An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy......An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy...

  18. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  19. Information Privacy Revealed

    Science.gov (United States)

    Lavagnino, Merri Beth

    2013-01-01

    Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…

  20. Privacy and Publicity

    DEFF Research Database (Denmark)

    Schaumburg-Müller, Sten

    2013-01-01

    An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy......An account and critical discussion of the European Court of Human Right's approach to the balancing of protecting publicity and privacy...

  1. Privacy Metrics and Boundaries

    NARCIS (Netherlands)

    L-F. Pau (Louis-François)

    2005-01-01

    textabstractThis paper aims at defining a set of privacy metrics (quantitative and qualitative) in the case of the relation between a privacy protector ,and an information gatherer .The aims with such metrics are: -to allow to assess and compare different user scenarios and their differences; for ex

  2. Navy Aegis Ballistic Missile Defense (BMD) Program: Background and Issues for Congress

    Science.gov (United States)

    2011-04-19

    many ships will be available; and how the alphabet- soup of U.S. and international commanders will work together in a crisis. [Admiral Mark...meeting outside of missile defense,” Campbell said during a Nov. 3 interview with Aviation Week. These include providing weapons and manpower for...would seem a natural mission for the Army to fund and field the land-based SM-3 mission as the lead service. Campbell notes that the Army has 10

  3. Evolution of the Department of Defense Millimeter and Microwave Monolithic Integrated Circuit Program

    Science.gov (United States)

    2007-02-01

    Dertouzos, Michael; Lester, Richard K.; Solow , Robert M.; Thorow, Lester C., “Toward a New Industrial America Scientific American, June 1989, pp...Vladimir Gelnovatch, Director of the U.S. Army Electronics Technology and Devices Laboratory; and Robert Heaston, Office of Under Secretary of Defense...Jack S. Kilby and Robert N. Noyce shared honors for the achievement. Hybrid microwave and millimeter wave integrated circuits achieved greater

  4. 76 FR 12398 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Bureau of the Public Debt (BPD...

    Science.gov (United States)

    2011-03-07

    ... comparison file compiled of records from our expanded Medicare Database (MDB) File system of records in order to support our administration of the prescription drug subsidy program. The MDB File system of... computer systems and provide the response file to us as soon as possible. This agreement covers...

  5. 77 FR 38880 - Privacy Act of 1974, as Amended; Computer Matching Program (SSA/Railroad Retirement Board (SSA...

    Science.gov (United States)

    2012-06-29

    ... RRB-20 systems of records. We will match RRB's data with our Medicare Database (MDB) File, system of... Post Entitlement System file daily. The number of records will differ each day, but consist of... computer matching program that we are currently conducting with RRB. DATES: We will file a report of...

  6. 76 FR 56781 - Privacy Act of 1974; Notice of a Computer Matching Program Between the Department of Housing and...

    Science.gov (United States)

    2011-09-14

    ... Housing and Urban Development (HUD) and the Social Security Administration (SSA): Matching Tenant Data in Assisted Housing Programs AGENCY: Office of the Chief Information Officer, HUD. ACTION: Notice of a... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOUSING...

  7. Mass surveillance, privacy, and freedom : A case for public access to information about mass government surveillance programs

    NARCIS (Netherlands)

    Newell, Bryce; Moore, Adam D.

    2015-01-01

    This chapter examines judicial decisions about the legality of mass surveillance in the United States and Europe (at the European Court of Human Rights), and explores how the existence of these programs threatens individual freedom. In doing so, the chapter presents a theory of information access an

  8. Identity And Privacy Services

    Directory of Open Access Journals (Sweden)

    Harry Katzan, Jr.

    2010-12-01

    Full Text Available Personal identity and privacy are important topics in information systems in general and data analytics in particular.  Normally associated with digital security, the scope of identity and privacy is much greater and affects most aspects of everyday life.  Related subjects are behavioral tracking, personal-identifiable information (PII, privacy data relevance, data repurposing, identity theft, and homeland security.  Identity and Privacy Services is an admixture of the major issues in the area of personal identity and privacy and the security of individual rights in a complex societal environment.  This is a general paper on this important subject, intended to give exposure to the constituent topics.

  9. Privacy under construction : A developmental perspective on privacy perception

    NARCIS (Netherlands)

    Steijn, W.M.P.; Vedder, A.H.

    2015-01-01

    We present a developmental perspective regarding the difference in perceptions toward privacy between young and old. Here, we introduce the notion of privacy conceptions, that is, the specific ideas that individuals have regarding what privacy actually is. The differences in privacy concerns often f

  10. 76 FR 48811 - Computer Matching and Privacy Protection Act of 1988

    Science.gov (United States)

    2011-08-09

    ... AND COMMUNITY SERVICE Computer Matching and Privacy Protection Act of 1988 AGENCY: Corporation for National and Community Service. ACTION: Notice of new computer matching program between the Corporation for... Privacy Act of 1974 (5 U.S.C. 552a), as amended by the Computer Matching and Privacy Protection Act...

  11. 77 FR 11367 - Defense Federal Acquisition Regulation Supplement; Extension of the Test Program for Negotiation...

    Science.gov (United States)

    2012-02-24

    ... Regulation Supplement; Extension of the Test Program for Negotiation of Comprehensive Small Business... Acquisition Regulation Supplement to extend the program period for the DoD Test Program for Negotiation of...). Section 866 amends the DoD Test Program for Negotiation of Comprehensive Small Business...

  12. Balancing Privacy and Professionalism: A Survey of General Surgery Program Directors on Social Media and Surgical Education.

    Science.gov (United States)

    Langenfeld, Sean J; Vargo, Daniel J; Schenarts, Paul J

    Unprofessional behavior is common among surgical residents and faculty surgeons on Facebook. Usage of social media outlets such as Facebook and Twitter is growing at exponential rates, so it is imperative that surgery program directors (PDs) focus on professionalism within social media, and develop guidelines for their trainees and surgical colleagues. Our study focuses on the surgery PDs current approach to online professionalism within surgical education. An online survey of general surgery PDs was conducted in October 2015 through the Association for Program Directors in Surgery listserv. Baseline PD demographics, usage and approach to popular social media outlets, existing institutional policies, and formal curricula were assessed. A total of 110 PDs responded to the survey (110/259, 42.5% response rate). Social media usage was high among PDs (Facebook 68% and Twitter 40%). PDs frequently viewed the social media profiles of students, residents, and faculty. Overall, 11% of PDs reported lowering the rank or completely removing a residency applicant from the rank order list because of online behavior, and 10% reported formal disciplinary action against a surgical resident because of online behavior. Overall, 68% of respondents agreed that online professionalism is important, and that residents should receive instruction on the safe use of social media. However, most programs did not have formal didactics or known institutional policies in place. Use of social media is high among PDs, and they often view the online behavior of residency applicants, surgical residents, and faculty surgeons. Within surgical education, there needs to be an increased focus on institutional policies and standardized curricula to help educate physicians on social media and online professionalism. Copyright © 2016 Association of Program Directors in Surgery. Published by Elsevier Inc. All rights reserved.

  13. 32 CFR Appendix C to Part 504 - Certificate of Compliance With the Right to Financial Privacy Act of 1978-Sample Format

    Science.gov (United States)

    2010-07-01

    ... Financial Privacy Act of 1978-Sample Format C Appendix C to Part 504 National Defense Department of Defense... FINANCIAL INSTITUTIONS Pt. 504, App. C Appendix C to Part 504—Certificate of Compliance With the Right to... to section 3417(c) of the Right to Financial Privacy Act of 1978, good faith reliance upon...

  14. Understanding Complexity and Self-Organization in a Defense Program Management Organization (Experimental Design)

    Science.gov (United States)

    2016-03-18

    start of the program. Earned value management data will be used to determine program schedule variance. Program Performance Program performance will...and schedule of the program. Table 4 provides a definition of key earned value terms. Table 4. Earned Value Management Key Terms Subsequent...Sasieni, M. W. (1968). The engineering and management of an effective system. Management Science, 14(12), B-721–B-730. Fredrickson, J. W

  15. 76 FR 20339 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-04-12

    ... clothing needs; to reduce costs and lead times; and to improve the efficiency of clothing distribution for...; to reduce costs and lead times; and to improve the efficiency of clothing distribution for the... of the Secretary Privacy Act of 1974; Systems of Records AGENCY: Defense Logistics Agency,...

  16. 77 FR 72336 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-05

    ... Liaison Officer, Department of Defense. Deletion: A0215-2a CFSC System name: Army Club Membership Files... Centers or at clubs in the Army; therefore, the A0215-2a CFSC, Army Club Membership Files system of... Department of the Army Privacy Act of 1974; System of Records AGENCY: Department of the Army, DoD....

  17. 77 FR 38598 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-06-28

    ... Officer, Department of Defense. CIG-23 System Name: Public Affairs Files (August 7, 2006, 71 FR 44667) Changes: * * * * * System name: Delete entry and replace with ``SCOUT and Public Affairs Files.'' System... Office of the Secretary Privacy Act of 1974; System of Records AGENCY: Office of the Inspector...

  18. 75 FR 26201 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-11

    ... Information Files (October 13, 2009; 74 FR 52464) Changes: * * * * * Notification procedure: Delete entry and... address and telephone number.'' * * * * * LDIA 0011 System name: Student Information Files. System... Office of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency,...

  19. 77 FR 26256 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-03

    ... Management System Office, 4800 Mark Center Drive, East Tower, Suite 02G09, Alexandria, VA 22350-3100... and leave and earnings statements.'' Authority for maintenance of the system: Delete entry and replace... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Intelligence Agency,...

  20. 77 FR 75621 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-12-21

    ... submitting comments. Mail: Federal Docket Management System Office, 4800 Mark Center Drive, East Tower, 2nd... maintenance of the system: Delete and replace with ``5 U.S.C. 6331 et seq., Leave; 10 U.S.C. 136, Assistant... of the Secretary Privacy Act of 1974; System of Records AGENCY: Defense Contract Audit Agency,...

  1. 76 FR 12078 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-03-04

    .... System manager(s) and address: Director, DLA Human Resources Center-Military, Military Personnel and... INFORMATION: The Defense Logistics Agency systems of records notices subject to the Privacy Act of 1974, (5 U... FURTHER INFORMATION CONTACT address above. The proposed system reports, as required by 5 U.S.C. 552a...

  2. 77 FR 58816 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-09-24

    ... Agency is deleting five systems of records notices from its existing inventory of record systems subject... proposes to delete five systems of records from its inventory of record systems subject to the Privacy Act... Accounting Service system of records notice, T-7340d, Defense Military Pay Office Input and Reporting...

  3. The Dynamic Programming Algorithm on Privacy Protection Model of Continuous Location Queries Based on LBS%基于 LBS 的连续查询位置隐私保护模型的动态规划算法

    Institute of Scientific and Technical Information of China (English)

    雷建云; 张镭钟

    2015-01-01

    针对现有的算法大多都是静态位置隐私保护的,如果将静态算法应用于动态的连续查询中,会导致位置隐私泄露,提出了一种基于连续查询的动态规划改进算法,旨在保护用户的位置隐私,仿真实验结果证明:该算法在匿名处理时间、匿名成功率和轨迹扭曲度等方面优于现有算法。%Most of the existing algorithms are static position for privacy , if the static algorithm applied in dynamically continuous query , it will lead to the disclosure of position privacy , An improved dynamic programming algorithm based on continuous queries is proposed , designed to protect the user's location privacy , The simulation results show that: The algorithm outperforms the existing methods in terms anonymous processing time , anonymous success rate and track twist .

  4. Post Milestone B Funding Climate and Cost Growth in Major Defense Acquisition Programs

    Science.gov (United States)

    2017-03-01

    assumptions are made in the hope that, by making the program appear to be lower in cost or more capable, they will increase the odds that the program will...hope that, by making the program appear to be lower in cost or more capable, they will increase the odds that the program will be successful in...Package Procurement (TPP).13 Acquisition reforms adopted in mid-1969 ruled out use of TPP and fixed- price development contracts because they typically

  5. Protecting patron privacy

    CERN Document Server

    Beckstrom, Matthew

    2015-01-01

    In a world where almost anyone with computer savvy can hack, track, and record the online activities of others, your library can serve as a protected haven for your visitors who rely on the Internet to conduct research-if you take the necessary steps to safeguard their privacy. This book shows you how to protect patrons' privacy while using the technology that your library provides, including public computers, Internet access, wireless networks, and other devices. Logically organized into two major sections, the first part of the book discusses why the privacy of your users is of paramount

  6. Web Security, Privacy & Commerce

    CERN Document Server

    Garfinkel, Simson

    2011-01-01

    Since the first edition of this classic reference was published, World Wide Web use has exploded and e-commerce has become a daily part of business and personal life. As Web use has grown, so have the threats to our security and privacy--from credit card fraud to routine invasions of privacy by marketers to web site defacements to attacks that shut down popular web sites. Web Security, Privacy & Commerce goes behind the headlines, examines the major security risks facing us today, and explains how we can minimize them. It describes risks for Windows and Unix, Microsoft Internet Exp

  7. Privacy in Social Networks

    CERN Document Server

    Zheleva, Elena

    2012-01-01

    This synthesis lecture provides a survey of work on privacy in online social networks (OSNs). This work encompasses concerns of users as well as service providers and third parties. Our goal is to approach such concerns from a computer-science perspective, and building upon existing work on privacy, security, statistical modeling and databases to provide an overview of the technical and algorithmic issues related to privacy in OSNs. We start our survey by introducing a simple OSN data model and describe common statistical-inference techniques that can be used to infer potentially sensitive inf

  8. Security and privacy for implantable medical devices

    CERN Document Server

    Carrara, Sandro

    2014-01-01

     This book presents a systematic approach to analyzing the challenging engineering problems posed by the need for security and privacy in implantable medical devices (IMD).  It describes in detail new issues termed as lightweight security, due to the associated constraints on metrics such as available power, energy, computing ability, area, execution time, and memory requirements. Coverage includes vulnerabilities and defense across multiple levels, with basic abstractions of cryptographic services and primitives such as public key cryptography, block ciphers and digital signatures. Experts from engineering introduce to some IMD systems that have  recently been proposed and developed. Experts from Computer Security and Cryptography present new research, which shows vulnerabilities in existing IMDs and proposes solutions. Experts from Privacy Technology and Policy will discuss the societal, legal and ethical challenges surrounding IMD security as well as technological solutions that build on the latest in C...

  9. National Privacy Research Strategy

    Data.gov (United States)

    Networking and Information Technology Research and Development, Executive Office of the President — On July 1, NITRD released the National Privacy Research Strategy. Research agencies across government participated in the development of the strategy, reviewing...

  10. Privacy for Sale?

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Sørensen, Jannick Kirk; Khajuria, Samant

    Data brokers have become central players in the collection online of private user data. Data brokers’ activities are however not very transparent or even known by users. Many users regard privacy a central element when they use online services. Based on 12 short interviews with users, this paper...... analyses how users perceive the concept of online privacy in respect to data brokers col- lection of private data, and particularly novel services that offer users the possi- bility to sell their private data. Two groups of users are identified: Those who are considering selling their data under specific...... conditions, and those who reject the idea completely. Based on the literature we identify two positions to privacy either as an instrumental good, or as an intrinsic good. The paper positions vari- ous user perceptions on privacy that are relevant for future service develop- ment....

  11. Legal Protections for Privacy

    Science.gov (United States)

    Leslie, David W.

    1977-01-01

    Individual interest in privacy is a multiple legal issue, roughly divided into four parts according to different types of law: constitutional, statutory, administrative, and common law. Policy implications of this issue for institutions are discussed. (Editor/LBH)

  12. Stratospheric Transparency: Perspectives on Internet Privacy

    Science.gov (United States)

    Hauck, Rita M.

    2009-01-01

    As a parent of teenagers in the 1980s, I recall a concern of the intrusion by MTV into our home. After futile attempts to block the program, my spouse and I set out to convince our sons of its intrusion. Our challenge was miniscule when compared to the Internet privacy issues of today. This paper addresses such challenges and proposes some…

  13. 76 FR 22615 - Privacy Act; Implementation

    Science.gov (United States)

    2011-04-22

    ... the Privacy Act. This will improve the efficiency and effectiveness of DoD's program by preserving the... requirements on the public under the Paperwork Reduction Act of 1995. Section 202, Public Law 104-4, ``Unfunded..., Stat. 1896 (5 U.S.C. 552a). 0 2. In Sec. 322.7, remove and reserve paragraph (l) and add paragraph (u...

  14. 75 FR 66686 - Defense Federal Acquisition Regulation Supplement; Balance of Payments Program Exemption for...

    Science.gov (United States)

    2010-10-29

    ... Regulation Supplement; Balance of Payments Program Exemption for Commercial Information Technology... Acquisition Regulation Supplement (DFARS) to implement the exemption from the Balance of Payments Program for... is amending the DFARS to implement in the clauses at 252.225- 7044, Balance of Payments...

  15. Economics of Information Security and Privacy

    CERN Document Server

    Moore, Tyler; Ioannidis, Christos

    2010-01-01

    The Workshop on the Economics of Information Security (WEIS) is the leading forum for interdisciplinary research and scholarship on information security and privacy, combining ideas, techniques, and expertise from the fields of economics, social science, business, law, policy, and computer science. In 2009, WEIS was held in London, at UCL, a constituent college of the University of London. "Economics of Information Security and Privacy" includes chapters presented at WEIS 2009, having been carefully reviewed by a program committee composed of leading researchers. Topics covered inclu

  16. Defense Institution Building: An Assessment

    Science.gov (United States)

    2016-01-01

    MoDA and DIILS Support of DIB Activity Objectives . . . . . . . 26 2.8. Overlapping Program Objectives...Wales Initiative Fund–Defense Institution Building (WIF-DIB), the Ministry of Defense Advisors ( MoDA ) program, and the Defense Insti- tute of...other events and activities related to a partner nation’s defense institution capabilities and capacity. One exception is MoDA , where engagements are

  17. Overcoming Resistance to Change: An Analysis to the Department of Defense's Anthrax Vaccine Immunization Program

    National Research Council Canada - National Science Library

    Johnson, Irene

    2004-01-01

    The goal of this research was to investigate the impact of change on organizations, in the absence of a preparedness program and to develop strategies for overcoming resistance to change, in the midst...

  18. Major Automated Information Systems: Selected Defense Programs Need to Implement Key Acquisition Practices

    Science.gov (United States)

    2014-03-01

    information system NGEN Next Generation Enterprise Network PMBOK ® Project Management Body of Knowledge TMIP-J Theater Medical Information Program...Management Institute’s Guide to the Project Management Body of Knowledge ( PMBOK ®), and assessed each of the 3 programs against these criteria.14 To...1) requirements management and (2) project monitoring and control best practices, as defined by CMMI-ACQ and PMBOK ®. We also assessed these

  19. Defense Small Business Innovation Research Program (SBIR). Volume 2. Navy Abstracts of Phase 1 Awards. 1990

    Science.gov (United States)

    1990-01-01

    TRAINING. DELFIN SYSTEMS 1349 MOFFETT PARK DR 78 SMALL BUSINESS INNOVATION RESEARCH PROGRAM - PHASE I NAVY Solicitation 90.1 SUNNYVALE, CA 94089 Program...MACHINE-INTERFACES (MMI). IMPLEMENTED MMI DESIGN SHOULD REFLECT HOW THE OPERATOR ACTUALLY USES AND INTERACTS WITH THE MACHINE. DELFIN WILL ANALYZE AND...DESIGN A GENERIC EXPERT SYSTEM MMI USEFUL IN ANY DEPLOYED ESM SYSTEM. DELFIN WILL GENERICALLY DEFINE CRYPTOLOGIC SYSTEMM USE AND TECHNICAL

  20. Addressing the Barriers to Agile Development in the Department of Defense: Program Structure, Requirements, and Contracting

    Science.gov (United States)

    2015-04-30

    barriers within the DoD acquisition system (Broadus, 2013). MITRE performed initial research to examine the leading Agile methodologies and commercial...that suit each organization’s IT environment. Various Agile methods (e.g., Scrum , Extreme Programming (XP), Kanban, Test Driven Development) have... methodology . Traditional waterfall programs usually have discrete acquisition phases driven by milestone events to deliver a large capability. Agile is more

  1. Department of Defense (DOD) renewables and energy efficiency planning (REEP) program manual

    Energy Technology Data Exchange (ETDEWEB)

    Nemeth, R.J.; Fournier, D.; Debaillie, L.; Edgar, L.; Stroot, P.; Beasley, R.; Edgar, D.; McMillen, L.; Marren, M.

    1995-08-01

    The Renewables and Energy Efficiency Planning (REEP) program was developed at the US Army Construction Engineering Research Laboratories (USACERL). This program allows for the analysis of 78 energy and water conservation opportunities at 239 major DOD installations. REEP uses a series of algorithms in conjunction with installation specific data to estimate the energy and water conservation potential for entire installations. The program provides the energy, financial, pollution, and social benefits of conservation initiatives. The open architecture of the program allows for simple modification of energy and water conservation variables, and installation database values to allow for individualized analysis. The program is essentially a high-level screening tool that can be used to help identify and focus preliminary conservation studies. The REEP program requires an IBM PC or compatible with a 80386 or 80486 microprocessor. It also requires approximately 4 megabytes of disk space and at least 8 megabytes of RAM. The system was developed for a Windows environment and requires Microsoft Windows 3.1{trademark} or higher to run properly.

  2. Acquisition Program Teamwork and Performance Seen Anew: Exposing the Interplay of Architecture and Behaviors in Complex Defense Programs

    Science.gov (United States)

    2016-04-30

    implemented in a performance measurement system.  It must have a clear sampling approach, frequency, unit of analysis, etc. in order to produce reliable...straightjacket on learning, depending upon the judgement of program and team leaders to make strategic adjustments. Perhaps an approach that relies on the basic...validate this approach from multiple programs will be a lengthy process, but sample identification is already underway. Early experiments using the

  3. Defense Small Business Innovation Research Program (SBIR). Volume 4. Defense Agency Projects, Abstracts of Phase 1 Awards from FY 1989 SBIR Solicitation

    Science.gov (United States)

    1990-04-01

    LABORATORY UNDER THE CODE NAME " DELPHI ", FOR THE OFFICE OF STRATEGIC DEFENSE; AND BETATRON RESEARCH CONDUCTED BY BOTH U.S. AND SOVIET SOURCES SUPPORTS THE...TITLE: HYPERGOLIC FUEL INJECTOR FEATURES INCREASED UTILITY FOR REMOTELY PILOTED VEHICLES (RPVs) INCREASED RANGE ENDURANCE PAYLOAD MULTI.. TOPIC# 20...OFFICE: PM/SBIR IDENT#: 33860 A HYPERGOLIC FUEL INJECTOR IS DESCRIBED THAT ENABLES MULTIFUEL OPERATION, LOWER FUEL CONSUMPTION, AND ENHANCED ALL WEATHER

  4. Commercializing Defense Technologies and Helping Defense Firms Succeed in Commercial Markets: A Report on the Objectives, Activities, and Accomplishments of the TAP-IN Program

    Science.gov (United States)

    1997-01-01

    Technology Access for Product Innovation (TAP-IN), the largest technology deployment project funded by TRP, was competitively selected through a national solicitation for proposals. TAP-IN was created to help companies access and apply defense technologies and help defense-dependent companies enter new commercial markets. Defense technologies included technologies developed by DoD, DOE, NASA, and their contractors. TAP-IN was structured to provide region-based technology access services that were able to draw on technology resources nationwide. TAP-IN provided expert assistance in all stages of the commercialization process from concept through prototype design to capital sourcing and marketing strategy. TAP-IN helped companies locate new technology, identify business partners, secure financing, develop ideas for new products, identify new markets, license technology, solve technical problems, and develop company-specific applications of federal technology. TAP-IN leveraged NASA's existing commercial technology network to create an integrated national network of organizations that assisted companies in every state. In addition to NASA's six regional technology transfer centers (RTTCs), TAP-IN included business and technology development organizations in every state, the Industrial Designers Society of America, and the Federal Laboratory Consortium (FLC).

  5. Department of Defense HIV/AIDS Prevention Program (DHAPP): 2006 Annual Report

    Science.gov (United States)

    2007-01-01

    The Comité Central de Prevención y Control del VIH/ SIDA de las Fuerzas Armadas y Po- licía Nacional del Perú (COPRECOS) is a gov- B A C K G R O U N D...The goal of the fiscal year 2005 program was to deter- mine the prevalence of HIV infection and other STIs (hepatitis B virus [HBV], hepatitis C... virus [HCV], syphilis, and human T-cell lymphotrophic virus type 1 [HTLV-1]) in Peruvian military personnel. A program similar to that in the US

  6. 77 FR 29616 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-18

    ..., Department of Defense. DCIO 01 System name: Defense Industrial Base (DIB) Cyber Security/Information Assurance Records. System location: Director, Defense Industrial Base (DIB) Cyber Security/Information... Critical Infrastructure Program (DCIP) Management; and DoDI 5205.13, Defense Industrial Base (DIB) Cyber...

  7. Defense Small Business Innovation Research Program (SBIR) Abstracts of Phase I Awards 1984.

    Science.gov (United States)

    1985-04-16

    INTEGRATED BUILDING ENERGY EVALUATION PROGRAM, TO BE APPLIED TO LARGE BUILDINGS THAT DETERMINES THE OVERALL BUILDING ENERGY EFFICIENCY AND DIAGNOSES SPECIFIC...STANDARDS TO PROVIDE BUILDING ENERGY EFFICIENCY EVALUATION. MORE IMPORTANTLY, IT WILL INDICATE AREAS OF INEFFICIENCY TO BE IMPROVED. MANY DATA INPUTS TO

  8. The Myth of Jointness in Department of Defense Requirements and Major Acquisition Programs

    Science.gov (United States)

    2013-06-01

    and Program Management for the F-4 Phantom II," Social Studies of Science 23, no. 2 (May 1993): 287. 5 Deborah Shapley, Promise and Power: The...for the F-4 Phantom II.” Social Studies of Science 23, No. 2 (May, 1993): 265-300. Bull, Stephen. "Encyclopedia of Military Technology and

  9. Defense Small Business Innovation Research Program (SBIR). Volume 3. Air Force Abstracts of Phase 1 Awards

    Science.gov (United States)

    1990-01-01

    ROBOTS. KINOPHASE 14 HOLLY HILL DR AMHERST, NH 03031 Program Manager: GENE C KOCH Contract #: Title: LIQUID CRYSTAL SWITCHABLE KINOFORM LENSES FOR...NETWORKS WILL BE USED TO DEVELOP A REAL- CIME , MULTIMODALITY, NONINTRUSIVE PHYSIOLOGICAL METRIC OF MENTAL WORKLOAD. OUR METRIC WILL MEASURE MENTAL

  10. RDT&E Programs (R-1). Department of Defense Budget Fiscal Year 2010

    Science.gov (United States)

    2009-05-01

    52,716 U ( SIAP ) System Engineer (SE) 73 0603889N Counterdrug RDT&E Projects 04...20,582 U 91 0605452F Joint SIAP Executive Program 05 34,877...4,723 66,663 13,466 13,466 U ( SIAP ) 95 0207701F Full Combat Mission

  11. Defense Small Business Innovation Research Program (SBIR) Volume 2. Navy Abstracts of Phase 1 Awards, 1987

    Science.gov (United States)

    1988-04-01

    DYNAMICS, INCLUDING AUTOPILOT , AND AN ADEQUATE SIMULATED TERRAIN IMAGE FOR VEHICLES WITH ON-BOARD SMALL BUSINESS INNOVATION RESEARCH (SBIR) PROGRAM...ELECTRONICS DOES NOT EXCEED A FRACTION OF A VOLT, NOT LIKELY IF THE RATE OF CHANGE OF AXIAL FLUX DENSITY IS LESS THAN 2.5 TESLA /SEC. A UNIQUE

  12. Inequalities for the quantum privacy

    Science.gov (United States)

    Trindade, M. A. S.; Pinto, E.

    2016-02-01

    In this work, we investigate the asymptotic behavior related to the quantum privacy for multipartite systems. In this context, an inequality for quantum privacy was obtained by exploiting of quantum entropy properties. Subsequently, we derive a lower limit for the quantum privacy through the entanglement fidelity. In particular, we show that there is an interval where an increase in entanglement fidelity implies a decrease in quantum privacy.

  13. Privacy and Open Government

    Directory of Open Access Journals (Sweden)

    Teresa Scassa

    2014-06-01

    Full Text Available The public-oriented goals of the open government movement promise increased transparency and accountability of governments, enhanced citizen engagement and participation, improved service delivery, economic development and the stimulation of innovation. In part, these goals are to be achieved by making more and more government information public in reusable formats and under open licences. This paper identifies three broad privacy challenges raised by open government. The first is how to balance privacy with transparency and accountability in the context of “public” personal information. The second challenge flows from the disruption of traditional approaches to privacy based on a collapse of the distinctions between public and private sector actors. The third challenge is that of the potential for open government data—even if anonymized—to contribute to the big data environment in which citizens and their activities are increasingly monitored and profiled.

  14. Waste minimization policies, regulations, and practices within the U.S. Department of Energy defense programs

    Energy Technology Data Exchange (ETDEWEB)

    Mathur, S.P.

    1989-11-01

    In 1984 the US Congress enacted the Hazardous and Solid Waste Amendments (HSWA) to the Resource Conservation and Recovery Act (RCRA). One of the goals of this legislation was to focus attention on the need to reduce or eliminate hazardous waste so as to minimize the threat to human health and the environment. Subsequently, in September of 1988, DOE issued a Radioactive Waste Management Policy, DOE Order 5820.2A, and in November a General Environmental Program Order, DOE Order 5400.1. These documents embrace the principles set forth in RCRA, and expand their scope to include radioactive, mixed, and pollutant waste, and all actions for reducing waste from the point of generation through waste treatment, storage, transportation and disposal. This paper will present an overview of the legislation and policies for waste reduction and, in addition, give site responsibilities for implementing waste reduction program activities.

  15. Waste minimization policies, regulations, and practices within the U.S. Department of Energy defense programs

    Energy Technology Data Exchange (ETDEWEB)

    Mathur, S.P.

    1989-11-01

    In 1984 the US Congress enacted the Hazardous and Solid Waste Amendments (HSWA) to the Resource Conservation and Recovery Act (RCRA). One of the goals of this legislation was to focus attention on the need to reduce or eliminate hazardous waste so as to minimize the threat to human health and the environment. Subsequently, in September of 1988, DOE issued a Radioactive Waste Management Policy, DOE Order 5820.2A, and in November a General Environmental Program Order, DOE Order 5400.1. These documents embrace the principles set forth in RCRA, and expand their scope to include radioactive, mixed, and pollutant waste, and all actions for reducing waste from the point of generation through waste treatment, storage, transportation and disposal. This paper will present an overview of the legislation and policies for waste reduction and, in addition, give site responsibilities for implementing waste reduction program activities.

  16. 78 FR 73466 - Privacy Act

    Science.gov (United States)

    2013-12-06

    ... CORPORATION 22 CFR Part 707 Privacy Act AGENCY: Overseas Private Investment Corporation. ACTION: Notice of... (``OPIC'') Privacy Act (``PA'') regulations by making substantive and administrative changes. These... procedure, Privacy. For the reasons stated in the preamble the Overseas Private Investment Corporation...

  17. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  18. Advertising and Invasion of Privacy.

    Science.gov (United States)

    Rohrer, Daniel Morgan

    The right of privacy as it relates to advertising and the use of a person's name or likeness is discussed in this paper. After an introduction that traces some of the history of invasion of privacy in court decisions, the paper examines cases involving issues such as public figures and newsworthy items, right of privacy waived, right of privacy…

  19. Designing Privacy-by-Design

    NARCIS (Netherlands)

    Rest, J.H.C. van; Boonstra, D.; Everts, M.H.; Rijn, M. van; Paassen, R.J.G. van

    2014-01-01

    The proposal for a new privacy regulation d.d. January 25th 2012 introduces sanctions of up to 2% of the annual turnover of enterprises. This elevates the importance of mitigation of privacy risks. This paper makes Privacy by Design more concrete, and positions it as the mechanism to mitigate these

  20. Privacy Expectations in Online Contexts

    Science.gov (United States)

    Pure, Rebekah Abigail

    2013-01-01

    Advances in digital networked communication technology over the last two decades have brought the issue of personal privacy into sharper focus within contemporary public discourse. In this dissertation, I explain the Fourth Amendment and the role that privacy expectations play in the constitutional protection of personal privacy generally, and…

  1. Development of an Intellectual Property Strategy: Research Notes to Support Department of Defense Programs

    Science.gov (United States)

    2014-10-01

    such as poetry , novels, movies, songs, computer software, drawings, and architecture. A copyright owner has the exclusive right to reproduce...market research—can support how requirements may be logically broken out into segments to maximize competition  records that substantiate sources...entitlement will maximize a program’s ability to utilize competitive alternatives for DoD development, modification, or upgrade effort. One suggestion is to

  2. Defense Small Business Innovation Research Program (SBIR). Volume 1. Army Abstracts of Phase 1 Awards 1987.

    Science.gov (United States)

    1988-04-01

    DIMENSIONAL FLOW SOLUTIONS. HORINE ENGINEERS INC PO BOX 2027 LOS GATOS , CA 95031 CONTRACT NUMBER: DAAA21-87-C-0190 CARLTON L HORINE TITLE: p IMPROVED GASKET...AN UNPARALLELED OPPORTUNITY TO SCREEN BACTERIA , FUNGI AND ALGAE FROM THERMALLY STABLE OXIDASES AND PEROXIDASES. ONCE ISOLATED, AN ATTEMPT WILL BE MADE...PROGRAM - PHASE 1 PAGE 106 BY SERVICE FISCAL YEAR 1987 ARMY SUBMITTED BY • TO DEVELOP AND TEST A SYSTEM. LASER-GENICS CORP PO BOX 33010 LOS GATOS , CA

  3. A Macro-Stochastic Approach to Improved Cost Estimation for Defense Acquisition Programs

    Science.gov (United States)

    2014-03-27

    the United States Government. This material is declared a work of the U.S. Government and is not subject to copyright protection in the United...Aircraft, Helicopter, Missile , Electronic, Munitions, Vehicle, Ship, Space, and Other. Other summary-level variables include service component...older DDG-51 ships (Cancian, 2010)—both of these programs are in the dataset. Also, the Army’s “Longbow” 84 helicopter, and the “Longbow Hellfire

  4. Sources of Weapon System Cost Growth. Analysis of 35 Major Defense Acquisition Programs

    Science.gov (United States)

    2008-01-01

    Resource Management Program of RAND Proj- iii ect AIR FORCE. The project’s technical monitor is Jay Jordan, Techni- cal Director of the Air Force Cost...and for his long-term support of Project AIR FORCE’s acquisi- tion and cost analysis research. Richard Hartley (SAF/FMC) and Jay Jordan from the Air...Wickman (1993), Tyson, Nelson, and Utech (1992), Shaw (1982), Tyson et al. (1989), Asher and Maggelet (1984), and Drezner et al. (1993) studied cost

  5. Defense Acquisitions. Measuring the Value of DOD’s Weapon Programs Requires Starting with Realistic Baselines

    Science.gov (United States)

    2009-04-01

    schedule delay in delivering initial capabilities 18 months 21 months 22 months Source: GAO analysis of DOD data. aData were obtained from DOD’s...efficient. Too many major acquisitions currently take the opposite approach by seeking to deliver a revolutionary “ big bang” capability in one step...candidate programs and to go for the “ big bang” capability without the knowledge to achieve it should be resisted. Only the best candidates--defined in

  6. Improving Oversight and Coordination of Department of Defense Programs That Address Problematic Behaviors Among Military Personnel

    Science.gov (United States)

    2017-01-01

    with an increasing representation of minorities, greater racial diversity in positions of authority, and a smaller racial wage gap .”91 Risk Factors...strategic convergence, as well as potential gaps along the prevention spectrum at which program and research efforts might be applied, with the...significant gap in DoD’s frame- work for mitigating problematic behavior. Although the Office of Diversity Management and Equal Opportunity is

  7. Defense Small Business Innovation Research Program (SBIR). Abstracts of Phase I Awards. 1986.

    Science.gov (United States)

    1986-01-01

    EMPHASIS OF ANY PHASE II WORK. ANAMET LABS INC AF $ 49,031 100 INDUSTRIAL WY SAN CARLOS, CA 94070 DANTON GUTIERREZ-LFMINI TITLE: COUPLED THERMOELASTIC...NATIONAL DR - STE 280 BURTONSVILLE, MD 20866 GEORGE MAHLER TITLE: THLL BASED SYMBOLIC DEBUG FACILITY FOR VAX/VMS T 104 OFFICE: NSWC THLL IS THE TRIDENT...VALLEY RD., SUITE 112 SAN DIEGO, CA 92121 GEORGE W WEBB , TITLE: MINIATURE CONDUCTORS FOR SENSORS T 3 OFFICE: WE DESCRIBE A FOUR PART RESEARCH PROGRAM

  8. Innovative Science and Technology, Ballistic Missile Defense Organization, Technical Program Information.

    Science.gov (United States)

    2007-11-02

    will be encouraged to follow-up with additional documentation - for example, a white paper or formal proposal. In addition to basic program efforts...related devices for opto-electronics, double heterostructures composed of AlGaN, GaN, and InGaN based layers for laser diode applications, as well...emitting diode ( LED ) structures. Opportunities Unique chemical approaches for ultra-fast EO external modulators; opto-electronic, ultra-high-speed signal

  9. Engineering the Business of Defense Acquisition: An Analysis of Program Office Processes

    Science.gov (United States)

    2015-04-30

    5000.02. While it is important to better understand the interactions and decision-making that occurs within a program office, the dependent nature... Amaral & Uzzi, 2007). Specialization has a limiting function, in that the specialists in a PMO are measured by, and capable of addressing only...varies depending on the nature of the internal formal and informal processes. Eisenhardt (1989) noted that more information, considered simultaneously

  10. Strategic Defense Initiative Demonstration/Validation Program Environmental Assessment. Exoatmospheric Reentry Vehicle Interception System (ERIS),

    Science.gov (United States)

    1987-08-01

    2; - 4; C i O Ga. ; . ft* .4 .4 ~I A la 4. a d .4 . - aa .3 r U. AM 0SP0 o~~0 0.ei. ’U4 Is .~ -4 -- I r ’M .0. ~ aDa id .40 *l - 3~.4 144 0.U .4z- z... Lovelace , Norm, Environmental Protection Agency, Permit Programs, Micronesia, Region IX, San Francisco, California. 27 May 1987. Tele- phone

  11. Department of Defense High Performance Computing Modernization Program. 2006 Annual Report

    Science.gov (United States)

    2007-03-01

    Ground, MD Tip-to-Tail Turbulent Scramjet Flowpath Simulation with MHD Energy Bypass Datta Gaitonde, Air Force Research Laboratory, Wright- Patterson...Stennis Space Center in Mississippi, through a Phase II CAP titled “Quantum and Entropic Algorithms for MHD and Turbulent Flows.” They tested new...14 Force Field Lectures 50 HPC FPGA Programming 10 Insight Segmentation and Registration Toolkit Workshop (ITK) 18 Intermediate-Advanced EnSight 10

  12. Joint Service Chemical and Biological Defense Program FY 08-09 Overview

    Science.gov (United States)

    2007-10-01

    detoxifying component. These include photocatalysts, nanoceramic -supported enzymes, and biocides/sporocides. Researchers will also pursue technologies...oil, and lubricants (POLs)—significant capability improvements for the armor community. The JSLIST Block II Glove Upgrade (JB2GU) provides protection...Strategy, and Support PM Project manager POL petroleum, oil, and lubricants POM Program objective memorandum PPE personal protective equipment R&D

  13. What was privacy?

    Science.gov (United States)

    McCreary, Lew

    2008-10-01

    Why is that question in the past tense? Because individuals can no longer feel confident that the details of their lives--from identifying numbers to cultural preferences--will be treated with discretion rather than exploited. Even as Facebook users happily share the names of their favorite books, movies, songs, and brands, they often regard marketers' use of that information as an invasion of privacy. In this wide-ranging essay, McCreary, a senior editor at HBR, examines numerous facets of the privacy issue, from Google searches, public shaming on the internet, and cell phone etiquette to passenger screening devices, public surveillance cameras, and corporate chief privacy officers. He notes that IBM has been a leader on privacy; its policy forswearing the use of employees' genetic information in hiring and benefits decisions predated the federal Genetic Information Nondiscrimination Act by three years. Now IBM is involved in an open-source project known as Higgins to provide users with transportable, potentially anonymous online presences. Craigslist, whose CEO calls it "as close to 100% user driven as you can get," has taken an extremely conservative position on privacy--perhaps easier for a company with a declared lack of interest in maximizing revenue. But TJX and other corporate victims of security breaches have discovered that retaining consumers' transaction information can be both costly and risky. Companies that underestimate the importance of privacy to their customers or fail to protect it may eventually face harsh regulation, reputational damage, or both. The best thing they can do, says the author, is negotiate directly with those customers over where to draw the line.

  14. Privacy in the family

    NARCIS (Netherlands)

    Newell, Bryce; Metoyer, Cheryl A.; Moore, Adam D.

    2015-01-01

    Popular access to increasingly sophisticated forms of electronic surveillance technologies has altered the dynamics of family relationships. Monitoring, mediated and facilitated by practices of both covert and overt electronic surveillance, has changed the nature of privacy within the family. In thi

  15. Formal Methods for Privacy

    Science.gov (United States)

    2009-09-01

    Shuchi Chawla, Cynthia Dwork, Frank McSherry, Adam Smith , and Hoeteck Wee. Toward privacy in public databases. In 2nd Theory of Cryptography Conference...Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith . Calibrating noise to sensitivity in private data analysis. In In Proceedings of the 3rd Theory of

  16. Biometrics and privacy

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    2001-01-01

    Biometrics offers many alternatives for protecting our privacy and preventing us from falling victim to crime. Biometrics can even serve as a solid basis for safe anonymous and semi-anonymous legal transactions. In this article Jan Grijpink clarifies which concepts and practical applications this

  17. Privacy Policy | FNLCR

    Science.gov (United States)

    The privacy of our users is of utmost importance to Frederick National Lab. The policy outlined below establishes how Frederick National Lab will use the information we gather about you from your visit to our website. We may collect and store

  18. Collaborative Privacy - A Community-Based Privacy Infrastructure

    Science.gov (United States)

    Kolter, Jan; Kernchen, Thomas; Pernul, Günther

    The landscape of the World Wide Web with all its versatile services heavily relies on the disclosure of private user information. Service providers collecting more and more of these personal user data pose a growing privacy threat for users. Addressing user concerns privacy-enhancing technologies emerged. One goal of these technologies is to enable users to improve the control over their personal data. A famous representative is the PRIME project that aims for a holistic privacy-enhancing identity management system. However, approaches like the PRIME privacy architecture require service providers to change their server infrastructure and add specific privacy-enhancing components. In the near future, service providers are not expected to alter internal processes. In this paper, we introduce a collaborative privacy community that allows the open exchange of privacy-related information. We lay out the privacy community’s functions and potentials within a user-centric, provider-independent privacy architecture that will help foster the usage and acceptance of privacy-enhancing technologies.

  19. Privacy Awareness: A Means to Solve the Privacy Paradox?

    Science.gov (United States)

    Pötzsch, Stefanie

    People are limited in their resources, i.e. they have limited memory capabilities, cannot pay attention to too many things at the same time, and forget much information after a while; computers do not suffer from these limitations. Thus, revealing personal data in electronic communication environments and being completely unaware of the impact of privacy might cause a lot of privacy issues later. Even if people are privacy aware in general, the so-called privacy paradox shows that they do not behave according to their stated attitudes. This paper discusses explanations for the existing dichotomy between the intentions of people towards disclosure of personal data and their behaviour. We present requirements on tools for privacy-awareness support in order to counteract the privacy paradox.

  20. Review of the President’s Fiscal Year 2009 Budget Request for the Defense Health Program’s Private Sector Care Budget Activity Group

    Science.gov (United States)

    2008-05-28

    2009 budget request for the Defense Health Program’s Private Sector Care BAG. To do this, we reviewed (1) DOD’s justification for the request for the... Private Sector Care BAG, including the underlying estimates and the extent to which DOD considered historical information; and (2) changes between this...develop the budget requests for the Private Sector Care BAG in fiscal years 2008 and 2009. We also interviewed officials and analyzed documents from

  1. Air Force Major Defense Acquisition Program Cost Growth Is Driven by Three Space Programs and the F-35A: Fiscal Year 2013 President’s Budget Selected Acquisition Reports

    Science.gov (United States)

    2014-01-01

    production FSD full-scale development FY fiscal year FYDP Future Years Defense Program GBS Global Broadcast System GLCM Ground Launched Cruise...Surveillance Target Attack Radar System (JSTARS) aircraft • Air-Launched Cruise Missile (ALCM) • Ground-Launched Cruise Missile ( GLCM ) • AGM-65A/B

  2. Privacy and Facebook

    Directory of Open Access Journals (Sweden)

    Ronan Comer

    2012-09-01

    Full Text Available Social Networking is continually growing and showing more possibilities. Facebook the leading social network site is approaching 1 billion members. Facebook guarantees more than friend requests and also acts as an excellent marketing tool for businesses. Social media is a technology allowing the nation to publish instantly and economically on the internet. It encourages live discussion on a huge range of topics, with not only friends, but businesses and consumers. Facebook serves 120 billion hits per day, stored 60 billion photos and generated 150TB (Terabytes of logs every day. Privacy - or lack of it - however has provoked outrage at various times in the media. This paper seeks to examine the ramifications of poor privacy management by Facebook.

  3. Performing privacy in schools

    DEFF Research Database (Denmark)

    Bøge, Ask Risom; Albrechtslund, Anders; Andersen, Lars Bo

    2017-01-01

    In this presentation we pursue the question: How is privacy performed and perceived in schools by children? Our aim is to investigate how the boundaries between public and private spheres are continuously performed in the formal setting of the classroom as well as in the social lives of students....... School life involves a wide range of technologies, including smartphones, online communication platforms between teachers and parents, and social media. These and other surveillance-enabling services all contribute to the tracking of and by school children and shape their perceptions of privacy (Monahan...... and Torres, 2009; Selwyn, 2010; Taylor, 2013; Taylor & Rooney, 2016). The presentation reports findings from a qualitative study in which teachers and students between 12-16 from two Danish schools are interviewed. In addition, the teachers and students participate in workshops where experiments...

  4. Approximate Privacy: Foundations and Quantification

    CERN Document Server

    Feigenbaum, Joan; Schapira, Michael

    2009-01-01

    Increasing use of computers and networks in business, government, recreation, and almost all aspects of daily life has led to a proliferation of online sensitive data about individuals and organizations. Consequently, concern about the privacy of these data has become a top priority, particularly those data that are created and used in electronic commerce. There have been many formulations of privacy and, unfortunately, many negative results about the feasibility of maintaining privacy of sensitive data in realistic networked environments. We formulate communication-complexity-based definitions, both worst-case and average-case, of a problem's privacy-approximation ratio. We use our definitions to investigate the extent to which approximate privacy is achievable in two standard problems: the second-price Vickrey auction and the millionaires problem of Yao. For both the second-price Vickrey auction and the millionaires problem, we show that not only is perfect privacy impossible or infeasibly costly to achieve...

  5. Location Privacy in RFID Applications

    Science.gov (United States)

    Sadeghi, Ahmad-Reza; Visconti, Ivan; Wachsmann, Christian

    RFID-enabled systems allow fully automatic wireless identification of objects and are rapidly becoming a pervasive technology with various applications. However, despite their benefits, RFID-based systems also pose challenging risks, in particular concerning user privacy. Indeed, improvident use of RFID can disclose sensitive information about users and their locations allowing detailed user profiles. Hence, it is crucial to identify and to enforce appropriate security and privacy requirements of RFID applications (that are also compliant to legislation). This chapter first discusses security and privacy requirements for RFID-enabled systems, focusing in particular on location privacy issues. Then it explores the advances in RFID applications, stressing the security and privacy shortcomings of existing proposals. Finally, it presents new promising directions for privacy-preserving RFID systems, where as a case study we focus electronic tickets (e-tickets) for public transportation.

  6. On quantum and approximate privacy

    CERN Document Server

    Klauck, H

    2001-01-01

    This paper studies privacy in communication complexity. The focus is on quantum versions of the model and on protocols with only approximate privacy against honest players. We show that the privacy loss (the minimum divulged information) in computing a function can be decreased exponentially by using quantum protocols, while the class of privately computable functions (i.e., those with privacy loss 0) is not increased by quantum protocols. Quantum communication combined with small information leakage on the other hand makes certain functions computable (almost) privately which are not computable using quantum communication without leakage or using classical communication with leakage. We also give an example of an exponential reduction of the communication complexity of a function by allowing a privacy loss of o(1) instead of privacy loss 0.

  7. Program Manager: The Journal of the Defense Systems Management College. Volume 12, Number 6, November-December 1983,

    Science.gov (United States)

    1983-12-01

    Division, prime mission equipment acquisition languages in use; and (4) 40 percent of Wright-Patterson AFB, Ohio. He is a process and were designed to...compromising management style or objectives. It em- tems from both the public and private sectors. A synthesis braces a basic language that simplifies... Acqusition at the Defense Communications Agency" by tivity improvement is important to us in defense, then we Fred L. Adler, C. Bruce Baird, and Joseph

  8. Further Evidence on the Effect of Acquisition Policy and Process on Cost Growth of Major Defense Acquisition Programs (Revised)

    Science.gov (United States)

    2016-08-01

    was judged to be practicable and, when not, Fixed Price Incentive Fee (FPIF) or Cost Plus Incentive Fee (CPIF) contracts.6 By 1966, McNamara had...discouraged the use of FPIF for development contracts in favor of CPIF. ( Cost Plus Award Fee may not have been included in the contracting play book yet...Estimate CLC Calibrated Learning Curve CPIF Cost Plus Incentive Fee DAB Defense Acquisition Board DAMIRS Defense Acquisition Management Information

  9. Privacy 2.0

    Directory of Open Access Journals (Sweden)

    Stylianos Papathanassopoulos

    2015-04-01

    Full Text Available We live in the era of change. In this world, privacy is not a static concept, but instead has a dynamic component. Overall, it becomes clear that the public and private are not defined in the same manner as in the past and as in the actual world, while our personal information has become a commodity that can raise our visibility in the social media driven world.

  10. P3ERS: Privacy-Preserving PEer Review System

    Directory of Open Access Journals (Sweden)

    Esma Aimeur

    2012-12-01

    Full Text Available Even though they integrate some blind submission functionalities, current conference review systems, such as EasyChair and EDAS, do not fully protect the privacy of authors and reviewers, in particular from the eyes of the program chair. As a consequence, their use may cause a lack of objectivity in the decision process. In~this paper, we address this issue by proposing P3ERS (for Privacy-Preserving PEer Review System, a distributed conference review system based on group signatures, which aims at preserving the privacy of all participants involved in the peer review process. For~this purpose, we have improved on a generic group signature scheme with revocation features and implemented it in order to ensure the anonymity of the submission and the reviewing phases. We argue that P3ERS could contribute to increase objectivity during the conference review process while maintaining privacy of the various participants.

  11. Federal Employees Health Benefits (FEHB) program and Department of Defense (DoD) demonstration project; and other miscellaneous changes. Office of Personnel Management. Final rule.

    Science.gov (United States)

    2000-06-08

    OPM is issuing a final regulation to implement the portion of the Defense Authorization Act for 1999 that establishes authority for a demonstration project under which certain Medicare and other eligible DoD beneficiaries can enroll in health benefit plans in certain geographic areas under the Federal Employees Health Benefits (FEHB) Program. The demonstration project will run for a period of three years from January 1, 2000, through December 31, 2002. This regulation specifies only the requirements that differ from existing FEHB Program regulations because of unique aspects of the demonstration project. This regulation also makes other miscellaneous changes to the Federal Employees Health Benefits Acquisition Regulations.

  12. Federal Employees Health Benefits (FEHB) Program and Department of Defense (DoD) demonstration project. Office of Personnel Management. Final rule.

    Science.gov (United States)

    2000-06-02

    OPM is issuing a final regulation to implement the portion of the National Defense Authorization Act for 1999 that establishes authority for a demonstration project under which certain Medicare and other eligible DoD beneficiaries can enroll in health benefit plans in certain geographic areas under the Federal Employees Health Benefits (FEHB) Program. The demonstration project will run for a period of three years from January 1, 2000, through December 31, 2002. This regulation specifies only the requirements that differ from existing FEHB Program regulations because of unique aspects of the demonstration project.

  13. Cognitive Privacy for Personal Clouds

    Directory of Open Access Journals (Sweden)

    Milena Radenkovic

    2016-01-01

    Full Text Available This paper proposes a novel Cognitive Privacy (CogPriv framework that improves privacy of data sharing between Personal Clouds for different application types and across heterogeneous networks. Depending on the behaviour of neighbouring network nodes, their estimated privacy levels, resource availability, and social network connectivity, each Personal Cloud may decide to use different transmission network for different types of data and privacy requirements. CogPriv is fully distributed, uses complex graph contacts analytics and multiple implicit novel heuristics, and combines these with smart probing to identify presence and behaviour of privacy compromising nodes in the network. Based on sensed local context and through cooperation with remote nodes in the network, CogPriv is able to transparently and on-the-fly change the network in order to avoid transmissions when privacy may be compromised. We show that CogPriv achieves higher end-to-end privacy levels compared to both noncognitive cellular network communication and state-of-the-art strategies based on privacy-aware adaptive social mobile networks routing for a range of experiment scenarios based on real-world user and network traces. CogPriv is able to adapt to varying network connectivity and maintain high quality of service while managing to keep low data exposure for a wide range of privacy leakage levels in the infrastructure.

  14. Privacy and the Connected Society

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    the society. Enabling the vision of the connected society, researchers point in the direction of security and privacy as areas to challenge the vision. By use of the Internet of Things reference model as well as the vision of the connected society, this paper identifies privacy of the individual with respect...... to three selected areas: Shopping, connected cars and online gaming. The paper concludes that privacy is a complexity within the connected society vision and that thee is a need for more privacy use cases to shed light on the challenge....

  15. Biological Defense Research Program

    Science.gov (United States)

    1989-04-01

    the data of Babudieri and Moscovici (54), C. burnetii is relatively resistant to ultraviolet rays; however, Siegert et al. (55) showed a marked...four viruses. J. Hyg., Camb. 59:479-484. 54. Babudieri, B., and Moscovici , C. 1952. Bandie Inst. Super. San. 15:215-219. 55. Siegert, R., Peter, H

  16. Data privacy for the smart grid

    CERN Document Server

    Herold, Rebecca

    2015-01-01

    The Smart Grid and PrivacyWhat Is the Smart Grid? Changes from Traditional Energy Delivery Smart Grid Possibilities Business Model Transformations Emerging Privacy Risks The Need for Privacy PoliciesPrivacy Laws, Regulations, and Standards Privacy-Enhancing Technologies New Privacy Challenges IOT Big Data What Is the Smart Grid?Market and Regulatory OverviewTraditional Electricity Business SectorThe Electricity Open Market Classifications of Utilities Rate-Making ProcessesElectricity Consumer

  17. 77 FR 28366 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-05-14

    ... INFORMATION: Introduction The Privacy Act (5 U.S.C. 552a) requires the Department to publish in the Federal... detecting fraud, and abuse in, the programs and operations of the Department; and to conduct, supervise, or... economy and efficiency, or the prevention and detection of fraud, and abuse in programs and operations of...

  18. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    . To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  19. The Effect of a 12-Week Moderate Intensity Interval Training Program on the Antioxidant Defense Capability and Lipid Profile in Men Smoking Cigarettes or Hookah: A Cohort Study

    Directory of Open Access Journals (Sweden)

    Abdessalem Koubaa

    2015-01-01

    Full Text Available Aim. To examine the impact of interval training program on the antioxidant defense capability and lipid profile in men smoking cigarettes or hookah unable or unwilling to quit smoking. Methods. Thirty-five participants performed an interval training (2 : 1 work : rest ratio 3 times a week for 12 weeks at an intensity of 70% of VO2max. All subjects were subjected to a biochemical test session before and after the training program. Results. The increase of total antioxidant status (TAS, glutathione peroxidase (GPx, and α-tocopherol, is significant only for cigarette smokers (CS and hookah smokers (HS groups. The decrease of malondialdehyde (MDA and the increase of glutathione reductase (GR are more pronounced in smokers groups compared to those of nonsmokers (NS. Superoxide dismutase (SOD increases in NS, CS, and HS groups by 10.1%, 19.5%, and 13.3%, respectively (P<0.001. Likewise, a significant improvement of high-density lipoprotein cholesterol (HDL-C and TC/HDL-C ratio was observed in CS and HS groups (P<0.05. Conclusion. Although the interval training program does not have a significant effect on blood lipid levels, it seems to be very beneficial in the defense and prevention programs of oxidative stress.

  20. Privacy and Big Data

    CERN Document Server

    Craig, Terence

    2011-01-01

    Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used. Personal data is the hottest commodity on the market today-truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Pri

  1. 42 CFR 403.812 - HIPAA privacy, security, administrative data standards, and national identifiers.

    Science.gov (United States)

    2010-10-01

    ... 42 Public Health 2 2010-10-01 2010-10-01 false HIPAA privacy, security, administrative data... Prescription Drug Discount Card and Transitional Assistance Program § 403.812 HIPAA privacy, security, administrative data standards, and national identifiers. (a) HIPAA covered entities. An endorsed sponsor is...

  2. 34 CFR 98.4 - Protection of students' privacy in examination, testing, or treatment.

    Science.gov (United States)

    2010-07-01

    ... psychological examination, testing, or treatment, in which the primary purpose is to reveal information... 34 Education 1 2010-07-01 2010-07-01 false Protection of students' privacy in examination, testing... RIGHTS IN RESEARCH, EXPERIMENTAL PROGRAMS, AND TESTING § 98.4 Protection of students' privacy...

  3. User Privacy in RFID Networks

    Science.gov (United States)

    Singelée, Dave; Seys, Stefaan

    Wireless RFID networks are getting deployed at a rapid pace and have already entered the public space on a massive scale: public transport cards, the biometric passport, office ID tokens, customer loyalty cards, etc. Although RFID technology offers interesting services to customers and retailers, it could also endanger the privacy of the end-users. The lack of protection mechanisms being deployed could potentially result in a privacy leakage of personal data. Furthermore, there is the emerging threat of location privacy. In this paper, we will show some practical attack scenarios and illustrates some of them with cases that have received press coverage. We will present the main challenges of enhancing privacy in RFID networks and evaluate some solutions proposed in literature. The main advantages and shortcomings will be briefly discussed. Finally, we will give an overview of some academic and industrial research initiatives on RFID privacy.

  4. Program Manager: Journal of the Defense Systems Management College. Volume 17, Number 4, July-August 1988

    Science.gov (United States)

    1988-08-01

    Senator Phil Gramm, ranking minority member, to advise the Senate Armed Services Committee Defense Industry and , . Technology Subcommittee on "...those... Crosby cisions concerning changes and others have translated to the process. general theories into prac- tical applications that are changing the corporate

  5. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  6. A Generic Privacy Quantification Framework for Privacy-Preserving Data Publishing

    Science.gov (United States)

    Zhu, Zutao

    2010-01-01

    In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…

  7. 48 CFR 39.105 - Privacy.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Privacy. 39.105 Section 39... CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY General 39.105 Privacy. Agencies shall ensure that contracts for information technology address protection of privacy in accordance with the Privacy Act (5 U.S.C...

  8. Employee Privacy Rights: A Management Guide.

    Science.gov (United States)

    Shepard, Ira Michael; Olsen, Harry

    Employee privacy rights are considered, along with practical problems and permissible parameters of employer activity. Included is a state-by-state analysis of the status of workplace privacy. Definitions are offered of "invasion of privacy," with attention to four types of privacy invasions: (1) placing someone in a "false light," (2) the public…

  9. Medical information and the right to privacy

    Energy Technology Data Exchange (ETDEWEB)

    Drell, D. [ed.

    1994-06-01

    This report is a compilation of submitted abstracts of papers presented at the DOE-supported workshop on medical information and the right to privacy held at the National Academy of Sciences in Washington, DC, on June 9 and 10, 1994. The aim of this meeting is to provide a forum to discuss the legal, ethical and practical issues related to the computerization and use of medical data, as well as the potential impact the use of these data may have on an individual`s privacy. Topical areas include an overview of the Federal and legal requirements to collect medical data, historical experiences with worker screening programs, currently available medical surveillance technologies (both biomedical and computer technologies) and their limitations. In addition, an-depth assessment of the needs and interests of a wide spectrum of parties as they relate to the use of medical data from both a legal and privacy perspective is provided. The needs of the individual, the public (e.g., blood and tissue banks), private enterprises (e.g., industry and insurance carriers), and the government (e.g., FBI) are discussed. Finally, the practical and legal issues relating to the use of computers to carry, store and transmit this information are also examined. The abstracts are presented in the intended order of presentation as indicated in the agenda for the meeting.

  10. Medical information and the right to privacy

    Energy Technology Data Exchange (ETDEWEB)

    Drell, D. [ed.

    1994-06-01

    This report is a compilation of submitted abstracts of papers presented at the DOE-supported workshop on medical information and the right to privacy held at the National Academy of Sciences in Washington, DC, on June 9 and 10, 1994. The aim of this meeting is to provide a forum to discuss the legal, ethical and practical issues related to the computerization and use of medical data, as well as the potential impact the use of these data may have on an individual`s privacy. Topical areas include an overview of the Federal and legal requirements to collect medical data, historical experiences with worker screening programs, currently available medical surveillance technologies (both biomedical and computer technologies) and their limitations. In addition, an-depth assessment of the needs and interests of a wide spectrum of parties as they relate to the use of medical data from both a legal and privacy perspective is provided. The needs of the individual, the public (e.g., blood and tissue banks), private enterprises (e.g., industry and insurance carriers), and the government (e.g., FBI) are discussed. Finally, the practical and legal issues relating to the use of computers to carry, store and transmit this information are also examined. The abstracts are presented in the intended order of presentation as indicated in the agenda for the meeting.

  11. Towards Privacy Managment of Information Systems

    OpenAIRE

    Drageide, Vidar

    2009-01-01

    This masters thesis provides insight into the concept of privacy. It argues why privacy is important, and why developers and system owners should keep privacy in mind when developing and maintaining systems containing personal information. Following this, a strategy for evaluating the overall level of privacy in a system is defined. The strategy is then applied to parts of the cellphone system in an attempt to evaluate the privacy of traffic and location data in this system.

  12. A Privacy Manager for Cloud Computing

    Science.gov (United States)

    Pearson, Siani; Shen, Yun; Mowbray, Miranda

    We describe a privacy manager for cloud computing, which reduces the risk to the cloud computing user of their private data being stolen or misused, and also assists the cloud computing provider to conform to privacy law. We describe different possible architectures for privacy management in cloud computing; give an algebraic description of obfuscation, one of the features of the privacy manager; and describe how the privacy manager might be used to protect private metadata of online photos.

  13. Privacy-Preserving Trajectory Collection

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Xuegang, Huang; Pedersen, Torben Bach

    2008-01-01

    In order to provide context--aware Location--Based Services, real location data of mobile users must be collected and analyzed by spatio--temporal data mining methods. However, the data mining methods need precise location data, while the mobile users want to protect their location privacy....... To remedy this situation, this paper first formally defines novel location privacy requirements. Then, it briefly presents a system for privacy--preserving trajectory collection that meets these requirements. The system is composed of an untrusted server and clients communicating in a P2P network. Location...

  14. Mobilization and Defense Management Technical Report Series. Effective Integration of Faculty Requirements into Army System Acquisition Programs.

    Science.gov (United States)

    1983-05-01

    authors and does not necessarily reflect the official opinion of the Industrial College of the Acmd ftrces, The National Defense University, or the...good management requirements by the Army or in response to directives from OSD) appear to be generally sufficient to guide the general execution of...significant f. astasiw . gmAt efforts are necessary to minimise these 9j. go NK has no responsibility for execution of facilities construction on ;I in

  15. Program Manager: The Journal of the Defense Systems Management College. Volume 12, Number 3, May-June 1983.

    Science.gov (United States)

    1983-01-01

    service groups, education, and professional organiza- tions. When we apply the ratio, we usually express it as an busine index in which the current...financial leverage. accept artificially low contract profits, he will react by striv- ing to increase profitability. This translates into low levels...Officer, MCC Corporation, and former deputy cited Refe e director of the Central Intelligence Agency. 1. On April 30, 1981, Deputy Secretary of Defense

  16. User Privacy and Empowerment:

    DEFF Research Database (Denmark)

    Dhotre, Prashant Shantaram; Olesen, Henning; Khajuria, Samant

    2017-01-01

    of personal information and its manage-ment. Thus, empowering users and enhancing awareness are essential to compre-hending the value of secrecy. This paper also introduced latest advances in the domain of privacy issues like User Managed Access (UMA) can state suitable requirements for user empowerment...... and will cater to redefine the trustworthy relationship between service providers and users. Subsequently, this paper con-cludes with suggestions for providing empowerment to the user and developing user-centric, transparent business models.......Today, the service providers are capable of assembling a huge measure of user information using Big data techniques. For service providers, user infor-mation has become a vital asset. The present business models are attentive to collect extensive users’ information to extract useful knowledge...

  17. Defense Research Enterprise Assessment

    Science.gov (United States)

    2017-01-01

    Please review the report findings and recommendations. I am interested in receiving your feedback for inclusion in programs wherever these...needed culture shift to utilize their existing authorities. Finally, expanded coordination among intermural basic research portfolios across the Labs...research portfolios across the Labs without creating additional administrative burdens is needed. The defense research enterprise should

  18. Privacy Preserving Distributed Data Mining

    Data.gov (United States)

    National Aeronautics and Space Administration — Distributed data mining from privacy-sensitive multi-party data is likely to play an important role in the next generation of integrated vehicle health monitoring...

  19. Privacy Impact Assessment (PIA) Repository

    Data.gov (United States)

    Department of Veterans Affairs — This repository contains Privacy Impact Assessments (PIA) that have been vetted/approved. Section 208 of the Electronic Government Act of 2002 (E-Gov Act) requires...

  20. 76 FR 58788 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-09-22

    .... Gregory Outlaw, FOIA/PA Program Manager, Corporate Communications, Defense Finance and Accounting Service... Manager, Corporate Communications, Defense Finance and Accounting Service, DFAS-HKC/IN, 8899 E. 56th... system of records should address written inquires to FOIA/PA Program Manager, Corporate...

  1. Department of Defense Healthcare Management System Modernization (DHMSM)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization

  2. Genetic privacy in sports: clearing the hurdles.

    Science.gov (United States)

    Callier, Shawneequa

    2012-12-01

    As genomic medicine continues to advance and inform clinical care, knowledge gained is likely to influence sports medicine and training practices. Susceptibility to injury, sudden cardiac failure, and other serious conditions may one day be tackled on a subclinical level through genetic testing programs. In addition, athletes may increasingly consider using genetic testing services to maximize their performance potential. This paper assesses the role of privacy and genetic discrimination laws that would apply to athletes who engage in genetic testing and the limits of these protections.

  3. Factors and Predictors of Online Security and Privacy Behavior

    Directory of Open Access Journals (Sweden)

    Goran Bubaš

    2008-12-01

    Full Text Available Assumptions and habits regarding computer and Internet use are among the major factors which influence online privacy and security of Internet users. In our study a survey was performed on 312 subjects (college students who are Internet users with IT skills that investigated how assumptions and habits of Internet users are related to their online security and privacy. The following four factors of online security and privacy related behaviors were revealed in factor analysis: F1 – conscientiousness in the maintenance of the operating system, upgrading of the Internet browser and use of antivirus and antispyware programs; F2 –engagement in risky and careless online activities with lack of concern for personal online privacy; F3 – disbelief that privacy violations and security threats represent possible problems; F4 – lack of fear regarding potential privacy and security threats with no need for change in personal online behavior. Statistically significant correlations were found between some of the discovered factors on the one side, and criteria variables occurrence of malicious code (C1 and data loss on the home computer (C2 on the other. In addition, a regression analysis was performed which revealed that the potentially risky online behaviors of Internet users were associated with the two criteria variables. To properly interpret the results of correlation and regression analyses a conceptual model was developed of the potential causal relationships between the behavior of Internet users and their experiences with online security threats. An additional study was also performed which partly confirmed the conceptual model, as well as the factors of online security and privacy related behaviors.

  4. Preserving Privacy in Transparency Logging

    OpenAIRE

    Pulls, Tobias

    2015-01-01

    The subject of this dissertation is the construction of privacy-enhancing technologies (PETs) for transparency logging, a technology at the intersection of privacy, transparency, and accountability. Transparency logging facilitates the transportation of data from service providers to users of services and is therefore a key enabler for ex-post transparency-enhancing tools (TETs). Ex-post transparency provides information to users about how their personal data have been processed by service pr...

  5. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  6. 78 FR 66709 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2013-11-06

    ... General Counsel at (202) 649-3804. II. Introduction This notice satisfies the Privacy Act requirement that... property interests, identity theft or fraud, or harm to the security or integrity of this system or other... or fraud, or harm to the security or integrity of this system or other systems or programs (whether...

  7. Personal Privacy in an Information Society. Final Report.

    Science.gov (United States)

    Privacy Protection Study Commission, Washington, DC.

    This report of the Privacy Protection Study Commission was prepared in response to a Congressional mandate to study data banks, automatic data processing programs, and information systems of governmental, regional and private organizations to determine standards and procedures in force for the protection of personal information. Recommendations…

  8. A Flow-Sensitive Analysis of Privacy Properties

    DEFF Research Database (Denmark)

    Nielson, Hanne Riis; Nielson, Flemming

    2007-01-01

    that information I send to some service never is leaked to another service? - unless I give my permission? We shall develop a static program analysis for the pi- calculus and show how it can be used to give privacy guarantees like the ones requested above. The analysis records the explicit information flow...

  9. 78 FR 41917 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-12

    ..., Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150. Request should... Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager,...

  10. 78 FR 31905 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-05-28

    ..., Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150. Request should... Manager, Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150... Finance and Accounting Service, Freedom of Information/Privacy Act Program Manager,...

  11. 78 FR 14283 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-03-05

    ..., Corporate Communications, DFAS-HKC/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150 or at (317) 212-4591..., Corporate Communications, DFAS-ZCF/IN, 8899 E. 56th Street, Indianapolis, IN 46249-0150. Requests should... and Accounting Service, Freedom of Information/Privacy Act Program Manager, Corporate...

  12. 77 FR 65564 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2012-10-29

    ... outside the agency, and how individual record subjects can exercise their rights under the Privacy Act (e... practical for the purposes of administering IHS programs, policies, regulations, rules, executive orders... imminent violation of the law whether civil, criminal, or regulatory in nature and whether arising...

  13. Defense Acquisition Policy and Defense Industrial Base Reinforcement Strategy - Enhancing the International Competitiveness of the Korean National Defense Industry

    Science.gov (United States)

    2008-04-23

    Korea Defense Industry Association (KDIA). (2007). Annual management review of Korean Defense Industry. Seoul: Author. Lee, D.O. (2000...COMPETITIVENESS OF THE KOREAN NATIONAL DEFENSE INDUSTRY Published: 23 April 2008 by Dr. Dae Ok Lee 5th Annual Acquisition Research Symposium of the...International Competitiveness of the Korean National Defense Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d

  14. Privacy in the Genomic Era

    Science.gov (United States)

    NAVEED, MUHAMMAD; AYDAY, ERMAN; CLAYTON, ELLEN W.; FELLAY, JACQUES; GUNTER, CARL A.; HUBAUX, JEAN-PIERRE; MALIN, BRADLEY A.; WANG, XIAOFENG

    2015-01-01

    Genome sequencing technology has advanced at a rapid pace and it is now possible to generate highly-detailed genotypes inexpensively. The collection and analysis of such data has the potential to support various applications, including personalized medical services. While the benefits of the genomics revolution are trumpeted by the biomedical community, the increased availability of such data has major implications for personal privacy; notably because the genome has certain essential features, which include (but are not limited to) (i) an association with traits and certain diseases, (ii) identification capability (e.g., forensics), and (iii) revelation of family relationships. Moreover, direct-to-consumer DNA testing increases the likelihood that genome data will be made available in less regulated environments, such as the Internet and for-profit companies. The problem of genome data privacy thus resides at the crossroads of computer science, medicine, and public policy. While the computer scientists have addressed data privacy for various data types, there has been less attention dedicated to genomic data. Thus, the goal of this paper is to provide a systematization of knowledge for the computer science community. In doing so, we address some of the (sometimes erroneous) beliefs of this field and we report on a survey we conducted about genome data privacy with biomedical specialists. Then, after characterizing the genome privacy problem, we review the state-of-the-art regarding privacy attacks on genomic data and strategies for mitigating such attacks, as well as contextualizing these attacks from the perspective of medicine and public policy. This paper concludes with an enumeration of the challenges for genome data privacy and presents a framework to systematize the analysis of threats and the design of countermeasures as the field moves forward. PMID:26640318

  15. 76 FR 67763 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-11-02

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  16. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  17. 78 FR 77719 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2013-12-24

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National Aeronautics and Space Administration is...

  18. 76 FR 64115 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of the retirement of one Privacy Act system of records notice. SUMMARY: In accordance with the Privacy Act of 1974, NASA is giving notice that it proposes to...

  19. 75 FR 81205 - Privacy Act: Revision of Privacy Act Systems of Records

    Science.gov (United States)

    2010-12-27

    ... Office of the Secretary Privacy Act: Revision of Privacy Act Systems of Records AGENCY: Office of the Secretary, USDA. ACTION: Notice to Revise Privacy Act Systems of Records. SUMMARY: Notice is hereby given that the United States Department of Agriculture (USDA) proposes to revise two Privacy Act Systems of...

  20. 76 FR 64114 - Privacy Act of 1974; Privacy Act System of Records

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Notice of proposed revisions to an existing Privacy Act system of records. SUMMARY: Pursuant to the provisions of the Privacy Act of 1974 (5 U.S.C. 552a), the National...

  1. 76 FR 64112 - Privacy Act of 1974; Privacy Act System of Records Appendices

    Science.gov (United States)

    2011-10-17

    ... SPACE ADMINISTRATION Privacy Act of 1974; Privacy Act System of Records Appendices AGENCY: National Aeronautics and Space Administration (NASA). ACTION: Revisions of NASA Appendices to Privacy Act System of... publishes with the Agency's systems of records under the Privacy Act of 1974. This notice publishes those...

  2. The privacy coach: Supporting customer privacy in the internet of things

    NARCIS (Netherlands)

    Broenink, E.G.; Hoepman, J.H.; Hof, C. van 't; Kranenburg, R. van; Smits, D.; Wisman, T.

    2010-01-01

    The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase customer privacy is a radical departure from the mainstream research efforts that focus on implementing privacy enhancing

  3. Program Manager: Journal of the Defense Systems Management College. Volume 23, Number 1, January-February 1994

    Science.gov (United States)

    1994-02-01

    Jones, Jr. PROGRAM MANAGER Managing Editor Esther M. Farria Art Director Greg Caruth Typography and Design Paula Croisetlere Program Manager (ISSN 0199...Company bombers to implement the strategic organization - President Clayton 1. Brukner commu- bombing doctrine. This would take all brand -new cre

  4. Internet privacy options for adequate realisation

    CERN Document Server

    2013-01-01

    A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.

  5. U.S. Department of Energy Space and Defense Power Systems Program Ten-Year Strategic Plan, Volume 1 and Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    Dwight, Carla

    2013-06-01

    The Department of Energy's Space and Defense Power Systems program provides a unique capability for supplying power systems that function in remote or hostile environments. This capability has been functioning since the early 1960s and counts the National Aeronautics and Space Administration as one of its most prominent customers. This enabling technology has assisted the exploration of our solar system including the planets Jupiter, Saturn, Mars, Neptune, and soon Pluto. This capability is one-of-kind in the world in terms of its experience (over five decades), breadth of power systems flown (over two dozen to date) and range of power levels (watts to hundreds of watts). This document describes the various components of that infrastructure, work scope, funding needs, and its strategic plans going forward.

  6. Fetal privacy and confidentiality.

    Science.gov (United States)

    Botkin, J R

    1995-01-01

    With the advent of new and better contraceptive methods and the ability to facilitate and manipulate fertilization and gestation, couples will gain greater control over their fertility. Once a pregnancy has been established or an in vitro embryo created, the ability to evaluate the embryo and fetus will increase dramatically with progress in human genetic research. Preconception and preimplantation genetic testing and screening are now possible, and the technology to perform prenatal screening early in gestation is advancing rapidly. Nonsurgical methods facilitate induced abortion with a relatively lower degree of trauma upon the woman undergoing the procedure. These capabilities may all be used to enable and even encourage the genetic selection of future children. Despite the ethical concerns associated with prenatal testing and abortion, these services will continue to be an integral aspect of reproductive medicine. As technology advances, however, it will be possible to test and screen for conditions which do not produce serious defects. Genetic conditions which produce relatively mild impacts upon health will be identifiable in the embryo or fetus, while late-onset conditions and genetic factors which have only a probability of affecting health will also be located in the fetal genome. Prospective parents may therefore soon have the capability of selecting their most desirable embryo in vitro, or terminating all undesirable fetuses in vivo until the preferred child is delivered. The medical profession must take some responsibility for establishing guidelines on the use of reproductive technology. The standards of practice for the medical profession must reflect the results of a broad social debate over competing moral values. The author develops an argument for legal and ethical limitations on the application of prenatal testing and screening technology, suggesting that for some medical conditions, respect for the privacy and confidentiality of the fetus

  7. Evidence on the Effect of DoD Acquisition Policy and Process on Cost Growth of Major Defense Acquisition Programs

    Science.gov (United States)

    2014-09-01

    reports the number of programs with an average PAUC growth of at least 50 percent. Of the fifty -four programs that passed MS II/B in a Relatively...six cases ( shaded rows). In all but one of these cases (Joint Direct Attack Munition, or JDAM) the differences are absolutely or relatively small. The...same pattern. The average of the DLC estimates is 73 percent, and four of them ( shaded rows) are less than the PA&E estimate for the program, three

  8. On genomics, kin, and privacy.

    Science.gov (United States)

    Telenti, Amalio; Ayday, Erman; Hubaux, Jean Pierre

    2014-01-01

    The storage of greater numbers of exomes or genomes raises the question of loss of privacy for the individual and for families if genomic data are not properly protected. Access to genome data may result from a personal decision to disclose, or from gaps in protection. In either case, revealing genome data has consequences beyond the individual, as it compromises the privacy of family members. Increasing availability of genome data linked or linkable to metadata through online social networks and services adds one additional layer of complexity to the protection of genome privacy.  The field of computer science and information technology offers solutions to secure genomic data so that individuals, medical personnel or researchers can access only the subset of genomic information required for healthcare or dedicated studies.

  9. 24 CFR 3280.107 - Interior privacy.

    Science.gov (United States)

    2010-04-01

    ... 24 Housing and Urban Development 5 2010-04-01 2010-04-01 false Interior privacy. 3280.107 Section 3280.107 Housing and Urban Development Regulations Relating to Housing and Urban Development (Continued... privacy. Bathroom and toilet compartment doors shall be equipped with a privacy lock. ...

  10. 31 CFR 0.216 - Privacy Act.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Privacy Act. 0.216 Section 0.216... RULES OF CONDUCT Rules of Conduct § 0.216 Privacy Act. Employees involved in the design, development, operation, or maintenance of any system of records or in maintaining records subject to the Privacy Act of...

  11. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  12. Video Surveillance: Privacy Issues and Legal Compliance

    DEFF Research Database (Denmark)

    Mahmood Rajpoot, Qasim; Jensen, Christian D.

    2015-01-01

    . There is a need to balance the usage of video surveillance against its negative impact on privacy. This chapter aims to highlight the privacy issues in video surveillance and provides a model to help identify the privacy requirements in a video surveillance system. The authors make a step in the direction...

  13. Sexiled: Privacy Acquisition Strategies of College Roommates

    Science.gov (United States)

    Erlandson, Karen

    2014-01-01

    This study sought to understand how roommates make privacy bids in college residence halls. The results indicate that privacy for sexual activity is a problem for students living in college residence halls, as almost all participants (82%) reported having dealt with this issue. Two sets of responses were collected and analyzed: privacy acquisition…

  14. Enhancing Privacy for Digital Rights Management

    NARCIS (Netherlands)

    Petkovic, M.; Conrado, C.; Schrijen, G.J.; Jonker, W.

    2007-01-01

    This chapter addresses privacy issues in DRM systems. These systems provide a means of protecting digital content, but may violate the privacy of users in that the content they purchase and their actions in the system can be linked to specific users. The chapter proposes a privacy-preserving DRM sys

  15. A Computer-Aided Instruction Program for Teaching the TOPS20-MM Facility on the DDN (Defense Data Network)

    Science.gov (United States)

    1988-06-01

    provide learning-by-doing, which means a student aquires knowledge by solving real-world problems [Ref. 21. To tutor well, a system has to specify...apply artificial intelligence (AI) techniques. AI research such as natural- language understanding, knowledge representation, and inferencing, have been...programming language by providing a programming environment and online help facility. It has a tutoring module called Soft Tutor that examines the

  16. Smartdata privacy meets evolutionary robotics

    CERN Document Server

    Harvey, Inman; Tomko, George

    2013-01-01

    Privacy by Design and the Promise of SmartData.- SmartData: the Need, the Goal and the Challenge.- Perspectives on Artificial Intelligence.- Context dependent information processing entails scale-free dynamics.- Philosophy and SmartData.- Relevance Realization and the Neurodynamics and Neural Connectivity of General Intelligence.- What Matters: Real Bodies and Virtual Worlds.- The development of autonomous virtual agents.- Patterns of Attractors in the "Brain"".- A Privacy-Enabled Mobile Computing Model Using Intelligent Cloud-Based Services.- Unconstraint the Population: the Benefits of Horiz

  17. REMOTE IN-CELL SAMPLING IMPROVEMENTS PROGRAM AT THESAVANNAH RIVER SITE (SRS) DEFENSE WASTE PROCESSING FACILITY (DWPF)

    Energy Technology Data Exchange (ETDEWEB)

    Marzolf, A

    2007-11-26

    Remote Systems Engineering (RSE) of the Savannah River National Lab (SRNL) in combination with the Defense Waste Processing Facility(DWPF) Engineering and Operations has evaluated the existing equipment and processes used in the facility sample cells for 'pulling' samples from the radioactive waste stream and performing equipment in-cell repairs/replacements. RSE has designed and tested equipment for improving remote in-cell sampling evolutions and reducing the time required for in-cell maintenance of existing equipment. The equipment within the present process tank sampling system has been in constant use since the facility start-up over 17 years ago. At present, the method for taking samples within the sample cells produces excessive maintenance and downtime due to frequent failures relative to the sampling station equipment and manipulator. Location and orientation of many sampling stations within the sample cells is not conducive to manipulator operation. The overextension of manipulators required to perform many in-cell operations is a major cause of manipulator failures. To improve sampling operations and reduce downtime due to equipment maintenance, a Portable Sampling Station (PSS), wireless in-cell cameras, and new commercially available sampling technology has been designed, developed and/or adapted and tested. The uniqueness of the design(s), the results of the scoping tests, and the benefits relative to in-cell operation and reduction of waste are presented.

  18. Privacy Preserving Linear Regression on Distributed Databases

    Directory of Open Access Journals (Sweden)

    Fida K. Dankar

    2015-04-01

    Full Text Available Studies that combine data from multiple sources can tremendously improve the outcome of the statistical analysis. However, combining data from these various sources for analysis poses privacy risks. A number of protocols have been proposed in the literature to address the privacy concerns; however they do not fully deliver on either privacy or complexity. In this paper, we present a (theoretical privacy preserving linear regression model for the analysis of data owned by several sources. The protocol uses a semi-trusted third party and delivers on privacy and complexity.

  19. Adding Query Privacy to Robust DHTs

    DEFF Research Database (Denmark)

    Backes, Michael; Goldberg, Ian; Kate, Aniket

    2011-01-01

    of obtaining query privacy over robust DHTs. Finally, we compare the performance of our privacy-preserving protocols with their more privacy-invasive counterparts. We observe that there is no increase in the message complexity and only a small overhead in the computational complexity....... intermediate peers that (help to) route the queries towards their destinations. In this paper, we satisfy this requirement by presenting an approach for providing privacy for the keys in DHT queries. We use the concept of oblivious transfer (OT) in communication over DHTs to preserve query privacy without...

  20. Three Approaches to Space Systems Acquisitions and their Application to the Defense Department’s Weather Satellite Program

    Science.gov (United States)

    2012-03-01

    by Toyota in the manufacturing world, such as just-in-time, kaizen , one-piece flow, jidoka, and heijunka. These techniques helped spawn the “lean...relentless reflection (hansei) and continuous improvement ( kaizen ) Similar to Principle 2, this principle shares similarity with space program

  1. Program Manager: Journal of the Defense Systems Management College, Volume 22, Number 5, September-October 1993

    Science.gov (United States)

    1993-10-01

    PROGRAM MANAGER Mangig diorPARADIGM SHIFT Catherine M. Clark Associate Editor E Esther M. Farria Art Director Greg Caruth Typography and Design Paula...Director, DSMC showing the title, author, TR number and DSMC logo Press, for publication consideration. No prearrange- and similar title page. ments are

  2. 78 FR 46256 - Privacy Act

    Science.gov (United States)

    2013-07-31

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ELECTION COMMISSION 11 CFR Part 1 Privacy Act CFR Correction In Title 11 of the Code of Federal Regulations, revised as of January 1, 2012, on page 5, in Sec. 1.2, the words ``95 and 96 of the Internal Revenue Code of...

  3. The European Approach to Privacy

    NARCIS (Netherlands)

    van Hoboken, J.

    2014-01-01

    This paper critically assesses the character of European (Union’s) privacy law and policy in the field of online media and electronic communications. Contrary to current understanding, this field of law is more fragmented and ill-developed than is often assumed, in particular by those discussing pri

  4. Panel: RFID Security and Privacy

    Science.gov (United States)

    Fu, Kevin

    The panel on RFID security and privacy included Ross Anderson, Jon Callas, Yvo Desmedt, and Kevin Fu. Topics for discussion included the "chip and PIN" EMV payment systems, e-Passports, "mafia" attacks, and RFID-enabled credit cards. Position papers by the panelists appear in the following pages, and the RFID-enabled credit card work appears separately in these proceedings.

  5. Patient privacy and social media.

    Science.gov (United States)

    Hader, Amy L; Brown, Evan D

    2010-08-01

    Healthcare providers using social media must remain mindful of professional boundaries and patients' privacy rights. Facebook and other online postings must comply with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), applicable facility policy, state law, and AANA's Code of Ethics.

  6. Privacy is an essentially contested concept: a multi-dimensional analytic for mapping privacy.

    Science.gov (United States)

    Mulligan, Deirdre K; Koopman, Colin; Doty, Nick

    2016-12-28

    The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy's disputes are neither an accidental feature of the concept nor a lamentable condition of its applicability. Privacy is essentially contested. Because it is, privacy is transformable according to changing technological and social conditions. To make productive use of privacy's essential contestability, we argue for a new approach to privacy research and practical design, focused on the development of conceptual analytics that facilitate dissecting privacy's multiple uses across multiple contexts.This article is part of the themed issue 'The ethical impact of data science'. © 2016 The Author(s).

  7. Acquisition Program Risk Management: Does the Department of Defense Risk Management Practices Guide Provide an Effective Risk Tool for Program Managers in Today’s Acquisition Environment?

    Science.gov (United States)

    2012-05-01

    Management Definition ........................................................................................... 32 Table 16. Risk Management Tracking...Other (please specify) 5 Table 15. Risk Management Definition Question 7: Does your Program Office or Risk Management IPT track risks for cost...aligned to collect information on program risk definition. Question 6 was designed to collect information on risk management definition . Participants

  8. Further Evidence on the Effect of Acquisition Policy and Process on Cost Growth of Major Defense Acquisition Programs

    Science.gov (United States)

    2016-06-01

    Acquisition Reform, 1969 to 2009, 38, following Gordon Adams, Paul Murphy, and William Grey Rosenau, Controlling Weapons Costs: Can Pentagon Reforms Work...New York: Council on Economic Priorities, 1983), 19–20. A TPP contract is one that covers EMD, at least a significant portion of procurement, and...mechanism for ongoing managerial control.” This is accurate in that the Packard reforms placed management of the programs in the hands of the Services

  9. Program Manager: Journal of the Defense Systems Management College, Volume 19, Number 6, November-December 1990

    Science.gov (United States)

    1990-12-01

    rejuvenated you’ll hear they are genuinely proud Western European Union (WEU) is # to be part of this determincd move- asserting itself as a unifying force I...corresponding to their vital interests economies through the benefits of for operating an open Europea , and their possibilities. Therefore open competition...EUROPEAN EUROPEAN COMMUNITY PROGRAM UNION GROUP COMMON REQUIREMENTS CAPS PANEL1 (ECONOMIES OF SCALE) I AND PROJECT I COORDINATION I (REDUCTION OF

  10. Further Evidence on the Effect of Acquisition Policy and Process on Cost Growth of Major Defense Acquisition Programs

    Science.gov (United States)

    2016-06-01

    account parallel analyses for the boom periods and the comparisons of cost growth in bust and boom periods for a given acquisition regime (Appendix E...funds. Only the former are used in computing quantity- adjusted RDT&E cost growth. Our procedure was simply to compute the ratio of the Current ...Group CAPE Cost Assessment and Program Evaluation CD Compact Disc CE Current Estimate CLC Calibrated Learning Curve CPIF Cost Plus Incentive Fee

  11. Efforts and Programs of the Department of Defense Relating to the Prevention, Mitigation, and Treatment of Blast Injuries

    Science.gov (United States)

    2007-01-01

    Regeneration of Orthopedic Tissues for Military Applications: This project tests LifeCell’s hybrid ACL ( anterior cruciate ligament ) graft using a...of prosthetic technology and improvement in occupational and physical therapies . These efforts will leverage the three DoD Amputee Centers as...events. Extremity • Rehabilitation – Therapy : Conduct more physical and occupational therapy research. Efforts and Programs of the Department of

  12. Program Manager - Journal of the Defense Systems Management College, Volume 24, Number 1, DSMC 124, January-February 1995.

    Science.gov (United States)

    1995-02-01

    and avi- contingencies, in the continental (Ret) Marquez ). onics equipment! We’re also relieved United States (CONUS) and over- of the need to put 50...TO THE EDITOR I read with interest the short discussion in the jul- Staff General Gabriel and then Secretary of the Air Aug 94 issue of Program...p. 21. Garcia , p. 17. * Why DoD Should Move Toward Commercial * Evolution of Configuration Management-William J. Practices-Dr. Walter B. LaBerge, p

  13. On the relation between Differential Privacy and Quantitative Information Flow

    CERN Document Server

    Alvim, Mário S; Chatzikokolakis, Konstantinos; Palamidessi, Catuscia; 10.1007/978-3-642-22012-8_4

    2011-01-01

    Differential privacy is a notion that has emerged in the community of statistical databases, as a response to the problem of protecting the privacy of the database's participants when performing statistical queries. The idea is that a randomized query satisfies differential privacy if the likelihood of obtaining a certain answer for a database $x$ is not too different from the likelihood of obtaining the same answer on adjacent databases, i.e. databases which differ from $x$ for only one individual. Information flow is an area of Security concerned with the problem of controlling the leakage of confidential information in programs and protocols. Nowadays, one of the most established approaches to quantify and to reason about leakage is based on the R\\'enyi min entropy version of information theory. In this paper, we analyze critically the notion of differential privacy in light of the conceptual framework provided by the R\\'enyi min information theory. We show that there is a close relation between differenti...

  14. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  15. Location-Related Privacy in Geo-Social Networks

    DEFF Research Database (Denmark)

    Ruiz Vicente, Carmen; Freni, Dario; Bettini, Claudio

    2011-01-01

    -ins." However, this ability to reveal users' locations causes new privacy threats, which in turn call for new privacy-protection methods. The authors study four privacy aspects central to these social networks - location, absence, co-location, and identity privacy - and describe possible means of protecting...... privacy in these circumstances....

  16. Quantifying Differential Privacy under Temporal Correlations

    Science.gov (United States)

    Cao, Yang; Yoshikawa, Masatoshi; Xiao, Yonghui; Xiong, Li

    2017-01-01

    Differential Privacy (DP) has received increasing attention as a rigorous privacy framework. Many existing studies employ traditional DP mechanisms (e.g., the Laplace mechanism) as primitives, which assume that the data are independent, or that adversaries do not have knowledge of the data correlations. However, continuous generated data in the real world tend to be temporally correlated, and such correlations can be acquired by adversaries. In this paper, we investigate the potential privacy loss of a traditional DP mechanism under temporal correlations in the context of continuous data release. First, we model the temporal correlations using Markov model and analyze the privacy leakage of a DP mechanism when adversaries have knowledge of such temporal correlations. Our analysis reveals that the privacy loss of a DP mechanism may accumulate and increase over time. We call it temporal privacy leakage. Second, to measure such privacy loss, we design an efficient algorithm for calculating it in polynomial time. Although the temporal privacy leakage may increase over time, we also show that its supremum may exist in some cases. Third, to bound the privacy loss, we propose mechanisms that convert any existing DP mechanism into one against temporal privacy leakage. Experiments with synthetic data confirm that our approach is efficient and effective. PMID:28883711

  17. A Scenario Tree based Stochastic Programming Approach for Multi-Stage Weapon Equipment Mix Production Planning in Defense Manufacturing

    Directory of Open Access Journals (Sweden)

    Li Xuan

    2016-01-01

    Full Text Available The evolving military capability requirements (CRs must be meted continuously by the multi-stage weapon equipment mix production planning (MWEMPP. Meanwhile, the CRs possess complex uncertainties with the variant military tasks in the whole planning horizon. The mean-value deterministic programming technique is difficult to deal with the multi-period and multi-level uncertain decision-making problem in MWEMPP. Therefore, a multi-stage stochastic programming approach is proposed to solve this problem. This approach first uses the scenario tree to quantitatively describe the bi-level uncertainty of the time and quantity of the CRs, and then build the whole off-line planning alternatives assembles for each possible scenario, at last the optimal planning alternative is selected on-line to flexibly encounter the real scenario in each period. A case is studied to validate the proposed approach. The results confirm that the proposed approach can better hedge against each scenario of the CRs than the traditional mean-value deterministic technique.

  18. Privacy Preserving Content Protection (Privacy behoud content protection)

    OpenAIRE

    Deng, Mina

    2010-01-01

    De vooruitgang van informatie- en communicatietechnologie in de laatste decennia heeft de manier waarop informatie wordt verzameld en verwerkt grondig beїnvloed. Dit roept echter ook vraagtekens op rond de manier waarop met privacy wordt omgegaan. De komst van digitale technologieën, het gemak waarmee ongeoorloofde kopieën kunnen worden geproduceerd, en de toegang tot digitale inhoud -- leidend tot commerciële inbreuken -- motiveren de nood om content protection (inhoudsbeschermende) te...

  19. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  20. A Novel Cloud Computing Algorithm of Security and Privacy

    OpenAIRE

    Chih-Yung Chen; Jih-Fu Tu

    2013-01-01

    The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk...

  1. Survey of US Department of Defense Manufacturing Technology Program activities applicable to civilian manufacturing industries. Final report

    Energy Technology Data Exchange (ETDEWEB)

    Azimi, S.A.; Conrad, J.L.; Reed, J.E.

    1985-03-01

    Intent of the survey was to identify and characterize activities potentially applicable to improving energy efficiency and overall productivity in the civilian manufacturing industries. The civilian industries emphasized were the general manufacturing industries (including fabricated metals, glass, machinery, paper, plastic, textile, and transportation equipment manufacturing) and the primary metals industries (including primary aluminum, copper, steel, and zinc production). The principal steps in the survey were to: develop overview taxonomies of the general manufacturing and primary metals industries as well as specific industry taxonomies; identify needs and opportunities for improving process energy efficiency and productivity in the industries included; identify federal programs, capabilities, and special technical expertise that might be relevant to industry's needs and opportunities; contact federal laboratories/facilities, through visits and other forms of inquiry; prepare formatted profiles (descriptions) potentially applicable work efforts; review findings with industry; and compile and evaluate industry responses.

  2. The Effects of Management Initiatives on the Costs and Schedules of Defense Acquisition Programs. Volume 2. Analyses of Ground Combat and Ship Programs

    Science.gov (United States)

    1992-11-01

    negotiate a sales agreement with Turkey, the missiles were ___ 1~2.~~____ _____ __ I handed over to a unit of the New Mexico National Guard, The unit was...87 End Date Sep-89 Sep-06 Sep-06 Qnanthy, N/A N/AN/ Program Status Development-Completed Prduction - -3 yas of data Note: N/A moans not applicable. d...Quantity 12 18 12 Cost $146.5 $337.2 $239.1 3 Total Program Cost $205.9 $443.0 $344.9 Average Unit Cost Prduction $12.2 $18,7 $13,3 Total Pmgrn $17.2 $24.6

  3. A Network Security and Defense Program Based on Ad Hoc%一种基于Ad Hoc的网络安全防御方案

    Institute of Scientific and Technical Information of China (English)

    黄成兵; 陈明东

    2012-01-01

    Analying of Wireless Ad Hoc networks play an important role in society, and its facing a variety of security threats, this paper discusses the advantages and limitations of various network security solutions and technologies for wireless Ad Hoc networks , proposes an in-depth security defense program and explains its implementation process, while points out some of the problems of wireless Ad Hoc networks need to be resolved in the security field.%分析无线Ad Hoc网络在社会中发挥的重要作用及其面临的多种安全威胁,讨论目前各种网络安全解决方案和技术的优点及局限性,提出一种针对无线Ad Hoc网络的纵深安全防御方案并阐述其执行过程,同时指出无线Ad Hoc网络在安全领域急需解决的一些问题.

  4. Privacy im Social Semantic Web

    Science.gov (United States)

    Nagenborg, Michael

    Der Schwerpunkt dieses Beitrages liegt auf dem Design von Infrastrukturen, welche es ermöglichen sollen, private Daten kontrolliert preiszugeben und auszutauschen. Zunächst wird daran erinnert, dass rechtliche und technische Maßnahmen zum Datenschutz stets auch dazu dienen, den Austausch von Daten zu ermöglichen. Die grundlegende Herausforderung besteht darin, der sozialen und politischen Bedeutung des Privaten Rechnung zu tragen. Privatheit wird aus der Perspektive der Informationsethik dabei als ein normatives, handlungsleitendes Konzept verstanden. Als Maßstab für die Gestaltung der entsprechenden Infrastrukturen wird auf Helen Nissenbaums Konzept der privacy as contextual integrity" zurückgegriffen, um u. a. die Ansätze der end-to-end information accountability" [38] und des Privacy Identity Management for Europe"- Projektes zu diskutieren.

  5. Genetic privacy: orthodoxy or oxymoron?

    Science.gov (United States)

    Sommerville, A; English, V

    1999-01-01

    In this paper we question whether the concept of "genetic privacy" is a contradiction in terms. And, if so, whether the implications of such a conclusion, inevitably impact on how society comes to perceive privacy and responsibility generally. Current law and ethical discourse place a high value on self-determination and the rights of individuals. In the medical sphere, the recognition of patient "rights" has resulted in health professionals being given clear duties of candour and frankness. Dilemmas arise, however, when patients decline to know relevant information or, knowing it, refuse to share it with others who may also need to know. This paper considers the notions of interconnectedness and responsibility to others which are brought to the fore in the genetic sphere and which challenge the primacy afforded to personal autonomy. It also explores the extent to which an individual's perceived moral obligations can or should be enforced. PMID:10226920

  6. Privacy Implications of Surveillance Systems

    DEFF Research Database (Denmark)

    Thommesen, Jacob; Andersen, Henning Boje

    2009-01-01

    This paper presents a model for assessing the privacy „cost‟ of a surveillance system. Surveillance systems collect and provide personal information or observations of people by means of surveillance technologies such as databases, video or location tracking. Such systems can be designed...... by analyzing a location-based system for airport passengers developed for a Copenhagen Airport, and the dimensions are used to explain user reactions to different services offered by the system....... for various purposes, even as a service for those being observed, but in any case they will to some degree invade their privacy. The model provided here can indicate how invasive any particular system may be – and be used to compare the invasiveness of different systems. Applying a functional approach...

  7. Physcomitrella patens activates reinforcement of the cell wall, programmed cell death and accumulation of evolutionary conserved defense signals...upon Botrytis cinerea infection

    Science.gov (United States)

    The moss Physcomitrella patens is an evolutionarily basal model system suitable to analyze plant defense responses activated after pathogen assault. Upon infection with the necrotroph Botrytis cinerea (B. cinerea), several defense mechanisms are induced in P. patens, including the fortification of t...

  8. Online Privacy as a Corporate Social Responsibility

    DEFF Research Database (Denmark)

    Pollach, Irene

    2011-01-01

    Information technology and the Internet have added a new stakeholder concern to the corporate social responsibility agenda: online privacy. While theory suggests that online privacy is a corporate social responsibility, only very few studies in the business ethics literature have connected...... these two. Based on a study of corporate social responsibility disclosures, this article contributes to the existing literature by exploring whether and how the largest IT companies embrace online privacy as a corporate social responsibility. The findings indicate that only a small proportion...... of approaches to addressing privacy was found, which suggests that no institutionalization of privacy practices has taken place yet. The study therefore indicates that online privacy is rather new on the corporate social responsibility agenda, currently playing only a minor role....

  9. Privacy and security in teleradiology.

    Science.gov (United States)

    Ruotsalainen, Pekka

    2010-01-01

    Teleradiology is probably the most successful eHealth service available today. Its business model is based on the remote transmission of radiological images (e.g. X-ray and CT-images) over electronic networks, and on the interpretation of the transmitted images for diagnostic purpose. Two basic service models are commonly used teleradiology today. The most common approach is based on the message paradigm (off-line model), but more developed teleradiology systems are based on the interactive use of PACS/RIS systems. Modern teleradiology is also more and more cross-organisational or even cross-border service between service providers having different jurisdictions and security policies. This paper defines the requirements needed to make different teleradiology models trusted. Those requirements include a common security policy that covers all partners and entities, common security and privacy protection principles and requirements, controlled contracts between partners, and the use of security controls and tools that supporting the common security policy. The security and privacy protection of any teleradiology system must be planned in advance, and the necessary security and privacy enhancing tools should be selected (e.g. strong authentication, data encryption, non-repudiation services and audit-logs) based on the risk analysis and requirements set by the legislation. In any case the teleradiology system should fulfil ethical and regulatory requirements. Certification of the whole teleradiology service system including security and privacy is also proposed. In the future, teleradiology services will be an integrated part of pervasive eHealth. Security requirements for this environment including dynamic and context aware security services are also discussed in this paper.

  10. Privacy-preserving distributed clustering

    DEFF Research Database (Denmark)

    Erkin, Zekeriya; Veugen, Thijs; Toft, Tomas

    2013-01-01

    by taking the distributed structure of the system into account and improving the efficiency in terms of computation and communication by data packing. While our construction can be easily adjusted to a centralized or a distributed computing model, we rely on a set of particular users that help the service...... provider with computations. Experimental results clearly indicate that the work we present is an efficient way of deploying a privacy-preserving clustering algorithm in a distributed manner....

  11. Fictional privacy among Facebook users.

    Science.gov (United States)

    Lemieux, Robert

    2012-08-01

    The current study involved the creation of a fictional Facebook account with limited information and was designed to assess whether participants would accept the friendship of an ambiguous, unknown person. Results indicated that 325 Facebook members (72% of the sample) willingly accepted the friendship of the unknown individual. Results are discussed in relation to privacy concerns, norms of reciprocity, and allowing access to potentially embarrassing information and/or pictures.

  12. Online Tracking Technologies and Web Privacy:Technologieën voor Online volgen en Web Privacy

    OpenAIRE

    Acar, Mustafa Gunes Can

    2017-01-01

    In my PhD thesis, I would like to study the problem of online privacy with a focus on Web and mobile applications. Key research questions to be addressed by my study are the following: How can we formalize and quantify web tracking? What are the threats presented against privacy by different tracking techniques such as browser fingerprinting and cookie based tracking? What kind of privacy enhancing technologies (PET) can be used to ensure privacy without degrading service quality? The stud...

  13. Privacy-shake”: a haptic interface for managing privacy settings in mobile location sharing applications

    OpenAIRE

    Jedrzejczyk, Lukasz; Price, Blaine; Bandara, Arosha; Nuseibeh, Bashar

    2010-01-01

    peer-reviewed We describe the ???Privacy-Shake???, a novel interface for managing coarse grained privacy settings. We built a prototype that enables users of Buddy Tracker, an example location sharing application, to change their privacy preferences by shaking their phone. Users can enable or disable location sharing and change the level of granularity of disclosed location by shaking and sweeping their phone. In this poster we present and motivate our work on Privacy-Shake and report on a...

  14. Addressing the Privacy Paradox by Expanded Privacy Awareness - The Example of Context-Aware Services

    OpenAIRE

    Deuker, André

    2010-01-01

    International audience; When interacting with applications, users are less restrictive in disclosing their personal data than if asked in an application-independent context. On a more general level this behavior is termed as privacy paradox. The creation of privacy awareness can assist users in dealing with context-aware services without harming their privacy unintentionally, thereby addressing the privacy paradox. The paper in hand provides a research approach towards the integration of priv...

  15. "I am Spartacus":Privacy Enhancing Technologies, Collaborative Obfuscation and Privacy as a Public Good

    OpenAIRE

    Kwecka, Z.; Buchanan, W.; Schafer, B; Rauhofer, J.

    2014-01-01

    The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This idea finds its correspondence in our approach to privacy protection through obfuscation, where everybody in a group takes a small privacy risk to protect the anonymity of fellow group members. We show how these ideas can be computationally realised in an Investigative Data Acquisition Platform (IDAP). IDAP is an efficient symmetric Private Informat...

  16. Privacy Preserving Moving KNN Queries

    CERN Document Server

    Hashem, Tanzima; Zhang, Rui

    2011-01-01

    We present a novel approach that protects trajectory privacy of users who access location-based services through a moving k nearest neighbor (MkNN) query. An MkNN query continuously returns the k nearest data objects for a moving user (query point). Simply updating a user's imprecise location such as a region instead of the exact position to a location-based service provider (LSP) cannot ensure privacy of the user for an MkNN query: continuous disclosure of regions enables the LSP to follow a user's trajectory. We identify the problem of trajectory privacy that arises from the overlap of consecutive regions while requesting an MkNN query and provide the first solution to this problem. Our approach allows a user to specify the confidence level that represents a bound of how much more the user may need to travel than the actual kth nearest data object. By hiding a user's required confidence level and the required number of nearest data objects from an LSP, we develop a technique to prevent the LSP from tracking...

  17. Distributed privacy preserving data collection

    KAUST Repository

    Xue, Mingqiang

    2011-01-01

    We study the distributed privacy preserving data collection problem: an untrusted data collector (e.g., a medical research institute) wishes to collect data (e.g., medical records) from a group of respondents (e.g., patients). Each respondent owns a multi-attributed record which contains both non-sensitive (e.g., quasi-identifiers) and sensitive information (e.g., a particular disease), and submits it to the data collector. Assuming T is the table formed by all the respondent data records, we say that the data collection process is privacy preserving if it allows the data collector to obtain a k-anonymized or l-diversified version of T without revealing the original records to the adversary. We propose a distributed data collection protocol that outputs an anonymized table by generalization of quasi-identifier attributes. The protocol employs cryptographic techniques such as homomorphic encryption, private information retrieval and secure multiparty computation to ensure the privacy goal in the process of data collection. Meanwhile, the protocol is designed to leak limited but non-critical information to achieve practicability and efficiency. Experiments show that the utility of the anonymized table derived by our protocol is in par with the utility achieved by traditional anonymization techniques. © 2011 Springer-Verlag.

  18. Portrait of a Privacy Invasion

    Directory of Open Access Journals (Sweden)

    Shoshitaishvili Yan

    2015-04-01

    Full Text Available The popularity of online social networks has changed the way in which we share personal thoughts, political views, and pictures. Pictures have a particularly important role in the privacy of users, as they can convey substantial information (e.g., a person was attending an event, or has met with another person. Moreover, because of the nature of social networks, it has become increasingly difficult to control who has access to which content. Therefore, when a substantial amount of pictures are accessible to one party, there is a very serious potential for violations of the privacy of users. In this paper, we demonstrate a novel technique that, given a large corpus of pictures shared on a social network, automatically determines who is dating whom, with reasonable precision. More specifically, our approach combines facial recognition, spatial analysis, and machine learning techniques to determine pairs that are dating. To the best of our knowledge, this is the first privacy attack of this kind performed on social networks. We implemented our approach in a tool, called Creepic, and evaluated it on two real-world datasets. The results show that it is possible to automatically extract non-obvious, and nondisclosed, relationships between people represented in a group of pictures, even when the people involved are not directly part of a connected social clique.

  19. Defense Centers of Excellence for Psychological Health & Traumatic Brain Injury

    Science.gov (United States)

    ... Sign up Search: Defense Centers of Excellence For Psychological Health & Traumatic Brain Injury U.S. Department of Defense ... Reports Program Evaluation DoD/VA PH & TBI Registry Psychological Health About Psychological Health Psychological Health Resources About ...

  20. The Infopriv model for information privacy

    OpenAIRE

    2012-01-01

    D.Phil. (Computer Science) The privacy of personal information is crucial in today's information systems. Traditional security models are mainly concerned with the protection of information inside a computer system. These models assume that the users of a computer system are trustworthy and will not disclose information to unauthorised parties. However, this assumption does not always apply to information privacy since people are the major cause of privacy violations. Alternative models ar...

  1. Trust and Privacy in Our Networked World

    OpenAIRE

    Tavani, Herman T.; Dieter Arnold

    2011-01-01

    Remarking on the relationship between the concepts of trust and privacy, Charles Fried (1990, p. 56) [1] writes: Trust is the attitude of expectation that another will behave according to the constraints of morality… There can be no trust where there is no possibility of error. More specifically, man cannot know that he is trusted unless he has the right to act without constant surveillance so that he knows he can betray the trust. Privacy confers that essential right… Without privacy and the...

  2. An Alternative View of Privacy on Facebook

    Directory of Open Access Journals (Sweden)

    Christian Fuchs

    2011-02-01

    Full Text Available The predominant analysis of privacy on Facebook focuses on personal information revelation. This paper is critical of this kind of research and introduces an alternative analytical framework for studying privacy on Facebook, social networking sites and web 2.0. This framework is connecting the phenomenon of online privacy to the political economy of capitalism—a focus that has thus far been rather neglected in research literature about Internet and web 2.0 privacy. Liberal privacy philosophy tends to ignore the political economy of privacy in capitalism that can mask socio-economic inequality and protect capital and the rich from public accountability. Facebook is in this paper analyzed with the help of an approach, in which privacy for dominant groups, in regard to the ability of keeping wealth and power secret from the public, is seen as problematic, whereas privacy at the bottom of the power pyramid for consumers and normal citizens is seen as a protection from dominant interests. Facebook’s privacy concept is based on an understanding that stresses self-regulation and on an individualistic understanding of privacy. The theoretical analysis of the political economy of privacy on Facebook in this paper is based on the political theories of Karl Marx, Hannah Arendt and Jürgen Habermas. Based on the political economist Dallas Smythe’s concept of audience commodification, the process of prosumer commodification on Facebook is analyzed. The political economy of privacy on Facebook is analyzed with the help of a theory of drives that is grounded in Herbert Marcuse’s interpretation of Sigmund Freud, which allows to analyze Facebook based on the concept of play labor (= the convergence of play and labor.

  3. Predicting Privacy Attitudes Using Phone Metadata

    OpenAIRE

    2016-01-01

    With the increasing usage of smartphones, there is a corresponding increase in the phone metadata generated by individuals using these devices. Managing the privacy of personal information on these devices can be a complex task. Recent research has suggested the use of social and behavioral data for automatically recommending privacy settings. This paper is the first effort to connect users' phone use metadata with their privacy attitudes. Based on a 10-week long field study involving phone m...

  4. 77 FR 59386 - Privacy Act of 1974, as Amended

    Science.gov (United States)

    2012-09-27

    ...] Privacy Act of 1974, as Amended AGENCY: Bureau of Consumer Financial Protection. ACTION: Notice of a Revised Privacy Act System of Records. SUMMARY: In accordance with the Privacy Act of 1974, as amended, the Bureau of Consumer Financial [[Page 59387

  5. 77 FR 65206 - Privacy Act of 1974; Amendment of Privacy Act System of Records

    Science.gov (United States)

    2012-10-25

    ... BOARD Privacy Act of 1974; Amendment of Privacy Act System of Records AGENCY: Merit Systems Protection... maintains subject to the Privacy Act of 1974 (5 U.S.C. 552a). MSPB/ GOVT-1, ``Appeals and Case Records,'' is being amended to reflect that its location is in the Office of the Clerk of the Board. Also, the...

  6. Vehicular ad hoc network security and privacy

    CERN Document Server

    Lin, X

    2015-01-01

    Unlike any other book in this area, this book provides innovative solutions to security issues, making this book a must read for anyone working with or studying security measures. Vehicular Ad Hoc Network Security and Privacy mainly focuses on security and privacy issues related to vehicular communication systems. It begins with a comprehensive introduction to vehicular ad hoc network and its unique security threats and privacy concerns and then illustrates how to address those challenges in highly dynamic and large size wireless network environments from multiple perspectives. This book is richly illustrated with detailed designs and results for approaching security and privacy threats.

  7. Customer privacy on UK healthcare websites.

    Science.gov (United States)

    Mundy, Darren P

    2006-09-01

    Privacy has been and continues to be one of the key challenges of an age devoted to the accumulation, processing, and mining of electronic information. In particular, privacy of healthcare-related information is seen as a key issue as health organizations move towards the electronic provision of services. The aim of the research detailed in this paper has been to analyse privacy policies on popular UK healthcare-related websites to determine the extent to which consumer privacy is protected. The author has combined approaches (such as approaches focused on usability, policy content, and policy quality) used in studies by other researchers on e-commerce and US healthcare websites to provide a comprehensive analysis of UK healthcare privacy policies. The author identifies a wide range of issues related to the protection of consumer privacy through his research analysis using quantitative results. The main outcomes from the author's research are that only 61% of healthcare-related websites in their sample group posted privacy policies. In addition, most of the posted privacy policies had poor readability standards and included a variety of privacy vulnerability statements. Overall, the author's findings represent significant current issues in relation to healthcare information protection on the Internet. The hope is that raising awareness of these results will drive forward changes in the industry, similar to those experienced with information quality.

  8. Privacy Protection Research of Mobile RFID

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Radio Frequency Identification is one of the most controversial technologies at present.It is very difficult to detect who reads a tag incorporated into products owned by a person,a significant concern to privacy threats in RFID system arises from this reason.User privacy problem is prior considersion for mobile RFID service,because most mobile RFID service based on end-user service.Propose a solution for user privacy protection,which is a modification of EPC Class 1 Generation 2 protocol,and introduce a privacy protection scenario for mobile RFID service using this method.

  9. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  10. Privacy Preserving Data Publishing: A Classification Perspective

    Directory of Open Access Journals (Sweden)

    A N K Zaman

    2014-09-01

    Full Text Available The concept of privacy is expressed as release of information in a controlled way. Privacy could also be defined as privacy decides what type of personal information should be released and which group or person can access and use it. Privacy Preserving Data Publishing (PPDP is a way to allow one to share anonymous data to ensure protection against identity disclosure of an individual. Data anonymization is a technique for PPDP, which makes sure the published data, is practically useful for processing (mining while preserving individuals sensitive information. Most works reported in literature on privacy preserving data publishing for classification task handle numerical data. However, most real life data contains both numerical and non-numerical data. Another shortcoming is that use of distributed model called Secure Multiparty Computation (SMC. For this research, a centralized model is used for independent data publication by a single data owner. The key challenge for PPDP is to ensure privacy as well as to keep the data usable for research. Differential privacy is a technique that ensures the highest level of privacy for a record owner while providing actual information of the data set. The aim of this research is to develop a framework that satisfies differential privacy standards and to ensure maximum data usability for a classification tasks such as patient data classification in terms of blood pressure.

  11. Korean Defense Industry: Threat or Ally?

    Science.gov (United States)

    1994-02-22

    framework for defense industrial cooperation with Korea . While Senator Dixon eventually dropped his opposition and the Korean Fighter Program is now...US defense firms to transfer technology to Korean firms, the US Government must recognize two realities: first, Korea will develop indigenous...serious Korean competition in the foreseeable future. 8 It does not appear that the Korea defense industry is poised to take away significant market

  12. Defense Headquarters: Improved Data Needed to Better Identify Streamlining and Cost Savings Opportunities by Function

    Science.gov (United States)

    2016-06-01

    approaches from the commercial sector to the department’s six core business processes— management of human resources , healthcare, financial flow... human resource programs for nonappropriated funds, and centrally managed information technology functions. Most of the personnel involved in these...Defense Contract Management Agency • Defense Finance and Accounting Service • Defense Health Agency • Defense Human Resource Activity • Defense

  13. Global distribution of equatorial plasma bubbles in the premidnight sector during solar maximum as observed by KOMPSAT-1 and Defense Meteorological Satellite Program F15

    Science.gov (United States)

    Park, Jaeheung; Min, Kyoung Wook; Kim, Vitaly P.; Kil, Hyosub; Lee, Jae-Jin; Kim, Hee-Jun; Lee, Ensang; Lee, Dae Young

    2005-07-01

    We investigated the global distribution of equatorial plasma bubbles (EPBs) using in situ plasma density measurements from Korea Multipurpose Satellite-1 (KOMPSAT-1) and Defense Meteorological Satellite Program (DMSP) F15 during the solar maximum period from June 2000 to August 2001. The results were generally consistent with those of previous studies. EPBs were observed at all longitudes around the magnetic dip equator in the equinoctial seasons with the peak occurrence in the American-Atlantic-African regions. During the June solstice, EPBs occurred predominantly in the African sector, with enhancements in the magnetic north in the Indian and west Pacific regions, but were totally suppressed in the American-Atlantic sector. During the December solstice, EPBs occurred frequently in the American-Atlantic sector but were suppressed in the other longitude sectors, especially in the Pacific sector. The EPB occurrence probability was seen to be correlated with the observed topside plasma density and the model prereversal upward drift speed of ambient plasmas (Fejer et al., 1999), with their respective dominance dependent on the seasons. However, the peak EPB occurrence in the American-Atlantic sector during the December solstice was displaced somewhat from the region of peak density and upward drift, probably due to a strong solar terminator influence on the flux tube-integrated E region Pedersen conductivity and due to anomaly morphology. The peak EPB occurrence in the African sector during the June solstice is consistent only with the high ambient density in that region, for there was no coincidence with the maximum vertical drift or the minimum E region Pedersen conductivity.

  14. 75 FR 22577 - Proposed Privacy Policy Statement

    Science.gov (United States)

    2010-04-29

    ... request for public comment on Proposed Privacy Policy Statement. SUMMARY: The U.S. Election Assistance Commission (EAC) seeks public comment on the Proposed Privacy Policy Statement. OMB Memorandum M-99- 18.... These statements are intended to inform the public of government- wide policies and how each...

  15. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with

  16. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  17. Contemporary Privacy Theory Contributions to Learning Analytics

    Science.gov (United States)

    Heath, Jennifer

    2014-01-01

    With the continued adoption of learning analytics in higher education institutions, vast volumes of data are generated and "big data" related issues, including privacy, emerge. Privacy is an ill-defined concept and subject to various interpretations and perspectives, including those of philosophers, lawyers, and information systems…

  18. Online privacy: overview and preliminary research

    Directory of Open Access Journals (Sweden)

    Renata Mekovec

    2010-12-01

    Full Text Available Normal 0 21 false false false HR X-NONE X-NONE MicrosoftInternetExplorer4 Over the last decade using the Internet for online shopping, information browsing and searching as well as for online communication has become part of everyday life. Although the Internet technology has a lot of benefits for users, one of the most important disadvantages is related to the increasing capacity for users’ online activity surveillance. However, the users are increasingly becoming aware of online surveillance methods, which results in their increased concern for privacy protection. Numerous factors influence the way in which individuals perceive the level of privacy protection when they are online. This article provides a review of factors that influence the privacy perception of Internet users. Previous online privacy research related to e-business was predominantly focused on the dimension of information privacy and concerned with the way users’ personal information is collected, saved and used by an online company. This article’s main aim is to provide an overview of numerous Internet users’ privacy perception elements across various privacy dimensions as well as their potential categorization. In addition, considering that e-banking and online shopping are one of the most widely used e-services, an examination of online privacy perception of e-banking/online shopping users was performed. 

  19. Privacy and Ethics in Undergraduate GIS Curricula

    Science.gov (United States)

    Scull, Peter; Burnett, Adam; Dolfi, Emmalee; Goldfarb, Ali; Baum, Peter

    2016-01-01

    The development of location-aware technologies, such as smartphones, raises serious questions regarding locational privacy and the ethical use of geographic data. The degree to which these concepts are taught in undergraduate geographic information science (GISci) courses is unknown. A survey of GISci educators shows that issues of privacy and…

  20. Differential privacy in intelligent transportation systems

    NARCIS (Netherlands)

    Kargl, Frank; Friedman, Arik; Boreli, Roksana

    2013-01-01

    In this paper, we investigate how the concept of differential privacy can be applied to Intelligent Transportation Systems (ITS), focusing on protection of Floating Car Data (FCD) stored and processed in central Traffic Data Centers (TDC). We illustrate an integration of differential privacy with pr

  1. A Deontological View of the Privacy Debate.

    Science.gov (United States)

    Wilson, Alan

    The mass media are at odds with the public on issues concerning privacy, i.e., issues concerning whether private information about a person should be printed in a newspaper or magazine. In a 1982 survey, one journalist/respondent said his or her newspaper "almost always" favored the public's right to know over a person's right to privacy.…

  2. Privacy-Preserving Location-Based Services

    Science.gov (United States)

    Chow, Chi Yin

    2010-01-01

    Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…

  3. The Press, Privacy, and Community Mores.

    Science.gov (United States)

    Glasser, Theodore L.

    Because of judicial indifference and legislative inaction, the conflict between the right of privacy and the freedom of the press is no closer to a resolution than it was a century ago. William Prosser's reduction of the common law of privacy into four separate torts has not solved the problem. The concept of "newsworthiness" has not been helpful…

  4. Virtue, Privacy and Self-Determination

    DEFF Research Database (Denmark)

    Stamatellos, Giannis

    2011-01-01

    The ethical problem of privacy lies at the core of computer ethics and cyber ethics discussions. The extensive use of personal data in digital networks poses a serious threat to the user’s right of privacy not only at the level of a user’s data integrity and security but also at the level of a user...

  5. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the $<, =, >$ re

  6. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  7. Defense Acquisition Performance Assessment Report

    Science.gov (United States)

    2006-01-01

    Incorporated – “Changing the System” HeLLeR , TRiCiA A., Deputy Director of Congressional Support, Technical and Analytical Support, USAF A-Team...Interview Recorder” HeLLieR, RiCHARD, Director of Air Force Programs, United Technologies – “Joint Stars System” HeRMAN , DR. ROBeRT, Member, Defense

  8. Corporate Privacy Policy Changes during PRISM and the Rise of Surveillance Capitalism

    Directory of Open Access Journals (Sweden)

    Priya Kumar

    2017-03-01

    Full Text Available Disclosure of the NSA’s PRISM program demonstrated that Internet companies have become prime targets of government surveillance. But what role do companies themselves play in putting users’ privacy at risk? By comparing the changes in the privacy policies of ten companies—the nine in PRISM plus Twitter—I seek to understand how users’ privacy shifted. Specifically, I study how company practices surrounding the life cycle of user information (e.g. collection, use, sharing, and retention shifted between the times when companies joined PRISM and when PRISM news broke. A qualitative analysis of the changes in the privacy policies suggests that company disclosure of tracking for advertising purposes increased. I draw on business scholar Shoshana Zuboff’s conceptualization of “surveillance capitalism” and legal scholar Joel Reidenberg’s “transparent citizen” to explain the implications such changes hold for users’ privacy. These findings underscore why public debates about post-Snowden privacy rights cannot ignore the role that companies play in legitimizing surveillance activities under the auspices of creating market value.

  9. Protecting privacy in data release

    CERN Document Server

    Livraga, Giovanni

    2015-01-01

    This book presents a comprehensive approach to protecting sensitive information when large data collections are released by their owners. It addresses three key requirements of data privacy: the protection of data explicitly released, the protection of information not explicitly released but potentially vulnerable due to a release of other data, and the enforcement of owner-defined access restrictions to the released data. It is also the first book with a complete examination of how to enforce dynamic read and write access authorizations on released data, applicable to the emerging data outsou

  10. 78 FR 48170 - Privacy Act of 1974; CMS Computer Match No. 2013-12; HHS Computer Match No. 1307; SSA Computer...

    Science.gov (United States)

    2013-08-07

    ... Services Privacy Act of 1974; CMS Computer Match No. 2013-12; HHS Computer Match No. 1307; SSA Computer... Human Services (HHS). ACTION: Notice of Computer Matching Program (CMP). SUMMARY: In accordance with the....Wesolowski@cms.hhs.gov . SUPPLEMENTARY INFORMATION: The Computer Matching and Privacy Protection Act of 1988...

  11. 78 FR 48169 - Privacy Act of 1974; CMS Computer Match No. 2013-02; HHS Computer Match No. 1306; DoD-DMDC Match...

    Science.gov (United States)

    2013-08-07

    ... Services Privacy Act of 1974; CMS Computer Match No. 2013-02; HHS Computer Match No. 1306; DoD-DMDC Match... Services (CMS). ACTION: Notice of Computer Matching Program (CMP). SUMMARY: In accordance with the requirements of the Privacy Act of 1974, as amended, this notice establishes a CMP that CMS plans to...

  12. Defining Privacy Is Supposed to Be Easy

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Gross, Thomas; Viganò, Luca

    2013-01-01

    Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is based on the static equivalence of frames in the applied pi-calculus, basically asking whether or not the intruder is able to distinguish two given worlds. A subtle question is how we can be sure...... that we have specified all pairs of worlds to properly reflect our intuitive privacy goal. To address this problem, we introduce in this paper a novel and declarative way to specify privacy goals, called α-β privacy, and relate it to static equivalence. This new approach is based on specifying two...... formulae α and β in first-order logic with Herbrand universes, where α reflects the intentionally released information and β includes the actual cryptographic (“technical”) messages the intruder can see. Then α-β privacy means that the intruder cannot derive any “non-technical” statement from β that he...

  13. Protecting privacy in a clinical data warehouse.

    Science.gov (United States)

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  14. Defense Healthcare Information Assurance Program

    Science.gov (United States)

    2001-06-01

    34* Computerized Patient Record Institute ( CPRI ) annual conference in Washington D.C. "* American Telemedicine Association (ATA) annual conference...TATRC) 3 May-00 Phoenix, AZ ATA Conference ATI I Awd + 4 Pittsburgh, PA IPR #1 ATI, SEI, ADL, 6 LMES, HOST, KRM, (TATRC) Jul-00 Washington, DC CPRI

  15. Space Shuttle security policies and programs

    Science.gov (United States)

    Keith, E. L.

    1985-01-01

    The Space Shuttle vehicle consists of the orbiter, external tank, and two solid rocket boosters. In dealing with security two major protective categories are considered, taking into account resource protection and information protection. A review is provided of four basic programs which have to be satisfied. Aspects of science and technology transfer are discussed. The restrictions for the transfer of science and technology information are covered under various NASA Management Instructions (NMI's). There were two major events which influenced the protection of sensitive and private information on the Space Shuttle program. The first event was a manned space flight accident, while the second was the enactment of a congressional bill to establish the rights of privacy. Attention is also given to national resource protection and national defense classified operations.

  16. 76 FR 58786 - Privacy Act of 1974; Systems of Records

    Science.gov (United States)

    2011-09-22

    ..., Department of Defense. GNSA 16 System name: NSA/CSS Drug Testing Program (October 1, 2008, 73 FR 57064... Employee Assistance Program in which the employee is receiving counseling or treatment or is otherwise..., Drug abuse; E.O. 12564, Drug Free Workplace; DoD Directive 1010.9, DoD Civilian Employee Drug...

  17. Public privacy: Reciprocity and Silence

    Directory of Open Access Journals (Sweden)

    Jenny Kennedy

    2014-10-01

    Full Text Available In his 1958 poem 'Dedication to my Wife' TS Eliot proclaims "these are private words addressed to you in public". Simultaneously written for his wife, Valerie Fletcher, and to the implied you of a discourse network, Eliot's poem helps to illustrate the narrative voices and silences that are constitutive of an intimate public sphere. This paper situates reciprocity as a condition of possibility for public privacy. It shows how reciprocity is enabled by systems of code operating through material and symbolic registers. Code promises to control communication, to produce neutral, systemic forms of meaning. Yet such automation is challenged by uneven and fragmented patterns of reciprocity. Moreover, examining the media of public privacy reveals historical trajectories important for understanding contemporary socio­technical platforms of reciprocity. To explore the implicit requirement of reciprocity in publicly private practices, three sites of communication are investigated framed by a media archaeology perspective: postal networks, the mail­art project PostSecret and the anonymous zine 'You'.

  18. 32 CFR 806b.4 - Privacy Act complaints.

    Science.gov (United States)

    2010-07-01

    ... unique system complaints through the respective component chain of command. (b) For Privacy Act... complaints or allegations of Privacy Act violations through the appropriate base or Major Command Privacy Act office, to the local systems manager. The base or Major Command Privacy Act officer directs the...

  19. 48 CFR 52.224-2 - Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 2 2010-10-01 2010-10-01 false Privacy Act. 52.224-2... AND FORMS SOLICITATION PROVISIONS AND CONTRACT CLAUSES Text of Provisions and Clauses 52.224-2 Privacy... agency function: Privacy Act (APR 1984) (a) The Contractor agrees to— (1) Comply with the Privacy Act of...

  20. 45 CFR 503.2 - General policies-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false General policies-Privacy Act. 503.2 Section 503.2... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.2 General policies—Privacy Act. The Commission will protect the...

  1. 45 CFR 503.1 - Definitions-Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 3 2010-10-01 2010-10-01 false Definitions-Privacy Act. 503.1 Section 503.1... THE UNITED STATES, DEPARTMENT OF JUSTICE RULES OF PRACTICE PRIVACY ACT AND GOVERNMENT IN THE SUNSHINE REGULATIONS Privacy Act Regulations § 503.1 Definitions—Privacy Act. For the purpose of this part: Agency...

  2. 75 FR 28051 - Public Workshop: Pieces of Privacy

    Science.gov (United States)

    2010-05-19

    ... SECURITY Office of the Secretary Public Workshop: Pieces of Privacy AGENCY: Privacy Office, DHS. ACTION: Notice announcing public workshop. SUMMARY: The Department of Homeland Security Privacy Office will host a public workshop, ``Pieces of Privacy.'' DATES: The workshop will be held on June 10, 2010, from 8...

  3. 43 CFR 2.47 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Records subject to Privacy Act. 2.47 Section 2.47 Public Lands: Interior Office of the Secretary of the Interior RECORDS AND TESTIMONY; FREEDOM OF INFORMATION ACT Privacy Act § 2.47 Records subject to Privacy Act. The Privacy Act applies to all...

  4. Privacy Issues of a National Research and Education Network.

    Science.gov (United States)

    Katz, James E.; Graveman, Richard F.

    1991-01-01

    Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…

  5. 25 CFR 700.259 - Records subject to Privacy Act.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 2 2010-04-01 2010-04-01 false Records subject to Privacy Act. 700.259 Section 700.259 Indians THE OFFICE OF NAVAJO AND HOPI INDIAN RELOCATION COMMISSION OPERATIONS AND RELOCATION PROCEDURES Privacy Act § 700.259 Records subject to Privacy Act. The Privacy Act applies to all “records” as...

  6. Digital Privacy: Toward a New Politics and Discursive Practice.

    Science.gov (United States)

    Doty, Philip

    2001-01-01

    Discussion of privacy focuses on digital environments and a more inclusive understanding of privacy. Highlights include legal and policy conceptions; legislation protecting privacy; relevant Supreme Court cases; torts and privacy; European and other efforts; surveillance and social control; information entrepreneurialism; Jurgen Habermas; free…

  7. Data privacy foundations, new developments and the big data challenge

    CERN Document Server

    Torra, Vicenç

    2017-01-01

    This book offers a broad, cohesive overview of the field of data privacy. It discusses, from a technological perspective, the problems and solutions of the three main communities working on data privacy: statistical disclosure control (those with a statistical background), privacy-preserving data mining (those working with data bases and data mining), and privacy-enhancing technologies (those involved in communications and security) communities. Presenting different approaches, the book describes alternative privacy models and disclosure risk measures as well as data protection procedures for respondent, holder and user privacy. It also discusses specific data privacy problems and solutions for readers who need to deal with big data.

  8. Digital privacy in the marketplace perspectives on the information exchange

    CERN Document Server

    Milne, George

    2015-01-01

    Digital Privacy in the Marketplace focuses on the data ex-changes between marketers and consumers, with special ttention to the privacy challenges that are brought about by new information technologies. The purpose of this book is to provide a background source to help the reader think more deeply about the impact of privacy issues on both consumers and marketers. It covers topics such as: why privacy is needed, the technological, historical and academic theories of privacy, how market exchange af-fects privacy, what are the privacy harms and protections available, and what is the likely futur

  9. Privacy by design in personal health monitoring.

    Science.gov (United States)

    Nordgren, Anders

    2015-06-01

    The concept of privacy by design is becoming increasingly popular among regulators of information and communications technologies. This paper aims at analysing and discussing the ethical implications of this concept for personal health monitoring. I assume a privacy theory of restricted access and limited control. On the basis of this theory, I suggest a version of the concept of privacy by design that constitutes a middle road between what I call broad privacy by design and narrow privacy by design. The key feature of this approach is that it attempts to balance automated privacy protection and autonomously chosen privacy protection in a way that is context-sensitive. In personal health monitoring, this approach implies that in some contexts like medication assistance and monitoring of specific health parameters one single automatic option is legitimate, while in some other contexts, for example monitoring in which relatives are receivers of health-relevant information rather than health care professionals, a multi-choice approach stressing autonomy is warranted.

  10. Privacy-preserving heterogeneous health data sharing.

    Science.gov (United States)

    Mohammed, Noman; Jiang, Xiaoqian; Chen, Rui; Fung, Benjamin C M; Ohno-Machado, Lucila

    2013-05-01

    Privacy-preserving data publishing addresses the problem of disclosing sensitive data when mining for useful information. Among existing privacy models, ε-differential privacy provides one of the strongest privacy guarantees and makes no assumptions about an adversary's background knowledge. All existing solutions that ensure ε-differential privacy handle the problem of disclosing relational and set-valued data in a privacy-preserving manner separately. In this paper, we propose an algorithm that considers both relational and set-valued data in differentially private disclosure of healthcare data. The proposed approach makes a simple yet fundamental switch in differentially private algorithm design: instead of listing all possible records (ie, a contingency table) for noise addition, records are generalized before noise addition. The algorithm first generalizes the raw data in a probabilistic way, and then adds noise to guarantee ε-differential privacy. We showed that the disclosed data could be used effectively to build a decision tree induction classifier. Experimental results demonstrated that the proposed algorithm is scalable and performs better than existing solutions for classification analysis. The resulting utility may degrade when the output domain size is very large, making it potentially inappropriate to generate synthetic data for large health databases. Unlike existing techniques, the proposed algorithm allows the disclosure of health data containing both relational and set-valued data in a differentially private manner, and can retain essential information for discriminative analysis.

  11. New threats to health data privacy.

    Science.gov (United States)

    Li, Fengjun; Zou, Xukai; Liu, Peng; Chen, Jake Y

    2011-11-24

    Along with the rapid digitalization of health data (e.g. Electronic Health Records), there is an increasing concern on maintaining data privacy while garnering the benefits, especially when the data are required to be published for secondary use. Most of the current research on protecting health data privacy is centered around data de-identification and data anonymization, which removes the identifiable information from the published health data to prevent an adversary from reasoning about the privacy of the patients. However, published health data is not the only source that the adversaries can count on: with a large amount of information that people voluntarily share on the Web, sophisticated attacks that join disparate information pieces from multiple sources against health data privacy become practical. Limited efforts have been devoted to studying these attacks yet. We study how patient privacy could be compromised with the help of today's information technologies. In particular, we show that private healthcare information could be collected by aggregating and associating disparate pieces of information from multiple online data sources including online social networks, public records and search engine results. We demonstrate a real-world case study to show user identity and privacy are highly vulnerable to the attribution, inference and aggregation attacks. We also show that people are highly identifiable to adversaries even with inaccurate information pieces about the target, with real data analysis. We claim that too much information has been made available electronic and available online that people are very vulnerable without effective privacy protection.

  12. Kids Sell: Celebrity Kids’ Right to Privacy

    Directory of Open Access Journals (Sweden)

    Seong Choul Hong

    2016-04-01

    Full Text Available The lives of celebrities are often spotlighted in the media because of their newsworthiness; however, many celebrities argue that their right to privacy is often infringed upon. Concerns about celebrity privacy are not limited to the celebrities themselves and often expand to their children. As a result of their popularity, public interest has pushed paparazzi and journalists to pursue trivial and private details about the lives of both celebrities and their children. This paper investigates conflicting areas where the right to privacy and the right to know collide when dealing with the children of celebrities. In general, the courts have been unsympathetic to celebrity privacy claims, noting their newsworthiness and self-promoted characteristic. Unless the press violates news-gathering ethics or torts, the courts will often rule in favor of the media. However, the story becomes quite different when related to an infringement on the privacy of celebrities’ children. This paper argues that all children have a right to protect their privacy regardless of their parents’ social status. Children of celebrities should not be exempt to principles of privacy just because their parents are a celebrity. Furthermore, they should not be exposed by the media without the voluntary consent of their legal patrons. That is, the right of the media to publish and the newsworthiness of children of celebrities must be restrictedly acknowledged.

  13. Security and privacy threats in RFID traceability network

    Institute of Scientific and Technical Information of China (English)

    Chu; Chao-Hsien

    2008-01-01

    To address security and privacy issues in radio frequency identification (RFID) traceability networks, a multi-layer privacy and security framework is proposed, which includes four facets: a security model, a communication protocol, access permission and privacy preservation. According to the security requirements that are needed in an RFID system, a security model that incorporates security requirements that include privacy of tag data, privacy of ownership, and availability of tag identity is introduced. ...

  14. Privacy-Preserving Restricted Boltzmann Machine

    Science.gov (United States)

    Li, Yu

    2014-01-01

    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model. PMID:25101139

  15. 5G Visions of User Privacy

    DEFF Research Database (Denmark)

    Sørensen, Lene Tolstrup; Khajuria, Samant; Skouby, Knud Erik

    2015-01-01

    Currently, the discussions are going on the elements and definition of 5G networks. One of the elements in this discussion is how to provide for user controlled privacy for securing users' digital interaction. The purpose of this paper is to present elements of user controlled privacy needed...... for the future 5G networks. The paper concludes that an ecosystem consisting of Trusted Third Party between the end user and the service providers as a distributed system could be integrated to secure the perspective of user controlled privacy for future systems...

  16. Privacy and Intercultural Communication——Causes Behind Different Privacy of the Chinese and the American

    Institute of Scientific and Technical Information of China (English)

    侯彩虹; 潘建虎

    2012-01-01

    Chinese culture is featured by its “togethemess”,collectivism,and its agricultural tradition;while American culture is featured by its “apartness”,individualism and its industrial tradition.The three dominant features determine the two cultures' different privacy rules.This paper puts the focus on the analysis of the causes behind the two different privacy.What's more,the globalization influences the privacy rules of the two cultures,people are more adaptive and have changed a lot.

  17. Ostomy Home Skills Program

    Medline Plus

    Full Text Available ... Education Cancer Education Cancer Programs Conference: Creating a Culture of Quality CoC Events Quality Education Quality Education ... College of Surgeons, Chicago, IL 60611-3211 | Privacy Policy | Terms of Use

  18. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...

  19. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    2007-01-01

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...

  20. Privacy issues in mobile advertising

    DEFF Research Database (Denmark)

    Cleff, Evelyne Beatrix

    2007-01-01

    The emergence of the wired Internet and mobile telecommunication networks is creating new opportunities for advertisers to generate new revenue streams through mobile users. As consumer adoption of mobile technology continues to increase, it is only a question of time when mobile advertising...... become extremely intrusive practices in an intimate personal space. This article focuses on the evaluation of legal problems raised by this novel form of advertising. It is assumed that a technological design, which is in line with the legal framework, will ensure that the benefits of mobile advertising...... becomes an important part of marketing strategies. The development of mobile advertising, however, will be dependent on acceptance and usability issues in order to ensure permission-based advertising. Growing concerns about the protection of the users' privacy have been raised since mobile advertising may...