WorldWideScience

Sample records for delivering safe secure

  1. 5 steps to delivering safe, secure and reliable rail solutions for the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Connelly, C. [Direct Rail Services, Warrington (United Kingdom)

    2004-07-01

    Direct Rail Services (DRS) has been operating since October 1995, following the decision by parent company, British Nuclear Fuels (BNFL), to create a strategic rail transport service. The decision came after the privatisation of the rail network in the UK, when the former British Rail was superseded by a range of private organisations responsible for separate areas of the industry. Individual companies became responsible for aspects such as the operation and maintenance of the network infrastructure and for passenger and freight train services. Rather than enter into contractual arrangements with third party contractors, DRS was formed - securing both the access and reliability of transport routes and availability of the rail network, providing greater guarantees about the levels of service delivery. The strategy of bringing this area of transport in house was concurrent with that of international transport, utilising its own fleet of ships for overseas fuel movements. Freight operations began in October 1995, with the first services operating between Sellafield and the low level radioactive waste facility at Drigg.

  2. 5 steps to delivering safe, secure and reliable rail solutions for the nuclear industry

    International Nuclear Information System (INIS)

    Connelly, C.

    2004-01-01

    Direct Rail Services (DRS) has been operating since October 1995, following the decision by parent company, British Nuclear Fuels (BNFL), to create a strategic rail transport service. The decision came after the privatisation of the rail network in the UK, when the former British Rail was superseded by a range of private organisations responsible for separate areas of the industry. Individual companies became responsible for aspects such as the operation and maintenance of the network infrastructure and for passenger and freight train services. Rather than enter into contractual arrangements with third party contractors, DRS was formed - securing both the access and reliability of transport routes and availability of the rail network, providing greater guarantees about the levels of service delivery. The strategy of bringing this area of transport in house was concurrent with that of international transport, utilising its own fleet of ships for overseas fuel movements. Freight operations began in October 1995, with the first services operating between Sellafield and the low level radioactive waste facility at Drigg

  3. SAFE/SNAP application to shipboard security

    International Nuclear Information System (INIS)

    Grady, L.M.; Walker, J.L.; Polito, J.

    1981-11-01

    An application of the combined Safeguards Automated Facility Evaluation/Safeguards Network Analysis Procedure (SAFE/SNAP) modeling technique to a physical protection system (PPS) aboard a generic ship is described. This application was performed as an example of how the SAFE and SNAP techniques could be used. Estimates of probability of interruption and neutralization for the example shipboard PPS are provided by SAFE as well as an adversary scenario, which serves as input to SNAP. This adversary scenario is analyzed by SNAP through four cases which incorporate increasingly detailed security force tactics. Comparisons between the results of the SAFE and SNAP analyses are made and conclusions drawn on the validity of each technique. Feedback from SNAP to SAFE is described, and recommendations for upgrading the ship based on the results of the SAFE/SNAP application are also discussed

  4. Femoral venous catheters: a safe alternative for delivering parenteral alimentation.

    Science.gov (United States)

    Friedman, B; Kanter, G; Titus, D

    1994-04-01

    Femoral vein catheterization is an alternative method of obtaining central venous access. Placement of femoral venous catheters (FVCs) is possible in the majority of patients, suitable for most indications, and associated with a low complication rate during insertion. We wished to determine the incidence of infections or other complications resulting when parenteral nutrition was delivered through FVCs. Fifty-two patients were followed from a hospital-wide population including patients in the critical care units. Triple-lumen catheters were placed by using the sterile Seldinger technique, and sites were examined daily for inflammation. Bacteriologic surveillance was accomplished by submitting the catheter tip for semiquantitative cultures. If catheter line sepsis was suspected, blood samples for cultures were drawn through the catheter and peripherally. The rate of occurrence of colonized catheters was 9.6% (five of 52), and catheter sepsis was found in one case (1.9%). Other than inflammation at six (11.5%) of 52 catheter sites, noninfectious complications of FVCs were not found. On the basis of these findings, we consider FVC-delivered parenteral alimentation a safe and effective alternative to other forms of central venous access.

  5. Safe and Secure Services Based on NGN

    Science.gov (United States)

    Fukazawa, Tomoo; Nisase, Takemi; Kawashima, Masahisa; Hariu, Takeo; Oshima, Yoshihito

    Next Generation Network (NGN), which has been undergoing standardization as it has developed, is expected to create new services that converge the fixed and mobile networks. This paper introduces the basic requirements for NGN in terms of security and explains the standardization activities, in particular, the requirements for the security function described in Y.2701 discussed in ITU-T SG-13. In addition to the basic NGN security function, requirements for NGN authentication are also described from three aspects: security, deployability, and service. As examples of authentication implementation, three profiles-namely, fixed, nomadic, and mobile-are defined in this paper. That is, the “fixed profile” is typically for fixed-line subscribers, the “nomadic profile” basically utilizes WiFi access points, and the “mobile profile” provides ideal NGN mobility for mobile subscribers. All three of these profiles satisfy the requirements from security aspects. The three profiles are compared from the viewpoint of requirements for deployability and service. After showing that none of the three profiles can fulfill all of the requirements, we propose that multiple profiles should be used by NGN providers. As service and application examples, two promising NGN applications are proposed. The first is a strong authentication mechanism that makes Web applications more safe and secure even against password theft. It is based on NGN ID federation function. The second provides an easy peer-to-peer broadband virtual private network service aimed at safe and secure communication for personal/SOHO (small office, home office) users, based on NGN SIP (session initiation protocol) session control.

  6. Keeping Sealed Radioactive Sources Safe and Secure

    International Nuclear Information System (INIS)

    Potterton, Louise

    2013-01-01

    Radioactive sources are used in a wide variety of devices in medical, industrial, agricultural and research facilities worldwide. These sources, such as cobalt-60 and caesium-137, emit high levels of ionizing radiation, which can treat cancer, measure materials used in industry and sterilize food and medical appliances. Problems may arise when these sources are no longer needed, or if they are damaged or decayed. If these sources are not properly stored they can be a threat to human health and the environment and pose a security risk. Procedures to secure these spent or 'disused' sources are often highly expensive and need specialized assistance. The IAEA helps its States find long term solutions for the safe and secure storage of disused sealed radioactive sources (DSRSs)

  7. Ultra Safe And Secure Blasting System

    Energy Technology Data Exchange (ETDEWEB)

    Hart, M M

    2009-07-27

    The Ultra is a blasting system that is designed for special applications where the risk and consequences of unauthorized demolition or blasting are so great that the use of an extraordinarily safe and secure blasting system is justified. Such a blasting system would be connected and logically welded together through digital code-linking as part of the blasting system set-up and initialization process. The Ultra's security is so robust that it will defeat the people who designed and built the components in any attempt at unauthorized detonation. Anyone attempting to gain unauthorized control of the system by substituting components or tapping into communications lines will be thwarted in their inability to provide encrypted authentication. Authentication occurs through the use of codes that are generated by the system during initialization code-linking and the codes remain unknown to anyone, including the authorized operator. Once code-linked, a closed system has been created. The system requires all components connected as they were during initialization as well as a unique code entered by the operator for function and blasting.

  8. Safe and secure: transportation of radioactive materials

    International Nuclear Information System (INIS)

    Howe, D.

    2015-01-01

    Western Waste Management Facility is Central Transportation Facility for Low and Intermediate waste materials. Transportation support for Stations: Reactor inspection tools and heavy water between stations and reactor components and single bundles of irradiated fuel to AECL-Chalk River for examination. Safety Track Record: 3.2 million kilometres safely travelled and no transportation accident - resulting in a radioactive release.

  9. Cyber Security: Rule of Use Internet Safely?

    OpenAIRE

    -, Maskun

    2013-01-01

    International Journal Cyber security plays on important role to guarantee and protect people who use internet in their daily life. Some cases take place around the world that people get inconvenience condition when they access and use internet. Misuse of internet becomes a current issue which some cases take place including a university. Advantages of using internet in the university of course assist the student to get some information in internet. However, they have to be protected in ord...

  10. C-SAFE: A Computer-Delivered Sexual Health Promotion Program for Latinas.

    Science.gov (United States)

    Klein, Charles H; Kuhn, Tamara; Altamirano, Midori; Lomonaco, Carmela

    2017-07-01

    This article describes the development and evaluation of C-SAFE (Sexual Awareness for Everyone), a computer-delivered sexual health promotion program for Latinas. We first describe the process of adapting an evidence-based, group-level intervention into an individually administered computer-delivered program. We then present the methods and results of a randomized control trial with 321 Latinas in California and Florida to test C-SAFE's preliminary efficacy in reducing sexual health risk. We found no statistically significant differences between the two conditions at a six-month follow-up in terms of sexual behaviors or attitudes toward sexually transmitted infections and condoms, although C-SAFE women reported fewer days in the past month when their mental health was not good (p = .02). C-SAFE condition women also reported more satisfaction than control condition women in their assessment of information presentation (on a scale of 1 = poor and 5 = excellent; C-SAFE = 4.45 vs. control = 4.25, p = .053) and having learned something new (C-SAFE = 95.1% vs. control = 79.3%, χ 2 importance of teachable moments, matching of delivery modalities to implementation contexts, and possible directions for evidence-based sexual health promotion programs given the current sexual health landscape.

  11. Can low-carbon societies deliver on energy security?

    International Nuclear Information System (INIS)

    Jewell, Jessica

    2015-01-01

    The impact of low-carbon policies on energy security depends on both the timing and intensity of these policies, and the definition of energy security: security of what?; security for whom?; and security from which threats? The priorities of the EU’s 2030 climate/energy package and energy security show little if any alignment. Global climate stabilization policies benefit the energy security of India, China, and the EU, but may have negative impacts on export revenues of the U.S. and other energy exporters.

  12. Readiness of health facilities to deliver safe male circumcision services in Tanzania: a descriptive study

    Directory of Open Access Journals (Sweden)

    Frank Felix Mosha

    2013-03-01

    Full Text Available Assessing the readiness of health facilities to deliver safe male circumcision services is more important in sub-Saharan Africa because of the inadequacy state of health facilities in many ways. The World Health Organization recommends that only facilities equipped with available trained staff, capable to perform at least minor surgery, able to offer minimum MC package and appropriate equipment for resuscitation, and compliant with requirements for sterilization and infection control should be allowed to deliver safe circumcision services. A cross-sectional study using quantitative data collection technique was conducted to assess the readiness of the health facilities to deliver safe circumcision services in selected districts of Tanzania. All hospitals, health centres and 30% of all dispensaries in these districts were selected to participate in the study. Face-toface questionnaires were administered to the heads of the health facilities and to health practitioners. Overall, 49/69 (59% of the facilities visited provided circumcision services and only 46/203 (24% of the health practitioners performed circumcision procedures. These were mainly assistant medical officers and clinical officers. The vast majority – 190/203 (95% – of the health practitioners require additional training prior to providing circumcision services. Most facilities – 63/69 (91% – had all basic supplies (gloves, basin, chlorine and waste disposal necessary for infection prevention, 44/69 (65% provided condoms, HIV counselling and testing, and sexuallytransmitted infections services, while 62/69 (90% had the capability to perform at least minor surgery. However, only 25/69 (36% and 15/69 (22% of the facilities had functioning sterilization equipment and appropriate resuscitation equipment, respectively. There is readiness for roll out of circumcision services; however, more practitioners need to be trained on circumcision procedures, demand forecasting

  13. Using the social security system to deliver housing policy

    OpenAIRE

    Cheung, Louise, Gee Wing

    2016-01-01

    This thesis examines the interaction between housing policy and the social security benefits that support housing costs. Analysis concerns the extent and type of State intervention in housing, thus explaining the dynamic between State and individual responsibility in housing policy. This thesis involves an exploration of the different treatment of the owner-occupied and the rented housing sectors, with reference to the social security benefits which fund ongoing housing costs. This thesis see...

  14. Delivering a secure electricity supply on a low carbon pathway

    International Nuclear Information System (INIS)

    Boston, Andy

    2013-01-01

    The energy system can only be considered sustainable in the long term if it is low carbon, affordable and secure. These three create a complex trilemma for all stakeholders in the energy business who have to strike a careful balance without neglecting any one aspect. This discussion paper examines the issues surrounding security of supply of the power system which has received less attention than the other aspects. It looks at how threats and mitigation measures can be classified in terms of where they act on the supply chain and the timescale over which they act. Only by considering the full range of timescales from seconds to decades can the full picture emerge of the effects of new technologies on security of supply. An examination of blackouts over the past 40 years sheds light on the causes of failure to supply and the most vulnerable aspects of the supply chain. - Highlights: ► Energy systems are only sustainable if they are low carbon, affordable and secure. ► Threats to security can be classified by timescale and position in the supply chain. ► The impact of new technologies on security must be considered across all timescales. ► Recent blackouts show the network is most vulnerable and weather the leading cause

  15. Non-physician delivered intravitreal injection service is feasible and safe - a systematic review.

    Science.gov (United States)

    Rasul, Asrin; Subhi, Yousif; Sørensen, Torben Lykke; Munch, Inger Christine

    2016-05-01

    Non-physicians such as nurses are trained to give injections into the vitreous body of the eye to meet the increasing demand for intravitreal therapy with vascular endothelial growth factor inhibitors against common eye diseases, e.g. age-related macular degeneration and diabetic retinopathy. We systematically reviewed the existing literature to provide an overview of the experiences in this transformational process. We searched for literature on 22 September 2015 using PubMed, Embase, the Cochrane Library, CINAHL and the Web of Science. Eligible studies had to address any outcome based on non-physician delivered intravitreal therapy regardless of the study design. Being non-physician was defined as the injecting personnel not being a physician, but no further restrictions were made. Five studies were included with a total of 31,303 injections having been performed by 16 nurses. The studies found that having nurses perform the intravitreal injections produced to a short-term capacity improvement and liberated physicians for other clinical work. Training was provided through courses and direct supervision. The rates of endophthalmitis were 0-0.40‰, which is comparable to reported rates when the intravitreal therapy is given by physicians. Non-physician delivered intravitreal therapy seems feasible and safe.

  16. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.J.; Bastiaansen, H.J.M.; Berg, J. van den; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two bigchallenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  17. A platform for secure, safe, and sustainable logistics

    NARCIS (Netherlands)

    Hofman, W.; Bastiaansen, H.; Van den Berg, J.; Pruksasri, P.

    2012-01-01

    In the current society, logistics is faced with at least two big challenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements

  18. Sacroiliac secure corridor: analysis for safe insertion of iliosacral screws

    Directory of Open Access Journals (Sweden)

    Henrique Alves Cruz

    2013-08-01

    Full Text Available OBJECTIVE: Posterior pelvic lesions, especially of the sacral-iliac joint, have high mortality and morbidity risks. Definitive fixation is necessary for the joint stabilization, and one option is the sacral percutaneous pinning with screws. Proximity to important structures to this region brings risks to the fixation procedure; therefore, it is important to know the tridimensional anatomy of the pelvis posterior region. Deviations of the surgeon's hand of four degrees may target the screws to those structures; dimorphisms of the upper sacrum and a poor lesion reduction may redound in a screw malpositioning. This study is aimed to evaluate the dimensions of a safe surgical corridor for safe sacroiliac screw insertion and relations with age and sex of the patients. METHOD: One hundred randomly selected pelvis CTs of patients with no pelvic diseases, seen at a tertiary care teaching Hospital. Measurements were made by computer and the safest area for screw insertion was calculated by two methods. The results were expressed in mm (not in degrees, in order to be a further surgical reference. RESULTS: There was a significant size difference in the analyzed sacral vertebra, differing on a wider size in men than in women. There was no significant statistical difference between vertebral size and age. By both methods, a safe area for screw insertion could be defined. CONCLUSION: Age does not influence the width of the surgical corridor. The surgeon has a safe corridor considered narrower when inserting screws in a female pelvis than when in a male one. However, as the smallest vertebra found (feminine was considered for statics, it was concluded that this corridor is 20 mm wide in any direction, taking as a reference the centrum of the vertebra.

  19. Securing VoIP keeping your VoIP network safe

    CERN Document Server

    (Bud) Bates, Regis J Jr

    2015-01-01

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

  20. Wireless-Delimited Secure Zones with Encrypted Attribute-Based Broadcast for Safe Firearms

    OpenAIRE

    Portnoi, Marcos; Shen, Chien-Chung

    2014-01-01

    This work presents an application of the highly expressive Attribute-Based Encryption to implement wireless-delimited Secure Zones for firearms. Within these zones, radio-transmitted local policies based on attributes of the consumer and the firearm are received by embedded hardware in the firearms, which then advises the consumer about safe operations. The Secure Zones utilize Attribute-Based Encryption to encode the policies and consumer or user attributes, and providing privacy and securit...

  1. DOES FOOD SAFETY CONFLICT WITH FOOD SECURITY? THE SAFE CONSUMPTION OF FOOD

    OpenAIRE

    Kinsey, Jean D.

    2004-01-01

    This paper concludes by saying no, food safety and security reinforce each other. It combines food safety and food security into the concept of "safe food consumption." Unsafe food consumption occurs when food contains known substances that lead to short or long term illness or death (botulism) and suspect substances that are believed to lead to delayed diseases (pesticides). It also occurs when hunger or over eating contribute to long-term illness and shorter life expectancy. The costs of il...

  2. Genetically modified anthrax lethal toxin safely delivers whole HIV protein antigens into the cytosol to induce T cell immunity

    Science.gov (United States)

    Lu, Yichen; Friedman, Rachel; Kushner, Nicholas; Doling, Amy; Thomas, Lawrence; Touzjian, Neal; Starnbach, Michael; Lieberman, Judy

    2000-07-01

    Bacillus anthrax lethal toxin can be engineered to deliver foreign proteins to the cytosol for antigen presentation to CD8 T cells. Vaccination with modified toxins carrying 8-9 amino acid peptide epitopes induces protective immunity in mice. To evaluate whether large protein antigens can be used with this system, recombinant constructs encoding several HIV antigens up to 500 amino acids were produced. These candidate HIV vaccines are safe in animals and induce CD8 T cells in mice. Constructs encoding gag p24 and nef stimulate gag-specific CD4 proliferation and a secondary cytotoxic T lymphocyte response in HIV-infected donor peripheral blood mononuclear cells in vitro. These results lay the foundation for future clinical vaccine studies.

  3. Engineering safe and secure cyber-physical systems the specification PEARL approach

    CERN Document Server

    Gumzej, Roman

    2016-01-01

    This book introduces the concept of holistic design and development of cyber physical systems to achieve their safe and secure operation. It shows that by following the standards for embedded system’s safety and using appropriate hardware and software components inherently safe system’s architectures can be devised and certified. While the standards already enable testing and certification of inherently safe and sound hardware, this is still not the case with software. The book demonstrates that Specification PEARL(SPEARL) addresses this issue and proposes appropriate solutions from the viewpoints of software engineering as well as concrete program components. By doing so it reduces the complexity of cyber physical systems design in an innovative way. Three ultimate goals are being followed in the course of defining this new PEARL standard, namely: 1. simplicity over complexity, 2. inherent real-time ability, and 3. conformity to safety integrity and security capability levels.

  4. Report: Information Security Series: Security Practices Safe Drinking Water Information System

    Science.gov (United States)

    Report #2006-P-00021, March 30, 2006. We found that the Office of Water (OW) substantially complied with many of the information security controls reviewed and had implemented practices to ensure production servers are monitored.

  5. Children affected by HIV/AIDS: SAFE, a model for promoting their security, health, and development.

    Science.gov (United States)

    Betancourt, Theresa S; Fawzi, Mary K S; Bruderlein, Claude; Desmond, Chris; Kim, Jim Y

    2010-05-01

    A human security framework posits that individuals are the focus of strategies that protect the safety and integrity of people by proactively promoting children's well being, placing particular emphasis on prevention efforts and health promotion. This article applies this framework to a rights-based approach in order to examine the health and human rights of children affected by HIV/AIDS. The SAFE model describes sources of insecurity faced by children across four fundamental dimensions of child well-being and the survival strategies that children and families may employ in response. The SAFE model includes: Safety/protection; Access to health care and basic physiological needs; Family/connection to others; and Education/livelihoods. We argue that it is critical to examine the situation of children through an integrated lens that effectively looks at human security and children's rights through a holistic approach to treatment and care rather than artificially limiting our scope of work to survival-oriented interventions for children affected by HIV/AIDS. Interventions targeted narrowly at children, in isolation of their social and communal environment as outlined in the SAFE model, may in fact undermine protective resources in operation in families and communities and present additional threats to children's basic security. An integrated approach to the basic security and care of children has implications for the prospects of millions of children directly infected or indirectly affected by HIV/AIDS around the world. The survival strategies that young people and their families engage in must be recognized as a roadmap for improving their protection and promoting healthy development. Although applied to children affected by HIV/AIDS in the present analysis, the SAFE model has implications for guiding the care and protection of children and families facing adversity due to an array of circumstances from armed conflict and displacement to situations of extreme poverty.

  6. Regulatory Framework and Current Practices of the Radioactive Material Safe and Secure Transport in Albania

    International Nuclear Information System (INIS)

    Dollani, K.; Grillo, B.; Telhaj, E.

    2016-01-01

    Attempts for the establishing of a safe and secure radioactive material transport in Albania began a decade ago with formulation of the different regulation in the field of safe and secure handling of the radioactive materials. In 2004 a special regulation for the safe transport of radioactive material was prepared and approved by the National Radiation Protection Commission). This regulation has been based in the IAEA standards for the radioactive material transport and was reviewed periodically. The last regulation of the radioactive material transport was approved by Albanian government through a governmental ordinance. The transport of the radioactive material in Albania is performed by licensed subjects, which fulfill all requirements of the mentioned governmental ordinance. Based in the existing regulation, for each transport of radioactive material, a special permission is issued by NRPC. The issuing of permission allows competent authority to provide necessary information on transport regularity and to have under survey all transports of the radioactive material carried out inside the country. Last year were issued more than 80 permissions for the transport of the different types and categories of the radioactive sources. (author)

  7. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    Energy Technology Data Exchange (ETDEWEB)

    Mendez Cruz, Carmen Margarita [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rochau, Gary E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Middleton, Bobby [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Salvador B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rodriguez, Carmelo [General Atomics, San Diego, CA (United States); Schleicher, Robert [General Atomics, San Diego, CA (United States)

    2016-06-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)’s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  8. Enabling Technologies for Ultra-Safe and Secure Modular Nuclear Energy

    International Nuclear Information System (INIS)

    Mendez Cruz, Carmen Margarita; Rochau, Gary E.; Middleton, Bobby; Rodriguez, Salvador B.; Rodriguez, Carmelo; Schleicher, Robert

    2016-01-01

    Sandia National Laboratories and General Atomics are pleased to respond to the Advanced Research Projects Agency-Energy (ARPA-e)'s request for information on innovative developments that may overcome various current reactor-technology limitations. The RFI is particularly interested in innovations that enable ultra-safe and secure modular nuclear energy systems. Our response addresses the specific features for reactor designs called out in the RFI, including a brief assessment of the current state of the technologies that would enable each feature and the methods by which they could be best incorporated into a reactor design.

  9. Implementation evaluation of steering teens safe: engaging parents to deliver a new parent-based teen driving intervention to their teens.

    Science.gov (United States)

    Ramirez, Marizen; Yang, Jingzhen; Young, Tracy; Roth, Lisa; Garinger, Anne; Snetselaar, Linda; Peek-Asa, Corinne

    2013-08-01

    Parents play a fundamental role in teaching their children safe driving skills to reduce risk of motor vehicle crashes, the leading cause of death for teens. Steering Teens Safe is a new parent-based intervention that equips parents with communication skills to talk about, demonstrate, and practice safe driving behaviors and skills with their teens. This implementation evaluation focuses on a sample of 83 parents who delivered Steering Teens Safe to their teens. One-, 2- and 3-month follow-up assessments were conducted with intervention parents to evaluate the self-reported quantity and quality of talking about, demonstrating, and practicing safe driving goals with teens; perceived success and benefit of the program; and barriers to implementation. Over 3 months of follow-up, parents discussed driving goals with their teens for a median of 101.5 minutes. The most frequently addressed topics were general safety principles, including distracted driving, driving in bad weather, wearing a seat belt, and being a safe passenger. Parents spent a median of 30 minutes practicing safe driving skills such as changing lanes. Sixty-seven percent of parents talked to their children about rural road safety, but just 36% demonstrated and half practiced these skills with their teens. Barriers to implementation include time and opportunity barriers and resistant attitudes of their teens. However, barriers neither affected frequency of engagement nor parents' perceived benefit and comfort in delivering the program. Parents with time/opportunity barriers also had higher practice and demonstration times than parents without these barriers. Findings indicate high acceptability among parent implementers and promise for real-world delivery. Future studies are needed to assess intervention impact.

  10. Safe and Secure Transportation of Radioactive Materials in Pakistan and Future Challenges

    International Nuclear Information System (INIS)

    Muneer, Muhammad; Ejaz, Asad

    2016-01-01

    PNRA is the sole organization in the country responsible to regulate all matters pertaining to ionizing radiations. For the safety of transport of radioactive material in the country, PNRA has adopted IAEA TS-R-1 as a national regulation. To cover the security aspects and emergency situations, if any, during the transportation of radioactive material, PNRA has issued the regulatory guide on ‘Transportation of Radioactive Material by Road in Pakistan’. In Pakistan, low to medium activity radioactive sources are transported from one place to another by road for the purpose of industrial radiography, well logging, medical application, etc. According to national policy, sealed radioactive sources of half life greater than 1 year and with initial activity of 100 GBq or more imported in the country are required to be returned to country of origin (exported) after its use. Although the activities related to transport of radioactive material remained safe and secure and no major accident/incident has been reported so far, however, the improvement/enhancement in the regulatory infrastructure is a continuous process. In future, more challenges are expected to be faced in the safety of transport packages. This paper will describe the steps taken by PNRA for the safety and security of transport of radioactive material in the country and future challenges. (author)

  11. International Conference on the Safe and Secure Transport of Radioactive Material: The Next Fifty Years of Transport - Creating a Safe, Secure and Sustainable Framework. Papers and Presentations

    International Nuclear Information System (INIS)

    2011-01-01

    The objective of the conference is to encourage application of appropriate levels of safety and security during transport by: Promoting international discussion on the safety and security of radioactive material transport; Identifying and sharing best practices; Identifying issues and problems; Identifying opportunities, such as providing assistance, to support national adoption of comprehensive transport safety and security frameworks; Developing ideas for coordinating and enhancing transport safety and security. Scope of the Conference: Nuclear and other radioactive material in legal regulated transport (not illicit trafficking, smuggling, etc.); All modes of transport; Safety; Security; Domestic and international movements, including transit; Response to accidents and security events; Legislative and regulatory requirements and approaches; Practical issues such as transport logistics; Regional networks; and Information security and the need for transparency. The conference is not intended to cover the technical topics covered in the PATRAM conference (package design and analysis).

  12. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  13. Development of Self-Remediating Packaging for Safe and Secure Transport of Infectious Substances.

    Energy Technology Data Exchange (ETDEWEB)

    Guilinger, Terry Rae; Gaudioso, Jennifer M; Aceto, Donato Gonzalo; Lowe, Kathleen M.; Tucker, Mark D; Salerno, Reynolds Mathewson; Souza, Caroline Ann

    2006-11-01

    As George W. Bush recognized in November 2001, "Infectious diseases make no distinctions among people and recognize no borders." By their very nature, infectious diseases of natural or intentional (bioterrorist) origins are capable of threatening regional health systems and economies. The best mechanism for minimizing the spread and impact of infectious disease is rapid disease detection and diagnosis. For rapid diagnosis to occur, infectious substances (IS) must be transported very quickly to appropriate laboratories, sometimes located across the world. Shipment of IS is problematic since many carriers, concerned about leaking packages, refuse to ship this material. The current packaging does not have any ability to neutralize or kill leaking IS. The technology described here was developed by Sandia National Laboratories to provide a fail-safe packaging system for shipment of IS that will increase the likelihood that critical material can be shipped to appropriate laboratories following a bioterrorism event or the outbreak of an infectious disease. This safe and secure packaging method contains a novel decontaminating material that will kill or neutralize any leaking infectious organisms; this feature will decrease the risk associated with shipping IS, making transport more efficient. 3 DRAFT4

  14. Status of the Regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Raoelina Andriambololona; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2011-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law No. 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree No.2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis.

  15. An Embedded System for Safe, Secure and Reliable Execution of High Consequence Software

    Energy Technology Data Exchange (ETDEWEB)

    MCCOY,JAMES A.

    2000-08-29

    As more complex and functionally diverse requirements are placed on high consequence embedded applications, ensuring safe and secure operation requires an execution environment that is ultra reliable from a system viewpoint. In many cases the safety and security of the system depends upon the reliable cooperation between the hardware and the software to meet real-time system throughput requirements. The selection of a microprocessor and its associated development environment for an embedded application has the most far-reaching effects on the development and production of the system than any other element in the design. The effects of this choice ripple through the remainder of the hardware design and profoundly affect the entire software development process. While state-of-the-art software engineering principles indicate that an object oriented (OO) methodology provides a superior development environment, traditional programming languages available for microprocessors targeted for deeply embedded applications do not directly support OO techniques. Furthermore, the microprocessors themselves do not typically support nor do they enforce an OO environment. This paper describes a system level approach for the design of a microprocessor intended for use in deeply embedded high consequence applications that both supports and enforces an OO execution environment.

  16. Status of the regulation for safe and secure transport of radioactive materials in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, Raoelina; Zafimanjato, J.L.R.; Solofoarisina, W.C.; Randriantseheno, H.F.

    2016-01-01

    Radioactive sources are widely used in medicine, in industrial exploration and development, as well as in basic scientific research and education in Madagascar. The ability to use such radioactive materials in these sectors depends on their safe and secure transport both within and between countries. Transport safety of radioactive materials within the country is regulated. The law n° 97-041 on radiation protection and radioactive waste management in Madagascar promulgated in January 1998 and the decree n° 2735/94 dealing the transport of radioactive materials promulgated in June 1994 govern all activities related to the transport of radioactive material. This law was established to meet the requirements of the International Basic Safety Standards (BSS, IAEA Safety Series 115). It is not fully consistent with current international standards (GS-R-1). Indeed, in order to enhance the security of radioactive sources, Madagascar has implemented the Code of Conduct and the Guidance on the Import and Export of Radioactive Sources. Faced with delays and denials of shipment of radioactive materials issues, the National Focal Point has been appointed to work with ISC members and the regional networks on the global basis. (author)

  17. Experiences for the Safe and Secure transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2016-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  18. Experiences for the Safe and Secure Transport of Radioactive Material in Islamic Republic of Iran

    International Nuclear Information System (INIS)

    Hajizadeh, B.; Eshraghi, A.; Deevband, M.R.; Kardan, M.R.

    2011-01-01

    The Iranian Nuclear Regulatory Authority (INRA) has been addressed the actions to be taken in respect of the safe and secure transport of radioactive material. Firstly, INRA translated TS-R-1 and approved it as national standard and imparted it to all entities that engage in transport of radioactive material. Training course was provided for the designers, consignors, carriers and consignees based on their actions in transport of radioactive material. All radioactive material carrier companies were enforced to observe all aspects of national standard and receive an authorized license of National Radiation Protection Department (NRPD). The NRPD has written procedures to regain control of the radiation sources together with the National Waste Management Department. Transport arrangements are in place for imported and exported sources. According to the Code of Conduct on safety and security, the sources category I, II and III have been registered in data bases carefully so far. All the licensees are obligated to inform the Regulatory Authority for any changes in position, application, possession, transfer or waste of radiation sources. There is a formal agreement with the National Security Council to permit the import of scrap metal at major entry points on the borders. Scrap metal importers are required to use these points of entry which are monitored by officers of the NRPD and portal gate monitors which are installed at the main entry points and be controlled from unique centre. If required, the NRPD will supply staff to other border entry points. Presently some portal gate monitors are in progress at the borderline customs also. All the major metal recycling facilities in IRAN have installed portal gate monitors to recheck their scrap metal imports. (author)

  19. United States Seaport Security: Protection Against a Nuclear Device Attack Delivered in a Shipping Cargo Container

    Science.gov (United States)

    2014-06-13

    off a radioactive dirty bomb, and on 29 June Moldavian undercover security agents posing as a North African buyer arrested six men trying to sell...military targets in various countries, including the 11 September 2001 attacks, 1998 U.S. Embassy bombings, USS Cole bombings, and 2002 Bali bombings

  20. Safe, secure, and clean disposal of final nuclear wastes using 'PyroGreen' strategies

    International Nuclear Information System (INIS)

    Jung, HyoSook; Choi, Sungyeol; Hwang, Il Soon

    2011-01-01

    Spent nuclear fuels (SNFs) present global challenges that must be overcome to pave way for safe, secure, peaceful and clean nuclear energy. As one of innovative solutions, we have proposed an innovative partitioning, transmutation, and disposal approach named as 'PyroGreen' that is designed to eliminate the need for high-level waste repositories. A flowsheet of pyrochemical partitioning process with technically achievable values of decontamination factors on long-living radionuclides has been established to enable all the final wastes to be disposed of as low and intermediate level wastes. The long-term performance of a geological repository was assessed by SAFE-ROCK code for the final wastes from the PyroGreen processing of entire 26,000 MTHM of SNFs arising from lifetime operation of 24 pressurized water reactors. The assessment results agree well with an earlier study in the fact that most harmful radionuclides dominating groundwater migration risk are shown to be long-living fission products including C-14, Cl-36, Se-79, I-129, and Cs-135, whereas most actinides including U, Pu, Np, Am, and Cm are shown to remain near the repository. It is shown that the final wastes can meet the radiological dose limit of current Korean regulation on the low and intermediate level waste repository. Long-living actinide concentration in wastes is comparable with those in wastes in Waste Isolation Pilot Plant that has proved adequately low risk of human intrusion. Overall decontamination factors required for PyroGreen are finally determined as 20,000 for uranium and all transuranic elements whereas much lower values in the range of 10-50 are required for important fission products including Se, Tc, I, Sr, and Cs in order to eliminate the need for any high-level waste repository. It has been shown that experimentally demonstrated recovery rate data for key process steps positively support the feasibility of PyroGreen. SAFE-ROCK code was used to evaluate the long-term performance

  1. Critical Conversations and the Role of Dialogue in Delivering Meaningful Improvements in Safety and Security Culture

    International Nuclear Information System (INIS)

    Brissette, S.

    2016-01-01

    Significant scholarship has been devoted to research into safety culture assessment methodologies. These focus on the development, delivery and interpretations of safety culture surveys and other assessment techniques to assure reliable outcomes that provide insights into the safety culture of an organization across multiple dimensions. The lessons from this scholarship can be applied to the emerging area of security culture assessments as the nuclear industry broadens its focus on this topic. The aim of this paper is to discuss the value of establishing mechanisms, immediately after an assessment and regularly between assessments, to facilitate a structured dialogue among leaders around insights derived from an assessment, to enable ongoing improvements in safety and security culture. The leader’s role includes both understanding the current state of culture, the “what is”, and creating regular, open and informed dialogue around their role in shaping the culture to achieve “what should be”.

  2. Delivering high-level food industry skills for future food security through Advanced Training Partnerships

    OpenAIRE

    Frazier, Richard A.

    2013-01-01

    The UK Biotechnology and Biological Sciences Research Council’s Advanced Training Partnerships initiative represents a significant investment in the provision of high-level skills for the UK food industry sector to address global food security from farm to fork. This paper summarises the background, aims and scope of the Advanced Training Partnerships, their development so far, and offers a view on future directions and evaluation of impact.

  3. Nanoparticulate iron(III) oxo-hydroxide delivers safe iron that is well absorbed and utilised in humans

    Science.gov (United States)

    Pereira, Dora I.A.; Bruggraber, Sylvaine F.A.; Faria, Nuno; Poots, Lynsey K.; Tagmount, Mani A.; Aslam, Mohamad F.; Frazer, David M.; Vulpe, Chris D.; Anderson, Gregory J.; Powell, Jonathan J.

    2014-01-01

    Iron deficiency is the most common nutritional disorder worldwide with substantial impact on health and economy. Current treatments predominantly rely on soluble iron which adversely affects the gastrointestinal tract. We have developed organic acid-modified Fe(III) oxo-hydroxide nanomaterials, here termed nano Fe(III), as alternative safe iron delivery agents. Nano Fe(III) absorption in humans correlated with serum iron increase (P solubility. The most promising preparation (iron hydroxide adipate tartrate: IHAT) showed ~80% relative bioavailability to Fe(II) sulfate in humans and, in a rodent model, IHAT was equivalent to Fe(II) sulfate at repleting haemoglobin. Furthermore, IHAT did not accumulate in the intestinal mucosa and, unlike Fe(II) sulfate, promoted a beneficial microbiota. In cellular models, IHAT was 14-fold less toxic than Fe(II) sulfate/ascorbate. Nano Fe(III) manifests minimal acute intestinal toxicity in cellular and murine models and shows efficacy at treating iron deficiency anaemia. From the Clinical Editor This paper reports the development of novel nano-Fe(III) formulations, with the goal of achieving a magnitude less intestinal toxicity and excellent bioavailability in the treatment of iron deficiency anemia. Out of the tested preparations, iron hydroxide adipate tartrate met the above criteria, and may become an important tool in addressing this common condition. PMID:24983890

  4. The experience of the Republic of Belarus in the field of safe and secure transport of radioactive material

    International Nuclear Information System (INIS)

    Astashka, R.; Kronava, Z.; Prykhodzka, A.; Tkachonak, I.

    2016-01-01

    The experience of the safe and secure transport of radioactive material of the Republic of Belarus includes domestic and international movements. Transit is a substantial part of international movements taking into account the location of the country. Legislative and regulatory requirements on safety and security of radioactive material transport being in force in the country include the demands making by such state structures as the Department on Nuclear and Radiation Safety, the Department on supervision for the safe industrial activities, the Ministry of Health of the Republic of Belarus. At the same time response to accidents and security events belongs to the scope of activity of special subdivisions of the Ministry for Emergency Situations and the Ministry of Internal Affairs of the Republic of Belarus. For safety purposes all the above-mentioned structures are executing their duties in close collaboration with each other and are following the IAEA safety and security recommendations. The regulatory infrastructure concerning the safe and secure transport of radioactive material of the Republic of Belarus is the subject of the contributed paper. (author)

  5. Exploring undergraduate midwifery students' readiness to deliver culturally secure care for pregnant and birthing Aboriginal women.

    Science.gov (United States)

    Thackrah, Rosalie D; Thompson, Sandra C; Durey, Angela

    2015-04-16

    Culturally secure health care settings enhance accessibility by Aboriginal Australians and improve their satisfaction with service delivery. A culturally secure health service recognises and responds to the legitimate cultural rights of the recipients of care. Focus is upon the health care system as well as the practice and behaviours of the individuals within it. In an attempt to produce culturally secure practitioners, the inclusion of Aboriginal content in health professional programs at Australian universities is now widespread. Studies of medical students have identified the positive impact of this content on knowledge and attitudes towards Aboriginal people but relatively little is known about the responses of students in other health professional education programs. This study explored undergraduate midwifery students' knowledge and attitudes towards Aboriginal people, and the impact of Aboriginal content in their program. The study surveyed 44 students who were in their first, second and third years of a direct entry, undergraduate midwifery program at a Western Australian (WA) university. The first year students were surveyed before and after completion of a compulsory Aboriginal health unit. Second and third year students who had already completed the unit were surveyed at the end of their academic year. Pre- and post-unit responses revealed a positive shift in first year students' knowledge and attitudes towards Aboriginal people and evidence that teaching in the unit was largely responsible for this shift. A comparison of post-unit responses with those from students in subsequent years of their program revealed a significant decline in knowledge about Aboriginal issues, attitudes towards Aboriginal people and the influence of the unit on their views. Despite this, all students indicated a strong interest in more clinical exposure to Aboriginal settings. The inclusion of a unit on Aboriginal health in an undergraduate midwifery program has been shown to

  6. Subjective Security in a Volatile Geopolitical Situation: Does Lithuanian Society Feel Safe?

    Directory of Open Access Journals (Sweden)

    Vileikienė Eglė

    2016-12-01

    Full Text Available The geopolitical situation of Lithuania has deteriorated since the annexation of Crimea and the military conflict in Eastern Ukraine. It has affected the objective security of the state as well as subjective security of the Lithuanian population. This article analyses subjective security and deals with the subjective perception of geopolitical and military threats, mainly social attitudes towards national security and the willingness to defend the country. Article is based on theories of securitisation and human security and holds that individuals are the primary referents of security. Empirically, the article relies on the original data of the research project “Subjective Security in a Volatile Geopolitical Context: Traits, Factors and Individual Strategies”, funded by the Research Council of Lithuania. Article shows the dynamics of social attitudes towards security. Over the last 15 years, a clear shift towards the understanding of potential military threats has occurred. Nevertheless, the predominant concern about individual security, overshadowing security of the state and security of the global order, found in previous studies, has persisted. An individual, as a rule, feels most secure in his/her “closest” environment, e.g. family and friends, and least secure in the “farthest” environment, e.g. other continents.

  7. Regulatory Framework for the Safe and Secure Transport of Nuclear Material in Japan

    International Nuclear Information System (INIS)

    Konnai, A.; Shibasaki, N.; Ikoma, Y.; Kato, M.; Yamauchi, T.; Iwasa, T.

    2016-01-01

    Regulations for nuclear material transport in Japan are based on international regulations. Safety and security regulations, however, have sometime different aspects which have caused a conflict of operations. This paper aims to introduce framework of safety and security regulations for nuclear material transport in Japan, and shows some issues in cooperation of these regulations. (author)

  8. Architecture of security management unit for safe hosting of multiple agents

    Science.gov (United States)

    Gilmont, Tanguy; Legat, Jean-Didier; Quisquater, Jean-Jacques

    1999-04-01

    In such growing areas as remote applications in large public networks, electronic commerce, digital signature, intellectual property and copyright protection, and even operating system extensibility, the hardware security level offered by existing processors is insufficient. They lack protection mechanisms that prevent the user from tampering critical data owned by those applications. Some devices make exception, but have not enough processing power nor enough memory to stand up to such applications (e.g. smart cards). This paper proposes an architecture of secure processor, in which the classical memory management unit is extended into a new security management unit. It allows ciphered code execution and ciphered data processing. An internal permanent memory can store cipher keys and critical data for several client agents simultaneously. The ordinary supervisor privilege scheme is replaced by a privilege inheritance mechanism that is more suited to operating system extensibility. The result is a secure processor that has hardware support for extensible multitask operating systems, and can be used for both general applications and critical applications needing strong protection. The security management unit and the internal permanent memory can be added to an existing CPU core without loss of performance, and do not require it to be modified.

  9. The Model-Driven openETCS Paradigm for Secure, Safe and Certifiable Train Control Systems

    DEFF Research Database (Denmark)

    Peleska, Jan; Feuser, Johannes; Haxthausen, Anne Elisabeth

    2012-01-01

    -driven openETCS approach, a threat analysis is performed, identifying both safety and security hazards that may be common to all model-based development paradigms for safety-critical railway control systems, or specific to the openETCS approach. In the subsequent sections state-of-the-art methods suitable...

  10. Safe and secure at work?: findings from the 2002 Workplace Risk Supplement.

    Science.gov (United States)

    Jenkins, E Lynn; Fisher, Bonnie S; Hartley, Dan

    2012-01-01

    To examine employee's perception of safety and related workplace safety and prevention issues, including their use of self-protection measures and victimization experience. The Workplace Risk Supplement (WRS) to the National Crime Victimization Survey (NCVS) was administered to 55,158 employed respondents who were 16 years or older. Trained U.S. Census Bureau interviewers administered the WRS in all households selected for the NCVS during the 6-month reference period from January through June 2002. Responses from the 55,158 WRS respondents were weighted to obtain national estimates, resulting in 142,410,858 cases. The demographic distribution of WRS respondents is very similar to that of the U.S. labor force. Seven percent of respondents reported that they worried about someone in their workplace attacking them, while nearly 4% experienced victimization. The majority indicated that they felt that their workplace, the neighborhood around their workplace, and places they traveled to as part of their job were either "Very Safe" or "Somewhat Safe" from crime. Six percent carried some type of self protection while at work although this varied by occupation. Employees largely feel safe from violence while working. Differences in victimization by occupation bolster efforts to focus workplace violence prevention in high-risk occupations.

  11. Implementation Evaluation of "Steering Teens Safe": Engaging Parents to Deliver a New Parent-Based Teen Driving Intervention to Their Teens

    Science.gov (United States)

    Ramirez, Marizen; Yang, Jingzhen; Young, Tracy; Roth, Lisa; Garinger, Anne; Snetselaar, Linda; Peek-Asa, Corinne

    2013-01-01

    Parents play a fundamental role in teaching their children safe driving skills to reduce risk of motor vehicle crashes, the leading cause of death for teens. "Steering Teens Safe" is a new parent-based intervention that equips parents with communication skills to talk about, demonstrate, and practice safe driving behaviors and skills…

  12. Analysis of application of different approaches to secure safe drinking water

    Directory of Open Access Journals (Sweden)

    Pendić Zoran

    2017-01-01

    Full Text Available In this analysis, the risk systems include the systems within which services sensitive to risk are executed. The complex service of population supply with safe drinking water is considered to be risky. Guidelines for drinking water quality of the World Health Organization (WHO recommends the use of effective preventive approaches to risk-based management of the safety and quality of drinking water. For example, Food Safety Law of the Republic of Serbia stipulates mandatory application of HACCP system in order to obtain safe drinking water. Different approaches to preventive risk-based management for the sake of the safety and quality of drinking water are applied nowadays. In this paper we consider the following approaches: Original Codex Alimentarius HACCP system and some of its modified versions; International standard ISO 22000: 2005 Food safety management systems - Requirements for any organization in the food chain; Water Safety Plan (WSP of the World Health Organization (WHO; Generalized HACCP system. All of these approaches are based, to a greater or lesser extent, on the original Codex Alimentarius HACCP system. The paper gives a situation analysis (SWOT analysis of considered approaches.

  13. μRTZVisor: A Secure and Safe Real-Time Hypervisor

    Directory of Open Access Journals (Sweden)

    José Martins

    2017-10-01

    Full Text Available Virtualization has been deployed as a key enabling technology for coping with the ever growing complexity and heterogeneity of modern computing systems. However, on its own, classical virtualization is a poor match for modern endpoint embedded system requirements such as safety, security and real-time, which are our main target. Microkernel-based approaches to virtualization have been shown to bridge the gap between traditional and embedded virtualization. This notwithstanding, existent microkernel-based solutions follow a highly para-virtualized approach, which inherently requires a significant software engineering effort to adapt guest operating systems (OSes to run as userland components. In this paper, we present μ RTZVisor as a new TrustZone-assisted hypervisor that distinguishes itself from state-of-the-art TrustZone solutions by implementing a microkernel-like architecture while following an object-oriented approach. Contrarily to existing microkernel-based solutions, μ RTZVisor is able to run nearly unmodified guest OSes, while, contrarily to existing TrustZone-assisted solutions, it provides a high degree of functionality and configurability, placing strong emphasis on the real-time support. Our hypervisor was deployed and evaluated on a Xilinx Zynq-based platform. Experiments demonstrate that the hypervisor presents a small trusted computing base size (approximately 60KB, and a performance overhead of less than 2% for a 10 ms guest-switching rate.

  14. Food and nutritional security requires adequate protein as well as energy, delivered from whole-year crop production

    DEFF Research Database (Denmark)

    Coles, Graeme D; Wratten, Stephen D; Porter, John Roy

    2016-01-01

    Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively...... and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies....

  15. Safe Grid

    Science.gov (United States)

    Chow, Edward T.; Stewart, Helen; Korsmeyer, David (Technical Monitor)

    2003-01-01

    The biggest users of GRID technologies came from the science and technology communities. These consist of government, industry and academia (national and international). The NASA GRID is moving into a higher technology readiness level (TRL) today; and as a joint effort among these leaders within government, academia, and industry, the NASA GRID plans to extend availability to enable scientists and engineers across these geographical boundaries collaborate to solve important problems facing the world in the 21 st century. In order to enable NASA programs and missions to use IPG resources for program and mission design, the IPG capabilities needs to be accessible from inside the NASA center networks. However, because different NASA centers maintain different security domains, the GRID penetration across different firewalls is a concern for center security people. This is the reason why some IPG resources are been separated from the NASA center network. Also, because of the center network security and ITAR concerns, the NASA IPG resource owner may not have full control over who can access remotely from outside the NASA center. In order to obtain organizational approval for secured remote access, the IPG infrastructure needs to be adapted to work with the NASA business process. Improvements need to be made before the IPG can be used for NASA program and mission development. The Secured Advanced Federated Environment (SAFE) technology is designed to provide federated security across NASA center and NASA partner's security domains. Instead of one giant center firewall which can be difficult to modify for different GRID applications, the SAFE "micro security domain" provide large number of professionally managed "micro firewalls" that can allow NASA centers to accept remote IPG access without the worry of damaging other center resources. The SAFE policy-driven capability-based federated security mechanism can enable joint organizational and resource owner approved remote

  16. The Impact of a Home-Delivered Meal Program on Nutritional Risk, Dietary Intake, Food Security, Loneliness, and Social Well-Being.

    Science.gov (United States)

    Wright, Lauri; Vance, Lauren; Sudduth, Christina; Epps, James B

    2015-01-01

    Maintaining independence and continuing to live at home is one solution to manage the rising health care costs of aging populations in the United States; furthermore, seniors are at risk of malnutrition and food insecurity. Home-delivered meal programs are a tool to address food, nutrition, and well-being concerns of this population. Few studies have identified outcomes from these programs; this pilot study reviews the nutritional status, dietary intake, well-being, loneliness, and food security levels of seniors participating in a Meals on Wheels delivery service. Clients, new to the meal program, participated in pre- and postphone interviews, and 51 seniors completed the study. The survey was composed of five scales or questionnaires, and statistical analyses were conducted using SPSS. Improvements across all five measures were statistically significant after participating two months in the home-delivered meal program. Implications for further research, practice, and the Older Americans Act are discussed.

  17. Being in a safe and thus secure place, the core of early labour: A secondary analysis in a Swedish context

    Science.gov (United States)

    Carlsson, Ing-Marie

    2016-01-01

    Background Early labour is the very first phase of the labour process and is considered to be a period of time when no professional attendance is needed. However there is a high frequency of women who seek care at the delivery wards during this phase. When a woman is admitted to the delivery ward, one role for midwives is to determine whether the woman is in established labour or not. If the woman is assessed as being in early labour she will probably then be advised to return home. This recommendation is made due to past research that found that the longer a woman is in hospital the higher the risk for complications for her and her child. Women have described how this situation leaves them in a vulnerable situation where their preferences are not always met and where they are not always included in the decision-making process. Aim The aim of this study was to generate a theory based on where a woman chooses to be during the early labour process and to increase our understanding about how experiences can differ from place to place. Methods The method was a secondary analysis with grounded theory. The data used in the analysis was from two qualitative interview studies and 37 transcripts. Conclusion The findings revealed a substantive theory that women needed to be in a safe and thus secure place during early labour. This theory also describes the interplay between how women ascribed their meaning of childbirth as either a natural live event or a medical one, how this influenced where they wanted to be during early labour, and how that chosen place influenced their experiences of labour and birth. PMID:27172510

  18. Food and nutritional security requires adequate protein as well as energy, delivered from whole-year crop production.

    Science.gov (United States)

    Coles, Graeme D; Wratten, Stephen D; Porter, John R

    2016-01-01

    Human food security requires the production of sufficient quantities of both high-quality protein and dietary energy. In a series of case-studies from New Zealand, we show that while production of food ingredients from crops on arable land can meet human dietary energy requirements effectively, requirements for high-quality protein are met more efficiently by animal production from such land. We present a model that can be used to assess dietary energy and quality-corrected protein production from various crop and crop/animal production systems, and demonstrate its utility. We extend our analysis with an accompanying economic analysis of commercially-available, pre-prepared or simply-cooked foods that can be produced from our case-study crop and animal products. We calculate the per-person, per-day cost of both quality-corrected protein and dietary energy as provided in the processed foods. We conclude that mixed dairy/cropping systems provide the greatest quantity of high-quality protein per unit price to the consumer, have the highest food energy production and can support the dietary requirements of the highest number of people, when assessed as all-year-round production systems. Global food and nutritional security will largely be an outcome of national or regional agroeconomies addressing their own food needs. We hope that our model will be used for similar analyses of food production systems in other countries, agroecological zones and economies.

  19. Smart Push, Smart Pull, Sensor to Shooter in a Multi-Level Secure/Safe (MLS) Infrastructure

    Science.gov (United States)

    2006-05-04

    Communication Periods Processing Resource Sanitization Minimum Interrupt Servicing Semaphores Multi-Core Synchronization Primitives Timers And nothing else...Communities of Interest Secure Configuration of all Nodes in Enclave Bandwidth provisioning & partitioning Secure Clock Synchronization Suppression of

  20. Definition of the «Economic Security of an Enterprise» and «Safe Development of an Enterprise» Notions

    Directory of Open Access Journals (Sweden)

    Yefimova Ganna V.

    2013-11-01

    Full Text Available The necessity of this study is explained by difference of opinions regarding understanding of the “economic security of an enterprise” notion, on the one hand, and the poorly studied issue of a combination of the process of enterprise development with a necessary task of ensuring a high level of its economic security, on the other hand. Analysing, systemising and generalising results of scientific studies, the article identifies that economic security of an enterprise is an economic category, which characterises the enterprise functioning conditions. Favourable conditions of functioning ensure a high level of stability and steadiness of an enterprise and its ability of self-realisation and expanded self-reproduction. This becomes possible if an enterprise is capable of resisting external threats and preventing internal ones. Since development of an enterprise is an objective process, which takes place under conditions of uncertainty and changeability of external and internal environments, it is accompanied with a system of threats, which the system of economic security should protect an enterprise from. Taking into account the above, safe development of an enterprise is a process of consecutive transitions of the economic system from one state to another, which is not of a poorer quality than a previous one, which envisages producing new goals and creation of safe conditions for transition from one specific goal, achieved in the process of enterprise functioning, to another. The proposed definitions allow consideration of such significant issues of methodology of management of safe development of an enterprise as the diagnostics of its level and planning.

  1. Delivering Results for Peace and Development

    International Nuclear Information System (INIS)

    Pattison, Hazel

    2013-01-01

    The IAEA’s technical cooperation programme is the primary mechanism for delivering the IAEA’s capacity-building services to its Member States. The programme supports the safe and secure application of nuclear technology for sustainable socioeconomic development in Member States. The overall strategic framework of the TC programme is determined by pertinent provisions laid down in key documents of the IAEA. Strategic direction for the multi-annual TC programme is provided by the Agency’s Members States and, more specifically, by relevant advisory and governance entities. The programme concentrates on: improving human health; supporting agriculture, rural development and food security; advancing water resource management; addressing environmental challenges; helping sustainable energy development, including the use of nuclear power for electricity; and promoting safety and security

  2. Safe Environment Training: Effects on Catholic Schoolteachers' and Administrators' School Security and Satisfaction

    Science.gov (United States)

    Teague, James Brian

    2013-01-01

    In 2002, in light of the sexual abuse crisis in the Catholic church, The United States Conference of Catholic Bishops established "The charter for the Protection of Children and Young People" that mandated safe environment training for clergy personnel, and volunteers working in the Catholic church. In this study, under the auspices of a…

  3. Learning to provide children with a secure base and a safe haven: The Circle of Security-Parenting (COS-P) group intervention.

    Science.gov (United States)

    Kim, Monica; Woodhouse, Susan S; Dai, Chenchen

    2018-05-21

    Insecure attachment is linked to a host of negative child outcomes, including internalizing and externalizing behavior problems. Circle of Security-Parenting (COS-P) is a manualized, video-based, eight unit, group parenting intervention to promote children's attachment security. COS-P was designed to be easily implemented, so as to make attachment interventions more widely available to families. We present the theoretical background of COS-P, research evidence supporting the COS approach, as well as a description of the COS-P intervention protocol. The case example of "Alexa," mother of three children (aged 7, 6, and 4 years), illustrates how parents can make use of the COS-P intervention to better understand children's needs, build skills in observing and interpreting children's signals, learn to recognize and regulate their own responses to their children, and learn new ways of responding to children's needs. © 2018 Wiley Periodicals, Inc.

  4. Promoting Safe, Secure, and Peaceful Growth of Nuclear Energy: Next Steps for Russia and the United States

    OpenAIRE

    Bunn, Matthew G.; Vyacheslav P. Kuznetzov

    2010-01-01

    Russia, the United States and other countries must cooperate to enable large-scale growth of nuclear energy around the world while achieving even higher standards of safety, security, and nonproliferation than are in place today. This will require building a new global framework for nuclear energy, including new or strengthened global institutions. The Belfer Center's Managing the Atom (MTA) Project and the Russian Research Center's Kurchatov Institute developed these and additional recommend...

  5. Sixth Warren K. Sinclair keynote address: The role of a strong regulator in safe and secure nuclear energy.

    Science.gov (United States)

    Lyons, Peter B

    2011-01-01

    The history of nuclear regulation is briefly reviewed to underscore the early recognition that independence of the regulator was essential in achieving and maintaining public credibility. The current licensing process is reviewed along with the status of applications. Challenges faced by both the NRC and the industry are reviewed, such as new construction techniques involving modular construction, digital controls replacing analog circuitry, globalization of the entire supply chain, and increased security requirements. The vital area of safety culture is discussed in some detail, and its importance is emphasized. Copyright © 2010 Health Physics Society

  6. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  7. Safe sex

    Science.gov (United States)

    ... sex; Sexually transmitted - safe sex; GC - safe sex; Gonorrhea - safe sex; Herpes - safe sex; HIV - safe sex; ... contact. STIs include: Chlamydia Genital herpes Genital warts Gonorrhea Hepatitis HIV HPV Syphilis STIs are also called ...

  8. SU-E-J-73: Extension of a Clinical OIS/EMR/R&V System to Deliver Safe and Efficient Adaptive Plan-Of-The-Day Treatments Using a Fully Customizable Plan-Library-Based Workflow

    Energy Technology Data Exchange (ETDEWEB)

    Akhiat, A. [Erasmus MC Cancer Institute, Radiation Oncology, Rotterdam (Netherlands); Elekta, Sunnyvale, CA (United States); Kanis, A.P.; Penninkhof, J.J.; Sodjo, S.; O’Neill, T.; Quint, S.; Doorn, X. van; Schillemans, W.; Heijmen, B.; Hoogeman, M. [Erasmus MC Cancer Institute, Radiation Oncology, Rotterdam (Netherlands); Linton, N.; Coleman, A. [Elekta, Sunnyvale, CA (United States)

    2015-06-15

    Purpose: To extend a clinical Record and Verify (R&V) system to enable a safe and fast workflow for Plan-of-the-Day (PotD) adaptive treatments based on patient-specific plan libraries. Methods: Plan libraries for PotD adaptive treatments contain for each patient several pre-treatment generated treatment plans. They may be generated for various patient anatomies or CTV-PTV margins. For each fraction, a Cone Beam CT scan is acquired to support the selection of the plan that best fits the patient’s anatomy-of-the-day. To date, there are no commercial R&V systems that support PotD delivery strategies. Consequently, the clinical workflow requires many manual interventions. Moreover, multiple scheduled plans have a high risk of excessive dose delivery. In this work we extended a commercial R&V system (MOSAIQ) to support PotD workflows using IQ-scripting. The PotD workflow was designed after extensive risk analysis of the manual procedure, and all identified risks were incorporated as logical checks. Results: All manual PotD activities were automated. The workflow first identifies if the patient is scheduled for PotD, then performs safety checks, and continues to treatment plan selection only if no issues were found. The user selects the plan to deliver from a list of candidate plans. After plan selection, the workflow makes the treatment fields of the selected plan available for delivery by adding them to the treatment calendar. Finally, control is returned to the R&V system to commence treatment. Additional logic was added to incorporate off-line changes such as updating the plan library. After extensive testing including treatment fraction interrupts and plan-library updates during the treatment course, the workflow is running successfully in a clinical pilot, in which 35 patients have been treated since October 2014. Conclusion: We have extended a commercial R&V system for improved safety and efficiency in library-based adaptive strategies enabling a wide

  9. SU-E-J-73: Extension of a Clinical OIS/EMR/R&V System to Deliver Safe and Efficient Adaptive Plan-Of-The-Day Treatments Using a Fully Customizable Plan-Library-Based Workflow

    International Nuclear Information System (INIS)

    Akhiat, A.; Kanis, A.P.; Penninkhof, J.J.; Sodjo, S.; O’Neill, T.; Quint, S.; Doorn, X. van; Schillemans, W.; Heijmen, B.; Hoogeman, M.; Linton, N.; Coleman, A.

    2015-01-01

    Purpose: To extend a clinical Record and Verify (R&V) system to enable a safe and fast workflow for Plan-of-the-Day (PotD) adaptive treatments based on patient-specific plan libraries. Methods: Plan libraries for PotD adaptive treatments contain for each patient several pre-treatment generated treatment plans. They may be generated for various patient anatomies or CTV-PTV margins. For each fraction, a Cone Beam CT scan is acquired to support the selection of the plan that best fits the patient’s anatomy-of-the-day. To date, there are no commercial R&V systems that support PotD delivery strategies. Consequently, the clinical workflow requires many manual interventions. Moreover, multiple scheduled plans have a high risk of excessive dose delivery. In this work we extended a commercial R&V system (MOSAIQ) to support PotD workflows using IQ-scripting. The PotD workflow was designed after extensive risk analysis of the manual procedure, and all identified risks were incorporated as logical checks. Results: All manual PotD activities were automated. The workflow first identifies if the patient is scheduled for PotD, then performs safety checks, and continues to treatment plan selection only if no issues were found. The user selects the plan to deliver from a list of candidate plans. After plan selection, the workflow makes the treatment fields of the selected plan available for delivery by adding them to the treatment calendar. Finally, control is returned to the R&V system to commence treatment. Additional logic was added to incorporate off-line changes such as updating the plan library. After extensive testing including treatment fraction interrupts and plan-library updates during the treatment course, the workflow is running successfully in a clinical pilot, in which 35 patients have been treated since October 2014. Conclusion: We have extended a commercial R&V system for improved safety and efficiency in library-based adaptive strategies enabling a wide

  10. The Effects of Prompting and Reinforcement on Safe Behavior of Bicycle and Motorcycle Riders

    Science.gov (United States)

    Okinaka, Takeru; Shimazaki, Tsuneo

    2011-01-01

    A reversal design was used to evaluate the effects of vocal and written prompts as well as reinforcement on safe behavior (dismounting and walking bicycles or motorcycles on a sidewalk) on a university campus. Results indicated that an intervention that consisted of vocal and written prompts and reinforcement delivered by security guards was…

  11. MELTER: A model of the thermal response of cargos transported in the Safe-Secure Trailer subject to fire environments for risk assessment applications

    International Nuclear Information System (INIS)

    Larsen, M.E.

    1994-08-01

    MELTER is an analysis of cargo responses inside a fire-threatened Safe-Secure Trailer (SST) developed for the Defense Program Transportation Risk Assessment (DPTRA). Many simplifying assumptions are required to make the subject problem tractable. MELTER incorporates modeling which balances the competing requirements of execution speed, generality, completeness of essential physics, and robustness. Input parameters affecting the analysis include those defining the fire scenario, those defining the cargo loaded in the SST, and those defining properties of the SST. For a specified fire, SST, and cargo geometry MELTER predicts the critical fire duration that will lead to a failure. The principal features of the analysis include: (a) Geometric considerations to interpret fire-scenario descriptors in terms of a thermal radiation boundary condition, (b) a simple model of the SST's wall combining the diffusion model for radiation through optically-thick media with an endothermic reaction front to describe the charring of dimensional, rigid foam in the SST wall, (c) a transient radiation enclosure model, (d) a one-dimensional, spherical idealization of the shipped cargos providing modularity so that cargos of interest can be inserted into the model, and (e) associated numerical methods to integrate coupled, differential equations and find roots

  12. Safe society safe mobility

    CSIR Research Space (South Africa)

    Holtmann, B

    2007-07-01

    Full Text Available . Journal of research in crime and delinquency, 21, 233-50. Metropolitan Transportation Authority, 2007. What is Bus Rapid Transit? [O]. Available: http://www.mta.info/mta/planning/brt/whatis.htm Accessed on 28/05/2007 Mijanovich, T., and Weitzman..., 2006. South African Police Service Statistics. [O]. Available: http://www.saps.gov.za/statistics/reports/crimestats/2006/crime_stats.htm Accessed on 29/03/2007 Security.co.za., 2007. Window washers beat up motorist. [O]. Available: http...

  13. How safe is safe?

    International Nuclear Information System (INIS)

    Hughes, C.F.; Flood, M.

    1996-01-01

    60 and 70 degree convexo-concave valve. Nine hundred and one valves were implanted in Australia. Twelve strut fractures were reported. Two other patients have been explanted and have demonstrated 'single leg separation'. This particular problem was only investigated when two patients died of a fractured valve in the same hospital on the same day. A retrospective study of all known patients in Australia has shown poor follow up, lack of knowledge and indeed lack of interest in device failure modes. Consequently, the Australian and New Zealand Heart Valve Registry was established to track all implanted valves and to notify physicians of any new information. This is perhaps the first device-specific register in Australia. The safety of individual devices is often not known by manufacturers, regulators and clinicians alike. No follow up is available and large volume long term studies are yet to be implemented for the majority of devices. Without such studies and without mandatory problem reporting, the relative safety of medical devices will continue to be measured by banner headlines, sensational TV 'grabs' and protracted law suits. At present, only schemes such as the Problem Reporting Scheme can tell us (albeit vaguely) 'how safe is safe'

  14. How Safe Are Our Libraries?

    Science.gov (United States)

    St. Lifer, Evan

    1994-01-01

    Addresses issues of safety and security in libraries. Topics discussed include keeping library collections safe; patron behavioral problems; factoring loss into the budget; staff theft; access versus security; apathy regarding library crime; a need for a unified security apparatus; preventive measures; staff and patron safety; and a…

  15. Delivering Summer Electronic Benefit Transfers for Children through the Supplemental Nutrition Assistance Program or the Special Supplemental Nutrition Program for Women, Infants, and Children: Benefit Use and Impacts on Food Security and Foods Consumed.

    Science.gov (United States)

    Gordon, Anne R; Briefel, Ronette R; Collins, Ann M; Rowe, Gretchen M; Klerman, Jacob A

    2017-03-01

    The Summer Electronic Benefit Transfers for Children (SEBTC) demonstration piloted summer food assistance through electronic benefit transfers (EBTs), providing benefits either through the Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) or the Supplemental Nutrition Assistance Program (SNAP) EBT. To inform food assistance policy and describe how demonstrations using WIC and SNAP models differed in benefit take-up and impacts on food security and children's food consumption. Sites chose to deliver SEBTC using the SNAP or WIC EBT system. Within each site, in 2012, households were randomly assigned to a benefit group or a no-benefit control group. Grantees (eight states and two Indian Tribal Organizations) selected school districts serving many low-income children. Schoolchildren were eligible in cases where they had been certified for free or reduced-price meals during the school year. Before the demonstration, households in the demonstration sample had lower incomes and lower food security, on average, than households with eligible children nationally. Grantees provided selected households with benefits worth $60 per child per summer month using SNAP or WIC EBT systems. SNAP-model benefits covered most foods. WIC-model benefits could only be used for a specific package of foods. Key outcomes were children's food security (assessed using the US Department of Agriculture food security scale) and food consumption (assessed using food frequency questions). Differences in mean outcomes between the benefit and control groups measured impact, after adjusting for household characteristics. In WIC sites, benefit-group households redeemed a lower percentage of SEBTC benefits than in SNAP sites. Nonetheless, the benefit groups in both sets of sites had similar large reductions in very low food security among children, relative to no-benefit controls. Children receiving benefits consumed more healthful foods, and these impacts were larger in WIC

  16. Communication of 10 June 2009 received from the Permanent Mission of the United Kingdom with regard to the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power

    International Nuclear Information System (INIS)

    2009-01-01

    The Secretariat has received a communication dated 10 June 2009 from the Permanent Mission of the United Kingdom of Great Britain and Northern Ireland, attaching a note from the United Kingdom and the final remarks of the Chairman of the International Nuclear Fuel Supply Conference: Securing safe access to peaceful power, held in London on 17 and 18 March 2009. As requested in that communication, the note and final remarks are herewith circulated for the information of Member States

  17. Using intervention mapping for the development of a targeted secure web-based outreach strategy named SafeFriend, for Chlamydia trachomatis testing in young people at risk.

    Science.gov (United States)

    Theunissen, Kevin A T M; Hoebe, Christian J P A; Crutzen, Rik; Kara-Zaïtri, Chakib; de Vries, Nanne K; van Bergen, Jan E A M; van der Sande, Marianne A B; Dukers-Muijrers, Nicole H T M

    2013-10-22

    Many young people at high risk for Chlamydia trachomatis (Ct) are not reached by current sexual health care systems, such as general practitioners and public sexual health care centres (sexually transmitted infection clinics).Ct is the most frequently diagnosed bacterial sexually transmitted infection (STI) among sexually active people and in particular young heterosexuals. Innovative screening strategies are needed to interrupt the transmission of Ct among young people and connect the hidden cases to care. Intervention Mapping (IM), a systematic approach to develop theory- and evidence-based interventions, was used to develop a strategy to target Ct testing towards young people who are currently hidden to care in The Netherlands. Both clinical users (i.e. sexual health care nurses) and public users (i.e., young people at risk for Ct) were closely involved in the IM process. A needs assessment study was carried out using semi-structured interviews among users (N = 21), a literature search and by taking lessons learned from existing screening programmes. Theoretical methods and practical applications to reach high risk young people and influence testing were selected and translated into specific programme components. The IM approach resulted in the development of a secure and web-based outreach Ct screening strategy, named SafeFriend. It is developed to target groups of high-risk young people who are currently hidden to care. Key methods include web-based Respondent Driven Sampling, starting from young Ct positive sexual health care centre clients, to reach and motivate peers (i.e., sex partners and friends) to get tested for Ct. Testing and the motivation of peers were proposed as the desired behavioural outcomes and the Precaution Adoption Process Model was chosen as theoretical framework. End users, i.e., young people and sexual health care nurses were interviewed and included in the development process to increase the success of implementation. IM proved useful

  18. SAFE Newsletter

    OpenAIRE

    2013-01-01

    The Center of Excellence SAFE – “Sustainable Architecture for Finance in Europe” – is a cooperation of the Center for Financial Studies and Goethe University Frankfurt. It is funded by the LOEWE initiative of the State of Hessen (Landes-Offensive zur Entwicklung wissenschaftlich-ökonomischer Exzellenz). SAFE brings together more than 40 professors and just as many junior researchers who are all dedicated to conducting research in support of a sustainable financial architecture. The Center has...

  19. Safeness of radiological machinery

    International Nuclear Information System (INIS)

    Yokoyama, Shun

    1979-01-01

    The human factors affecting the safeness of radiological machinery, which are often very big and complicated machines, are described from the stand point of handling. 20 to 50% of the troubles on equipments seem to be caused by men. This percentage will become even higher in highly developed equipments. Human factors have a great influence on the safeness of radiological equipments. As the human factors, there are sensory factors and knowledge factors as well as psychological factors, and the combination of these factors causes mishandling and danger. Medical services at present are divided in various areas, and consist of the teamwork of the people in various professions. Good human relationship, education and control are highly required to secure the safeness. (Kobatake, H.)

  20. Safe Haven.

    Science.gov (United States)

    Bush, Gail

    2003-01-01

    Discusses school libraries as safe havens for teenagers and considers elements that foster that atmosphere, including the physical environment, lack of judgments, familiarity, leisure, and a welcoming nature. Focuses on the importance of relationships, and taking the time to listen to teens and encourage them. (LRW)

  1. Safe transport of radioactive material

    International Nuclear Information System (INIS)

    1994-01-01

    Delivering radioactive material to where it is needed is a vital service to industry and medicine. Millions of packages are shipped all over the world by all modes of transport. The shipments pass through public places and must meet stringent safety requirements. This video explains how radioactive material is safely transported and describes the rules that carriers and handlers must follow

  2. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    Energy Technology Data Exchange (ETDEWEB)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  3. Plutonium safe handling

    International Nuclear Information System (INIS)

    Tvehlov, Yu.

    2000-01-01

    The abstract, prepared on the basis of materials of the IAEA new leadership on the plutonium safe handling and its storage (the publication no. 9 in the Safety Reports Series), aimed at presenting internationally acknowledged criteria on the radiation danger evaluation and summarizing the experience in the safe management of great quantities of plutonium, accumulated in the nuclear states, is presented. The data on the weapon-class and civil plutonium, the degree of its danger, the measures for provision of its safety, including the data on accident radiation consequences with the fission number 10 18 , are presented. The recommendations, making it possible to eliminate the super- criticality danger, as well as ignition and explosion, to maintain the tightness of the facility, aimed at excluding the radioactive contamination and the possibility of internal irradiation, to provide for the plutonium security, physical protection and to reduce irradiation are given [ru

  4. When is the liquefaction of coal economic. [Including safe and secure supplies, low interest, multiplier effect of money spent inside the country, employment, etc

    Energy Technology Data Exchange (ETDEWEB)

    1980-09-01

    Usually the commercialization of a technology is determined by the economic viability. However, looking at coal conversion we recognize that there is also a strategic factor to be considered. Before entering into what is almost a political debate about the strategic value of coal conversion, let us look at the economic data. Table 2 shows specific cost numbers for coal gasification, coal liquefaction and electricity from coal. When the total cost of the different fuels is calculated with capital charges as would be required by private industry, one would arrive at indeed high figures, high compared to the present day cost of liquid energy. However, in the capital intensive electricity industry, capital can be accounted for on a capital charge basis of 7 to 17%. If this type of soft financing is applied to coal, coal liquids and coal gas, the figures already become much more attractive. Money internally spent within a country will turnover a few times. This is described by economists as the effect of the multiplier. To even further improve the prospects of home-made liquids one can add the value of avoiding unemployment. A labor intensive industry like the coal gasification and liquefaction industry may give a boost to the number of jobs and as a result have even another additional value to the country involved. Such an analysis leads to the conclusion that coal gasification and liquefaction could develop as a utility type industry under rather tight Government control. This has its strategic advantages with respect to stability and security of supply. On the other hand it may discourage private industry from getting involved in this business. Much will therefore depend on the political decision making process and that maybe is one of the biggest unknowns left in answer to the question when coal conversion will become of economic significance.

  5. Validation of an in situ solidification/stabilization technique for hazardous barium and cyanide waste for safe disposal into a secured landfill.

    Science.gov (United States)

    Vaidya, Rucha; Kodam, Kisan; Ghole, Vikram; Surya Mohan Rao, K

    2010-09-01

    The aim of the present study was to devise and validate an appropriate treatment process for disposal of hazardous barium and cyanide waste into a landfill at a Common Hazardous Waste Treatment Storage Disposal Facility (CHWTSDF). The waste was generated during the process of hardening of steel components and contains cyanide (reactive) and barium (toxic) as major contaminants. In the present study chemical fixation of the contaminants was carried out. The cyanide was treated by alkali chlorination with calcium hypochlorite and barium by precipitation with sodium sulfate as barium sulfate. The pretreated mixture was then solidified and stabilized by binding with a combination of slag cement, ordinary Portland cement and fly ash, molded into blocks (5 x 5 x 5 cm) and cured for a period of 3, 7 and 28 days. The final experiments were conducted with 18 recipe mixtures of waste + additive:binder (W:B) ratios. The W:B ratios were taken as 80:20, 70:30 and 50:50. The optimum proportions of additives and binders were finalized on the basis of the criteria of unconfined compressive strength and leachability. The leachability studies were conducted using the Toxicity Characteristic Leaching Procedure. The blocks were analyzed for various physical and leachable chemical parameters at the end of each curing period. Based on the results of the analysis, two recipe mixtures, with compositions - 50% of [waste + (120 g Ca(OCl)(2) + 290 g Na(2)SO(4)) kg(-1) of waste] + 50% of binders, were validated for in situ stabilization into a secured landfill of CHWTSDF. 2010 Elsevier Ltd. All rights reserved.

  6. The SafeCOP ECSEL Project: Safe Cooperating Cyber-Physical Systems Using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Hansson, Hans

    2016-01-01

    This paper presents an overview of the ECSEL project entitled "Safe Cooperating Cyber-Physical Systems using Wireless Communication" (SafeCOP), which runs during the period 2016 -- 2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  7. Safe cycling!

    CERN Multimedia

    Anaïs Schaeffer

    2012-01-01

    The HSE Unit will be running a cycling safety campaign at the entrances to CERN's restaurants on 14, 15 and 16 May. Pop along to see if they can persuade you to get back in the saddle!   With summer on its way, you might feel like getting your bike out of winter storage. Well, the HSE Unit has come up with some original ideas to remind you of some of the most basic safety rules. This year, the prevention campaign will be focussing on three themes: "Cyclists and their equipment", "The bicycle on the road", and "Other road users". This is an opportunity to think about the condition of your bike as well as how you ride it. From 14 to 16 May, representatives of the Swiss Office of Accident Prevention and the Touring Club Suisse will join members of the HSE Unit at the entrances to CERN's restaurants to give you advice on safe cycling (see box). They will also be organising three activity stands where you can test your knowle...

  8. Staying Safe on Social Network Sites

    Science.gov (United States)

    ... Tips Security Tip (ST06-003) Staying Safe on Social Networking Sites Original release date: January 26, 2011 | Last revised: ... so you should take certain precautions. What are social networking sites? Social networking sites, sometimes referred to as "friend- ...

  9. How safe is safe enough?

    International Nuclear Information System (INIS)

    Desnoyers, B.; Chanzy, Y.

    2004-01-01

    The IAEA Regulations for the Safe Transport of Radioactive Material, were historically established with the objective to reduce the probability that persons be exposed to unacceptable doses due to normal operation or accident situations during transport of radioactive material. Based on the International Basic Safety Standards for Protection against Ionizing Radiation (BSS), the definition, which was adopted for an unacceptable dose for an accident situation, is the excess of the maximum dose limits permissible in a single year for the occupational exposure of a worker in the BSS. Concerning the severity of accident situations, it has always be clearly stated that the objective of the tests for demonstrating ability to withstand accident conditions of transport was not to cover every accident condition, but solely most of them. The last available evaluations regarding the rate of accidents which are covered by the standardised accident conditions of transport defined in the IAEA Regulations give a range of about 80%, plus or minus 15% which depends on transport mode and studies. Consequently, slight variations in the capabilities of the packages to meet the specified performance would probably not have significant consequences on the protection level in case of accident. In the assessment of the compliance with the regulations, the tendency of experts, taking advantage of the enhanced performances of computer calculation codes, is to ask more and more calculations, with more and more accuracy, leading to more and more restrictions. Consequently, cost and delay are considerably increased without any evidence of an equivalent effect on the level of protection. This paper will initiate a reflection on the general objectives and principles when implementing the Regulations, in such a way that demonstrations remain cost effective, taking into account evolution of the techniques and a high level of safety

  10. Smart security proven practices

    CERN Document Server

    Quilter, J David

    2014-01-01

    Smart Security: Understanding and Contributing to the Business is a video presentation. Length: 68 minutes. In Smart Security: Understanding and Contributing to the Business, presenter J. David Quilter demonstrates the benefits of how a fully integrated security program increases business profits and delivers smart security practices at the same time. The presentation does away with the misconception that security is only an expense. In fact, a well-integrated security program can protect business interests, thereby enhancing productivity and net income. Quilter covers cost analysis and secu

  11. Traveling Safely with Medicines

    Science.gov (United States)

    ... Medications Safely My Medicine List How to Administer Traveling Safely with Medicines Planes, trains, cars – even boats ... your trip, ask your pharmacist about how to travel safely with your medicines. Make sure that you ...

  12. How to deliver better policy integration?

    International Nuclear Information System (INIS)

    Hattori, Takashi

    2015-01-01

    Several challenges and possible ways forward in reconciling the delivery of energy policy goals including security and affordability are presented, based on the recent analyses by the International Energy Agency (IEA). This article addresses five topics: multiple challenging policy goals of the IEA’s 3 E’s (energy security, economic growth, and environmental sustainability); needs in the transformation to low carbon societies in the energy sectors; major policies and measures for energy sector transformation; multiple related policy goals and multiple benefits of energy efficiency policy; and realising climate and energy policy integration. Overall, this article explores how to better deliver climate and energy policy integration in the real world.

  13. A safe workplace

    International Nuclear Information System (INIS)

    Rittsel, Hans; Andersson, Bengt A.

    1993-01-01

    Full text: The video 'A safe workplace' has been produced by ABB Atom in order to create a tool for showing different target audiences that ABB Atom Nuclear Fuel Production Plant is a safe workplace and to 'de-mystify' nuclear fuel production. The main target audiences are visitor groups and employees of the company, but the video also qualifies for use as an information tool for other target groups who ask for a proper explanation of the way nuclear fuel is produced. The summarized content of the video is as follows: All individual steps of the production process are described with focus on the safety, quality and environmental requirements. The first part shows the delivery of UF 6 (uranium hexafluoride) to the plant and the following process for the conversion to UO 2 (uranium dioxide). The conversion method used is wet conversion that includes evaporation, precipitation, filtration, washing, reduction and stabilization. The next part is a description of the fuel pellet manufacture including uranium oxide blending, pellet pressing, sintering, grinding and a final visual inspection. A separate part, describing the manufacture of fuel pellets with a burnable neutron absorber, is included. The third part shows how to produce fuel rods and complete assemblies. Some of the moments of quality supervision that support the entire manufacturing process are also shown. The last part of the video comprises a brief description of the manufacture of fuel channels and other reactor core components like control rods. The video is produced with a Swedish spoken narrative. The playing time is 15 minutes. The video will be delivered with a text printed in English and copies reproduced in the PAL/VHS system may be ordered from ABB Atom Communication Dept. telefax no +4621-11 41 90, at the price of USD 100.- or SEK 750.- each. (author)

  14. Security intelligence a practitioner's guide to solving enterprise security challenges

    CERN Document Server

    Li, Qing

    2015-01-01

    Identify, deploy, and secure your enterprise Security Intelligence, A Practitioner's Guide to Solving Enterprise Security Challenges is a handbook for security in modern times, against modern adversaries. As leaders in the design and creation of security products that are deployed globally across a range of industries and market sectors, authors Qing Li and Gregory Clark deliver unparalleled insight into the development of comprehensive and focused enterprise security solutions. They walk you through the process of translating your security goals into specific security technology domains, fo

  15. Delivering migrant workers' remittances

    OpenAIRE

    Ballard, Roger

    2004-01-01

    As globalization has led to ever higher levels of labour mobility, so the volume of funds remitted to their families by workers employed in countries far distant from their homes has increased by leaps and bounds. The total volume of such transfers currently amounts to over $100 billion per annum, the greater part of which flows from economically advanced regions in the West and North to developing countries in the East and South. Delivering those funds swiftly, reliably and cheaply to relati...

  16. Remote secure observing for the Faulkes Telescopes

    Science.gov (United States)

    Smith, Robert J.; Steele, Iain A.; Marchant, Jonathan M.; Fraser, Stephen N.; Mucke-Herzberg, Dorothea

    2004-09-01

    Since the Faulkes Telescopes are to be used by a wide variety of audiences, both powerful engineering level and simple graphical interfaces exist giving complete remote and robotic control of the telescope over the internet. Security is extremely important to protect the health of both humans and equipment. Data integrity must also be carefully guarded for images being delivered directly into the classroom. The adopted network architecture is described along with the variety of security and intrusion detection software. We use a combination of SSL, proxies, IPSec, and both Linux iptables and Cisco IOS firewalls to ensure only authenticated and safe commands are sent to the telescopes. With an eye to a possible future global network of robotic telescopes, the system implemented is capable of scaling linearly to any moderate (of order ten) number of telescopes.

  17. Safe Cooperating Cyber-Physical Systems using Wireless Communication

    DEFF Research Database (Denmark)

    Pop, Paul; Scholle, Detlef; Sljivo, Irfan

    2017-01-01

    This paper presents an overview of the ECSEL project entitled ―Safe Cooperating Cyber-Physical Systems using Wireless Communication‖ (SafeCOP), which runs during the period 2016–2019. SafeCOP targets safety-related Cooperating Cyber-Physical Systems (CO-CPS) characterised by use of wireless...... detection of abnormal behaviour, triggering if needed a safe degraded mode. SafeCOP will also develop methods and tools, which will be used to produce safety assurance evidence needed to certify cooperative functions. SafeCOP will extend current wireless technologies to ensure safe and secure cooperation...

  18. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  19. 78 FR 68784 - Cargo Securing Manuals

    Science.gov (United States)

    2013-11-15

    .../Circ.) 1352 (``Cargo Stowage and Securing (CSS Code) Annex 14 Guidance on Providing Safe Working... Providing Safe Working Conditions for the Securing of Containers'') of the IMO 2010 CSS Code. A cargo safe.... Indian Tribal Governments K. Energy Effects L. Technical Standards M. Environment I. Public Participation...

  20. Delivering the right dose

    International Nuclear Information System (INIS)

    Shaw, A

    2004-01-01

    For treatment with high intensity focused ultrasound (HIFU), delivering the correct amount of energy to the patient is critical. This paper describes a novel design of sensor based on the pyroelectric principle for monitoring the output power from HIFU transducers of the type used for tissue ablation. The sensor is intended to be minimally perturbing to the ultrasound field, so that it can remain in the ultrasound field throughout treatment and provide a constant monitor of ultrasound power. The main advantages of the technique are: power can be measured or monitored without dismantling the HIFU system, thus reducing equipment downtime; power can be measured immediately before or during every patient treatment, thus ensuring accurate dosimetry; power can be measured at the output levels used for treatment (whereas a radiation force balance may be damaged by overheating); the method uses components which are robust and simple to use compared to radiation force balances or hydrophone scanning systems

  1. 1000th magnet delivered!

    CERN Multimedia

    2006-01-01

    On Monday 20 February members of the AT Department marked the delivery of the 1000th superconducting dipole magnet to CERN. Only 232 more of the dipole magnets are needed for the LHC. The 35 tonne-dipoles are 15 meters long and are being manufactured by three companies: Babcock Noell Nuclear in Germany (which finished its contract in November 2005), Ansaldo Superconduttori in Italy and Alstom-Jeumont in France. "The production is proceeding well and we expect to be complete in October as previously foreseen," said Lucio Rossi, Head of the Magnets and Superconductors Group (AT-MAS). In total, 1650 main magnets are needed for the LHC, of which 1300 have been delivered.

  2. 1000th magnet delivered!

    CERN Multimedia

    2006-01-01

    On Monday 20 February members of the AT Department marked the delivery of the 1000th superconducting dipole magnet to CERN. Only 232 more of the dipole magnets are needed for the LHC. The 35-tonne-dipoles are 15 meters long and are being manufactured by three companies: Babcock Noell Nuclear in Germany (which completed its contract in November 2005), Ansaldo Superconduttori in Italy and Alstom-Jeumont in France. 'The production is proceeding well and we expect to be complete in October as foreseen,' said Lucio Rossi, Head of the Magnets and Superconductors Group (AT-MAS). In total, 1650 main magnets are needed for the LHC, of which 1300 have already been delivered.

  3. Used fuel extended storage security and safeguards by design roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Durbin, Samuel G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lindgren, Eric Richard [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Robert [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Ketusky, Edward [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); England, Jeffrey [Savannah River Site (SRS), Aiken, SC (United States). Savannah River National Lab. (SRNL); Scherer, Carolynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Sprinkle, James [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Miller, Michael. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Rauch, Eric [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Scaglione, John [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Dunn, T. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-05-01

    In the United States, spent nuclear fuel (SNF) is safely and securely stored in spent fuel pools and dry storage casks. The available capacity in spent fuel pools across the nuclear fleet has nearly reached a steady state value. The excess SNF continues to be loaded in dry storage casks. Fuel is expected to remain in dry storage for periods beyond the initial dry cask certification period of 20 years. Recent licensing renewals have approved an additional 40 years. This report identifies the current requirements and evaluation techniques associated with the safeguards and security of SNF dry cask storage. A set of knowledge gaps is identified in the current approaches. Finally, this roadmap identifies known knowledge gaps and provides a research path to deliver the tools and models needed to close the gaps and allow the optimization of the security and safeguards approaches for an interim spent fuel facility over the lifetime of the storage site.

  4. HITACHI security concept for industrial control systems

    International Nuclear Information System (INIS)

    Endoh, H.; Yamada, T.; Okubo, S.; Nakano, T.

    2012-01-01

    Security is a necessary factor for the safe and efficient operation of today's control systems. To ensure safe operation of control systems throughout their lifetime, security measures must be carefully planned in the development phase and then maintained continuously during the operation phase and other following phases. To ensure operation within the system's safe states, Hitachi proposes security concept processes (1) to derive security measures rationally and (2) to maintain the security model over the system life cycle. Hitachi also proposes security development programs which support the integration of standards-compliant systems and development of robust control equipment. (author)

  5. Safe Kids Worldwide

    Science.gov (United States)

    ... Blog Videos Newsletter facebook twitter instagram pinterest gplus youtube Search Menu Why It Matters Who We Are What We Do Find Your Safe Kids Safe Kids Day Main menu Keeping All Kids Safe Safety Tips Get Involved 4 Star Charity Donate Text Burns and Scalds 4 tips ...

  6. "Same Room, Safe Place".

    Science.gov (United States)

    Keene Woods, Nikki

    2017-04-01

    There are many different professional stances on safe sleep and then there is the reality of caring for a newborn. There is a debate among professionals regarding safe sleep recommendations. The continum of recommendations vary from the American Academy of Pediatrics (AAP) Safe Sleep Guidelines to the bed-sharing recommendations from the Mother-Baby Behavioral Sleep Laboratory. The lack of consistent and uniform safe sleep recommendations from health professionals has been confusing for families but has more recently raised a real professional ethical dilemma. Despite years of focused safe sleep community education and interventions, sleep-related infant deaths are on the rise in many communities. This commentary calls for a united safe sleep message from all health professionals to improve health for mothers and infants most at-risk, "Same Room, Safe Place."

  7. Security for service oriented architectures

    CERN Document Server

    Williams, Walter

    2014-01-01

    Although integrating security into the design of applications has proven to deliver resilient products, there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need, Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications, the book provides an overview of the various standards that service oriented and distributed applications leverage, includ

  8. Disabled Children: The Right to Feel Safe

    Science.gov (United States)

    Mepham, Sarah

    2010-01-01

    This article explores the fundamental right of disabled children to feel safe and be free from bullying, harassment and abuse. The article proposes that, 20 years since the United Nations Convention on the Rights of the Child, disabled children are still facing barriers to securing this right. The article focuses on recent Mencap research that…

  9. The Role Of Commercially Provided Security in Africa's Patrimonial Security Complexes

    OpenAIRE

    Kinsey, Christopher; Krieg, Andreas

    2014-01-01

    With the concept of public security generally absent in Africa and a factionalized security sector of both state and non-state actors delivering security exclusively to certain groups affiliated with patrimonial elites, this paper examines the role of commercial providers of security within African security sectors. In factionalized security sectors with limited territorial reach, the state unable or unwilling to provide security as a public good within its boundaries has long lost its monopo...

  10. Carbon dioxide angiography: a simple and safe system of delivery

    International Nuclear Information System (INIS)

    Cronin, P.; Patel, J.V.; Kessel, D.O.; Robertson, I.; McPherson, S.J.

    2005-01-01

    Carbon dioxide (CO 2 ) is an established alternate angiographic contrast agent, which can be delivered by pump or hand injection. We describe a simple, safe and inexpensive hand injection system that delivers a known volume of CO 2 at atmospheric pressure and prevents contamination with room air

  11. 12 CFR 21.3 - Security program.

    Science.gov (United States)

    2010-01-01

    ... shall have, at a minimum, the following security devices: (1) A means of protecting cash or other liquid assets, such as a vault, safe, or other secure space; (2) A lighting system for illuminating, during the...

  12. Safe havens in Europe

    DEFF Research Database (Denmark)

    Paldam, Martin

    2013-01-01

    Eleven safe havens exist in Europe providing offshore banking and low taxes. Ten of these states are very small while Switzerland is moderately small. All 11 countries are richer than their large neighbors. It is shown that causality is from small to safe haven to wealth, and that theoretically...... equilibriums are likely to exist where a certain regulation is substantially lower in a small country than in its big neighbor. This generates a large capital inflow to the safe havens. The pool of funds that may reach the safe havens is shown to be huge. It is far in excess of the absorptive capacity...... of the safe havens, but it still explains, why they are rich. Microstates offer a veil of anonymity to funds passing through, and Switzerland offers safe storage of funds....

  13. SMS security system for smart home detectors

    OpenAIRE

    Cekova, Katerina; Gelev, Saso

    2016-01-01

    Security has always been an important problem everywhere. Home security has been a major issue where crime is increasing and everybody wants home security to protect the home. Safety from theft and flame are the most important requirements of a home security system for people. A remote home security system offers many benefits from keeping homeowners, and their property safe. This paper present controlling of the home security system remotely from Android Application. Owners can turn on or...

  14. Security Policies for Mitigating the Risk of Load Altering Attacks on Smart Grid Systems

    Energy Technology Data Exchange (ETDEWEB)

    Ryutov, Tatyana; AlMajali, Anas; Neuman, Clifford

    2015-04-01

    While demand response programs implement energy efficiency and power quality objectives, they bring potential security threats to the Smart Grid. The ability to influence load in a system enables attackers to cause system failures and impacts the quality and integrity of power delivered to customers. This paper presents a security mechanism to monitor and control load according to a set of security policies during normal system operation. The mechanism monitors, detects, and responds to load altering attacks. We examined the security requirements of Smart Grid stakeholders and constructed a set of load control policies enforced by the mechanism. We implemented a proof of concept prototype and tested it using the simulation environment. By enforcing the proposed policies in this prototype, the system is maintained in a safe state in the presence of load drop attacks.

  15. Security in cloud computing

    OpenAIRE

    Moreno Martín, Oriol

    2016-01-01

    Security in Cloud Computing is becoming a challenge for next generation Data Centers. This project will focus on investigating new security strategies for Cloud Computing systems. Cloud Computingisarecent paradigmto deliver services over Internet. Businesses grow drastically because of it. Researchers focus their work on it. The rapid access to exible and low cost IT resources on an on-demand fashion, allows the users to avoid planning ahead for provisioning, and enterprises to save money ...

  16. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-01-01

    The SAFE procedure is an efficient method of evaluating the physical protection system of a nuclear facility. Since the algorithms used in SAFE for path generation and evaluation are analytical, many paths can be evaluated with a modest investment in computer time. SAFE is easy to use because the information required is well-defined and the interactive nature of this procedure lends itself to straightforward operation. The modular approach that has been taken allows other functionally equivalent modules to be substituted as they become available. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  17. Are Detox Diets Safe?

    Science.gov (United States)

    ... Safe Videos for Educators Search English Español Are Detox Diets Safe? KidsHealth / For Teens / Are Detox Diets ... seguras las dietas de desintoxicación? What Is a Detox Diet? The name sounds reassuring — everyone knows that ...

  18. Chernobyl new safe confinement

    International Nuclear Information System (INIS)

    Dodd, L.

    2011-01-01

    The author presents the new safe confinement that will be commissioned at Unit 4 of the Chernobyl NPP in 2015. The confinement will ensure that Chernobyl Unit 4 will be placed in an environmentally safe condition for at least next 100 years. The article highlights the current work status, future perspectives and the feasibility of confinement concept [ru

  19. Asymptotically Safe Dark Matter

    DEFF Research Database (Denmark)

    Sannino, Francesco; Shoemaker, Ian M.

    2015-01-01

    We introduce a new paradigm for dark matter (DM) interactions in which the interaction strength is asymptotically safe. In models of this type, the coupling strength is small at low energies but increases at higher energies, and asymptotically approaches a finite constant value. The resulting...... searches are the primary ways to constrain or discover asymptotically safe dark matter....

  20. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  1. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  2. Linux Server Security

    CERN Document Server

    Bauer, Michael D

    2005-01-01

    Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services such as DNS and delivering mail. But security is the foremost concern of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. This highly regarded book, originally titled Building Secure Servers with Linux, combines practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--

  3. Designing Safe Facilities

    Science.gov (United States)

    McLester, Susan

    2011-01-01

    In the spring of 1999, 12 students and a teacher were killed by two gun-toting teenage boys at Columbine High School in Littleton, Colorado, making school safety and security an overnight priority in communities across the nation. Many schools are starting to borrow security methods and technology from the business world such as video intercoms,…

  4. Safe Sleep for Babies

    Science.gov (United States)

    ... 5 MB] Read the MMWR Science Clips Safe Sleep for Babies Eliminating hazards Recommend on Facebook Tweet ... Page Problem Every year, there are thousands of sleep-related deaths among babies. View large image and ...

  5. Safe operating envelope

    Energy Technology Data Exchange (ETDEWEB)

    Oliva, N [Ontario Hydro, Toronto, ON (Canada)

    1997-12-01

    Safe Operating Envelope is described representing: The outer bound of plant conditions within which day-to-day plant operation must be maintained in order to comply with regulatory requirements, associated safety design criteria and corporate nuclear safety goals. Figs.

  6. The first safe country

    Directory of Open Access Journals (Sweden)

    Raffaela Puggioni

    2012-06-01

    Full Text Available The Dublin II Regulation makes the first safe country of refuge solelyresponsible for refugees and asylum seekers. In the case of Italy, thefirst responsible country has not been acting responsibly.

  7. Buying & Using Medicine Safely

    Science.gov (United States)

    ... Reducers Safe Daily Use of Aspirin Medication Health Fraud Resources for You FDA Consumer Updates (Drugs) Page ... feeds Follow FDA on Twitter Follow FDA on Facebook View FDA videos on YouTube View FDA photos ...

  8. Karate: Keep It Safe.

    Science.gov (United States)

    Jordan, David

    1981-01-01

    Safety guidelines for each phase of a karate practice session are presented to provide an accident-free and safe environment for teaching karate in a physical education or traditional karate training program. (JMF)

  9. Safe operating envelope

    International Nuclear Information System (INIS)

    Oliva, N.

    1997-01-01

    Safe Operating Envelope is described representing: The outer bound of plant conditions within which day-to-day plant operation must be maintained in order to comply with regulatory requirements, associated safety design criteria and corporate nuclear safety goals. Figs

  10. Safe driving for teens

    Science.gov (United States)

    Driving and teenagers; Teens and safe driving; Automobile safety - teenage drivers ... months before taking friends as passengers. Teenage-related driving deaths occur more often in certain conditions. OTHER SAFETY TIPS FOR TEENS Reckless driving is still a ...

  11. Removing Hair Safely

    Science.gov (United States)

    ... For Consumers Home For Consumers Consumer Updates Removing Hair Safely Share Tweet Linkedin Pin it More sharing ... related to common methods of hair removal. Laser Hair Removal In this method, a laser destroys hair ...

  12. Medications: Using Them Safely

    Science.gov (United States)

    ... to Safely Give Ibuprofen Childproofing and Preventing Household Accidents Medicines for Diabetes Complementary and Alternative Medicine How Do Pain Relievers Work? What Medicines Are and What They Do Medicines ...

  13. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  14. DroidSafe

    Science.gov (United States)

    2016-12-01

    Massachusetts Avenue, Build E19-750 Cambridge , MA 02139-4307 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS...Activity objects illustrating the challenges of points-to and information flow analysis...measure how many malicious flows Droid- Safe was able to detect). As these results illustrate , DroidSafe implements an analysis of unprece- dented

  15. Safe biodegradable fluorescent particles

    Science.gov (United States)

    Martin, Sue I [Berkeley, CA; Fergenson, David P [Alamo, CA; Srivastava, Abneesh [Santa Clara, CA; Bogan, Michael J [Dublin, CA; Riot, Vincent J [Oakland, CA; Frank, Matthias [Oakland, CA

    2010-08-24

    A human-safe fluorescence particle that can be used for fluorescence detection instruments or act as a safe simulant for mimicking the fluorescence properties of microorganisms. The particle comprises a non-biological carrier and natural fluorophores encapsulated in the non-biological carrier. By doping biodegradable-polymer drug delivery microspheres with natural or synthetic fluorophores, the desired fluorescence can be attained or biological organisms can be simulated without the associated risks and logistical difficulties of live microorganisms.

  16. Moving towards Cloud Security

    Directory of Open Access Journals (Sweden)

    Edit Szilvia Rubóczki

    2015-01-01

    Full Text Available Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment the users have to know the rule of cloud usage, however they have little knowledge about traditional IT security. It is important to measure the level of their knowledge, and evolve the training system to develop the security awareness. The article proves the importance of suggesting new metrics and algorithms for measuring security awareness of corporate users and employees to include the requirements of emerging cloud security.

  17. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  18. Learning with Security

    Science.gov (United States)

    Jokela, Paivi; Karlsudd, Peter

    2007-01-01

    The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…

  19. Biometry, the safe key

    Directory of Open Access Journals (Sweden)

    María Fraile-Hurtado

    2010-12-01

    Full Text Available Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?

  20. THE CONSEQUENCES OF GLOBALIZATION UPON SAFE TOURISM

    Directory of Open Access Journals (Sweden)

    Svetlana Mihić

    2009-11-01

    Full Text Available Globalization, a phenomenon on the rise, is characterized by the free cross-bor- der movement of individuals, technologies, and capital. It has far- reaching consequen- ces for tourism, too, as it implies travel for leisure and business, and correspondingly, financial transfers between various nation states. Startinf from the status quo in the field, the current paper sets out to analyze the consequences and implications of globalization upon safe tourism and conduct a marketing research into the perceptions of consumers upon Serbia as a safe vacation destination for the purpose of safe tourism. Finally the research results will be presented and several solutions will be provided for improving security in tourism zones

  1. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1966-01-01

    The information given in this document is divided into two parts. In part I the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials delivered by Members up to 31 December 1965 in compliance with requests the Agency had made under Article IX. D. Part III contains information about materials which had not been delivered by 31 December but which had been allocated, in accordance with Article XI. F. 1 of the Statute, to approved Agency projects for which project arrangements were in force on that date

  2. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1965-01-01

    The information given in this document is divided into two parts. In part I the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials delivered by Members up to 31 December 1964 in compliance with requests the Agency had made under Article IX. D. Part II contains information about materials which had not been delivered by 31 December but which had been allocated, in accordance with Article XI. F. 1 of the Statute, to approved Agency projects for which project arrangements were in force on that date

  3. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1968-01-01

    The information given in this document is divided into two parts. In part I the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials delivered by Members up to 30 June 1968 in compliance with requests the Agency had made under Article IX,D. Part II contains information about materials which had not been delivered by 30 June 1968 but which had been allocated, in accordance with Article XI.F.I of the Statute, to approved Agency projects for which project arrangements were in force on that date

  4. Keeping Food Safe

    Centers for Disease Control (CDC) Podcasts

    2009-05-27

    This CDC Kidtastics podcast discusses things kids and parents can do to help prevent illness by keeping food safe.  Created: 5/27/2009 by National Center for Zoonotic, Vector-Borne, and Enteric Diseases (NCZVED).   Date Released: 5/27/2009.

  5. Effective and Safe Ships

    DEFF Research Database (Denmark)

    Pedersen, Preben Terndrup; Amdahl, Jørgen; Rutgersson, Olle

    1996-01-01

    A Joint Nordic Research project "Effecive and Safe Ships" is presented. The project is aiming to develop methods and tools for quantitative evaluation fo ship safety. This report is the report of the preliminary phase where the plan for the main project is developed. The objectives of the project...

  6. Are EU Banks Safe?

    NARCIS (Netherlands)

    R.J. Theissen (Roel)

    2013-01-01

    markdownabstract__Abstract__ What exactly are the rules banks are subject to, and are they fit for purpose? These are the two questions addressed in this book ‘Are EU banks safe?’ and its descriptive companion book ‘EU banking supervision’. The full rulebook on banks is difficult to find

  7. The safe home project.

    Science.gov (United States)

    Arphorn, Sara; Jiraniratisai, Sopaphan; Rungtakul, Rungsri; Phutta, Nikom

    2011-12-01

    The Thai Health Promotion Foundation supported the Improvement of Quality of Life of Informal Workers project in Ban Luang District, Amphur Photaram, Ratchaburi Province. There were many informal workers in Ban Luang District. Sweet-crispy fish producers in Ban Luang were the largest group among the sweet-crispy fish producers in Thailand. This project was aimed at improving living and working conditions of informal workers, with a focus on the sweet-crispy fish group. Good practices of improved living and working conditions were used to help informal workers build safe, healthy and productive work environments. These informal workers often worked in substandard conditions and were exposed to various hazards in the working area. These hazards included risk of exposure to hot work environment, ergonomics-related injuries, chemical hazards, electrical hazards etc. Ergonomics problems were commonly in the sweet-crispy fish group. Unnatural postures such as prolonged sitting were performed dominantly. One hundred and fifty informal workers participated in this project. Occupational health volunteers were selected to encourage occupational health and safety in four groups of informal workers in 2009. The occupational health volunteers trained in 2008 were farmers, beauty salon workers and doll makers. The occupational health and safety knowledge is extended to a new informal worker group: sweet-crispy fish producer, in 2009. The occupational health and safety training for sweet-crispy fish group is conducted by occupational health volunteers. The occupational health volunteers increased their skills and knowledge assist in to make safe home and safe community through participatory oriented training. The improvement of living and working condition is conducted by using a modified WISH, Work Improvement for Safe Home, checklist. The plans of improvement were recorded. The informal workers showed improvement mostly on material handling and storage. The safe uses and safe

  8. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1969-01-01

    In this document the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials delivered by Members up to 30 June 1969 in compliance with requests the Agency had made under Article IX. D

  9. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1975-01-01

    In this document the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials which Members had delivered up to 30 June 1975, in compliance with requests the Agency had made under Article IX. D

  10. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1974-01-01

    In this document the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials which Members had delivered up to 31 March 1974, in compliance with requests the Agency had made under Article IX. D

  11. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1971-01-01

    In this document the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials which Members had delivered up to the end of 1970, in compliance with requests the Agency had made under Article IX. D

  12. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1973-01-01

    In this document the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials which Members had delivered up to the end of 1972, in compliance with requests the Agency had made under Article IX. D

  13. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1972-01-01

    In this document the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials which Members had delivered up to the end of 1971, in compliance with requests the Agency had made under Article IX. D

  14. Feeling safe during an inpatient hospitalization: a concept analysis.

    Science.gov (United States)

    Mollon, Deene

    2014-08-01

    This paper aims to explore the critical attributes of the concept feeling safe. The safe delivery of care is a high priority; however; it is not really known what it means to the patient to 'feel safe' during an inpatient hospitalization. This analysis explores the topic of safety from the patient's perspective. Concept analysis. The data bases of CINAHL, Medline, PsychInfo and Google Scholar for the years 1995-2012 were searched using the terms safe and feeling safe. The eight-step concept analysis method of Walker and Avant was used to analyse the concept of feeling safe. Uses and defining attributes, as well as identified antecedents, consequences and empirical referents, are presented. Case examples are provided to assist in the understanding of defining attributes. Feeling safe is defined as an emotional state where perceptions of care contribute to a sense of security and freedom from harm. Four attributes were identified: trust, cared for, presence and knowledge. Relationship, environment and suffering are the antecedents of feeling safe, while control, hope and relaxed or calm are the consequences. Empirical referents and early development of a theory of feeling safe are explored. This analysis begins the work of synthesizing qualitative research already completed around the concept of feeling safe by defining the key attributes of the concept. Support for the importance of developing patient-centred models of care and creating positive environments where patients receive high-quality care and feel safe is provided. © 2014 John Wiley & Sons Ltd.

  15. Safe use of nanomaterials

    CERN Multimedia

    2013-01-01

    The use of nanomaterials  is on the increase worldwide, including at CERN. The HSE Unit has established a safety guideline to inform you of the main requirements for the safe handling and disposal of nanomaterials at CERN.   A risk assessment tool has also been developed which guides the user through the process of evaluating the risk for his or her activity. Based on the calculated risk level, the tool provides a list of recommended control measures.   We would therefore like to draw your attention to: Safety Guideline C-0-0-5 - Safe handling and disposal of nanomaterials; and Safety Form C-0-0-2 - Nanomaterial Risk Assessment   You can consult all of CERN’s safety rules and guidelines here. Please contact the HSE Unit for any questions you may have.   The HSE Unit

  16. Materials Delivered by Member States

    International Nuclear Information System (INIS)

    1962-01-01

    The information given in this document is divided into two parts. In part I the Director General is reporting to the Members of the Agency, under Article IX. G of the Statute, the quantities of materials delivered up to 30 September 1962 by Member States in compliance with requests the Agency has made under Article IX. D. Part II contains information about materials which have not yet been delivered but which have been allocated, in accordance with Article XI. F. 1 of the Statute, to approved Agency projects for which project agreements were in force on 30 September 1962. Reports on subsequent deliveries of materials and revised information about allocated but undelivered materials will be issued from time to time

  17. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  18. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  19. Moving towards Cloud Security

    OpenAIRE

    Edit Szilvia Rubóczki; Zoltán Rajnai

    2015-01-01

    Cloud computing hosts and delivers many different services via Internet. There are a lot of reasons why people opt for using cloud resources. Cloud development is increasing fast while a lot of related services drop behind, for example the mass awareness of cloud security. However the new generation upload videos and pictures without reason to a cloud storage, but only few know about data privacy, data management and the proprietary of stored data in the cloud. In an enterprise environment th...

  20. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  1. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  2. Escola segura Safe school

    Directory of Open Access Journals (Sweden)

    Edson Ferreira Liberal

    2005-11-01

    Full Text Available OBJETIVO: Revisão das estratégias para tornar o ambiente escolar seguro. Inicialmente os autores contextualizam a violência e os acidentes no ambiente escolar e fazem recomendações, baseadas em dados da literatura, para a implantação de escolas seguras. FONTE DE DADOS: Artigos publicados entre 1993 e 2005 na base de dados MEDLINE. Dados nacionais epidemiológicos e da literatura também foram pesquisados. SÍNTESE DOS DADOS: Há evidência crescente de que a intervenção tem múltiplos componentes. O foco político é a prática em educação em saúde com o envolvimento de toda a comunidade. O norte dessas intervenções é ajudar estudantes e toda a comunidade a adotar um comportamento seguro e saudável. As escolas estão assumindo um envolvimento crescente na promoção da saúde, prevenção de doenças e prevenção de trauma. Nesse contexto de prevenção de causas externas de morbimortalidade, é importante reconhecer o risco ambiental, locais e comportamentos de risco como favoráveis ao trauma e à violência, além de um novo conceito de acidentes como algo que possa ser evitado. CONCLUSÃO: A implementação da escola segura representa uma nova direção promissora para o trabalho preventivo baseado na escola. É importante notar que uma escola segura deve intervir não meramente na sua estrutura física, mas também torná-la tão segura quanto possível, trabalhando com a comunidade escolar por meio de educação em saúde, discutindo principalmente o comportamento saudável.OBJECTIVE: To review the strategies to make school a safe environment. The paper first addresses the social context of accidents and violence in the school environment, and makes recommendations, based on the literature data, for the implementation of safe schools. SOURCE OF DATA: Articles published between 1993 and 2005 in the MEDLINE database. Brazilian epidemiological and literature data have also been searched. SUMMARY OF THE FINDINGS: There is

  3. Safe motherhood at risk?

    Science.gov (United States)

    Thompson, A

    1996-12-01

    Health professionals' negative attitudes toward clients often exacerbate the problems women face in terms of health status and access to health care. Thus, the health professionals can themselves be obstacles to women seeking the health care they need. A key challenge to midwives, in addition to providing technically competent services, is gaining insight into the people for whom they are responsible so that childbirth traditions are treated with respect and women are offered dignity. Safe motherhood requires intersectoral collaboration. Many innovative approaches to safe motherhood are based on the community's participation in planning services that meet the needs of women. Other approaches are based on decentralization of services. For example, a large university teaching hospital in Lusaka, Zambia, set up birthing centers around the city to take the pressure off the hospital. Midwives head up these centers, which are close to the women's homes. Decentralization of delivery services has improved the physical and emotional outcomes for mothers and newborns. Midwives must be prepared to articulate concerns about inequalities and deficiencies in the health care system in order to persuade the government to change. Women, including midwives, need to form multidisciplinary alliances to work together to effect change. The front-line workers in maternity care are midwives. They should adopt the following strategies to become even more effective in their efforts to make motherhood safer. They should listen to what women say about their needs. They should scale services to a manageable, human scale. They should learn the skills to become politically active advocates. They should work with other midwives, women, leaders, and other professional groups. Motherhood can be safe when women have more control over their own decision making, the education to liberate themselves to make their own decisions, and access to skilled care.

  4. Inherently safe reactors

    International Nuclear Information System (INIS)

    Maartensson, Anders

    1992-01-01

    A rethinking of nuclear reactor safety has created proposals for new designs based on inherent and passive safety principles. Diverging interpretations of these concepts can be found. This article reviews the key features of proposed advanced power reactors. An evaluation is made of the degree of inherent safety for four different designs: the AP-600, the PIUS, the MHTGR and the PRISM. The inherent hazards of today's most common reactor principles are used as reference for the evaluation. It is concluded that claims for the new designs being inherently, naturally or passively safe are not substantiated by experience. (author)

  5. Procedures for the Safe Transport of Radioactive Material

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jang Lyul; Chung, K. K.; Lee, J. I.; Chang, S. Y.; Lee, T. Y

    2007-11-15

    This technical report describes the procedure and work responsibility along with the regulation and standard necessary for the safe transport of radioactive or contaminated materials. This report, therefore, can be effectively used to secure the public safety as well as to prevent the disastrous event which might be resulted from the transport process of radioactive materials by establishing a procedure and method on the safe packing, handling and transport of radioactive materials.

  6. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  7. Safe handling of tritium

    International Nuclear Information System (INIS)

    1991-01-01

    The main objective of this publication is to provide practical guidance and recommendations on operational radiation protection aspects related to the safe handling of tritium in laboratories, industrial-scale nuclear facilities such as heavy-water reactors, tritium removal plants and fission fuel reprocessing plants, and facilities for manufacturing commercial tritium-containing devices and radiochemicals. The requirements of nuclear fusion reactors are not addressed specifically, since there is as yet no tritium handling experience with them. However, much of the material covered is expected to be relevant to them as well. Annex III briefly addresses problems in the comparatively small-scale use of tritium at universities, medical research centres and similar establishments. However, the main subject of this publication is the handling of larger quantities of tritium. Operational aspects include designing for tritium safety, safe handling practice, the selection of tritium-compatible materials and equipment, exposure assessment, monitoring, contamination control and the design and use of personal protective equipment. This publication does not address the technologies involved in tritium control and cleanup of effluents, tritium removal, or immobilization and disposal of tritium wastes, nor does it address the environmental behaviour of tritium. Refs, figs and tabs

  8. Vitamins, Are They Safe?

    Directory of Open Access Journals (Sweden)

    Hadi Hamishehkar

    2016-12-01

    Full Text Available The consumption of a daily multivitamin among people all over the world is dramatically increasing in recent years. Most of the people believe that if vitamins are not effective, at least they are safe. However, the long term health consequences of vitamins consumption are unknown. This study aimed to assess the side effects and possible harmful and detrimental properties of vitamins and to discuss whether vitamins can be used as safe health products or dietary supplements. We performed a MEDLINE/PubMed, EMBASE, Scopus and Google Scholar search and assessed reference lists of the included studies which were published from 1993 through 2015. The studies, with an emphasis on RCTs (randomized controlled clinical trials, were reviewed. As some vitamins such as fat-soluble vitamins (vitamin A, vitamin D, vitamin E, and also some of the water-soluble vitamins like folic acid may cause adverse events and some like vitamin C is widely taken assuming that it has so many benefits and no harm, we included relevant studies with negative or undesired results regarding the effect of these vitamins on health. Our recommendation is that taking high-dose supplements of vitamins A, E, D, C, and folic acid is not always effective for prevention of disease, and it can even be harmful to the health.

  9. Cool and Safe: Multiplicity in Safe Innovation at Unilever

    Science.gov (United States)

    Penders, Bart

    2011-01-01

    This article presents the making of a safe innovation: the application of ice structuring protein (ISP) in edible ices. It argues that safety is not the absence of risk but is an active accomplishment; innovations are not "made safe afterward" but "safe innovations are made". Furthermore, there are multiple safeties to be accomplished in the…

  10. Better Safe than Sorry

    DEFF Research Database (Denmark)

    Justesen, Mogens Kamp

    2014-01-01

    A growing literature argues that division of powers matter for economic growth by increasing the security of property rights. However, less effort has been devoted to examining the political and institutional conditions under which property rights have economic effects. This paper emphasizes...... that the economic effects of property rights depend on the division of powers between veto players, meaning that the interaction of veto players and property rights matters for economic growth. This argument is tested empirically on a panel of developing countries. The results show that the economic effects...

  11. Safeguards Automated Facility Evaluation (SAFE) methodology

    International Nuclear Information System (INIS)

    Chapman, L.D.; Grady, L.M.; Bennett, H.A.; Sasser, D.W.; Engi, D.

    1978-08-01

    An automated approach to facility safeguards effectiveness evaluation has been developed. This automated process, called Safeguards Automated Facility Evaluation (SAFE), consists of a collection of a continuous stream of operational modules for facility characterization, the selection of critical paths, and the evaluation of safeguards effectiveness along these paths. The technique has been implemented on an interactive computer time-sharing system and makes use of computer graphics for the processing and presentation of information. Using this technique, a comprehensive evaluation of a safeguards system can be provided by systematically varying the parameters that characterize the physical protection components of a facility to reflect the perceived adversary attributes and strategy, environmental conditions, and site operational conditions. The SAFE procedure has broad applications in the nuclear facility safeguards field as well as in the security field in general. Any fixed facility containing valuable materials or components to be protected from theft or sabotage could be analyzed using this same automated evaluation technique

  12. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  13. Security culture for nuclear facilities

    Science.gov (United States)

    Gupta, Deeksha; Bajramovic, Edita

    2017-01-01

    Natural radioactive elements are part of our environment and radioactivity is a natural phenomenon. There are numerous beneficial applications of radioactive elements (radioisotopes) and radiation, starting from power generation to usages in medical, industrial and agriculture applications. But the risk of radiation exposure is always attached to operational workers, the public and the environment. Hence, this risk has to be assessed and controlled. The main goal of safety and security measures is to protect human life, health, and the environment. Currently, nuclear security considerations became essential along with nuclear safety as nuclear facilities are facing rapidly increase in cybersecurity risks. Therefore, prevention and adequate protection of nuclear facilities from cyberattacks is the major task. Historically, nuclear safety is well defined by IAEA guidelines while nuclear security is just gradually being addressed by some new guidance, especially the IAEA Nuclear Security Series (NSS), IEC 62645 and some national regulations. At the overall level, IAEA NSS 7 describes nuclear security as deterrence and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear, other radioactive substances and their associated facilities. Nuclear security should be included throughout nuclear facilities. Proper implementation of a nuclear security culture leads to staff vigilance and a high level of security posture. Nuclear security also depends on policy makers, regulators, managers, individual employees and members of public. Therefore, proper education and security awareness are essential in keeping nuclear facilities safe and secure.

  14. Safe pill-dispensing.

    Science.gov (United States)

    Testa, Massimiliano; Pollard, John

    2007-01-01

    Each patient is supplied with a smart-card containing a Radio Frequency IDentification (RFID) chip storing a unique identification code. The patient places the Smart-card on a pill-dispenser unit containing an RFID reader. The RFID chip is read and the code sent to a Base-station via a wireless Bluetooth link. A database containing both patient details and treatment information is queried at the Base-station using the RFID as the search key. The patient's treatment data (i.e., drug names, quantities, time, etc.) are retrieved and sent back to the pill-dispenser unit via Bluetooth. Appropriate quantities of the required medications are automatically dispensed, unless the patient has already taken his/her daily dose. Safe, confidential communication and operation is ensured.

  15. Strategies for safe motherhood.

    Science.gov (United States)

    Chatterjee, A

    1995-02-01

    The Safe Motherhood Initiative was launched in 1988 as a global effort to halve maternal mortality and morbidity by the year 2000. The program uses a combination of health and nonhealth strategies to emphasize the need for maternal health services, extend family planning services, and improve the status of women. The maternal mortality rate (per 100,000 live births) is 390 for the world, 20-30 for developed countries, 450 for developing countries, and 420 for Asia. This translates into 308,000 maternal deaths in Asia, of which 100,000 occur in India. The direct causes of maternal mortality include sepsis, hemorrhage, eclampsia, and ruptured uterus. Indirect causes occur when associated medical conditions, such as anemia and jaundice, are exacerbated by pregnancy. Underlying causes are ineffective health services, inadequate obstetric care, unregulated fertility, infections, illiteracy, early marriage, poverty, malnutrition, and ignorance. India's Child Survival and Safe Motherhood Program seeks to achieve immediate improvements by improving health care. Longterm improvements will occur as nutrition, income, education, and the status of women improve. Improvements in health care will occur in through the provision of 1) essential obstetric care for all women (which will be essentially designed for low-risk women), 2) early detection of complications during pregnancy and labor, and 3) emergency services. Services will be provided to pregnant women at their door by field staff, at a first referral hospital, perhaps at maternity villages where high risk cases can be housed in the latter part of their pregnancies, and through the continual accessibility of government vehicles. In addition, family planning services will be improved so that fertility regulation can have its expected beneficial effect on the maternal mortality rate. The professional health organizations in India will also play a vital role in the success of this effort to reduce maternal mortality.

  16. Trust in Security-Policy Enforcement Mechanisms

    National Research Council Canada - National Science Library

    Schneider, Fred B; Morrisett, Greg

    2005-01-01

    .... One avenue of language-based work produced Cyclone, a type-safe variant of C. The Cyclone language retains the familiar syntax and semantics of C code, but provides the strong security guarantees of modem languages such as Java...

  17. Non-physician delivered intravitreal injection service is feasible and safe

    DEFF Research Database (Denmark)

    Rasul, Asrin; Subhi, Yousif; Sørensen, Torben Lykke

    2016-01-01

    INTRODUCTION: Non-physicians such as nurses are trained to give injections into the vitreous body of the eye to meet the increasing demand for intravitreal therapy with vascular endothelial growth factor inhibitors against common eye diseases, e.g. age-related macular degeneration and diabetic...... retinopathy. We systematically reviewed the existing literature to provide an overview of the experiences in this transformational process. METHODS: We searched for literature on 22 September 2015 using PubMed, Embase, the Cochrane Library, CINAHL and the Web of Science. Eligible studies had to address any...

  18. Securing the safety of our most precious cargo: SAFE KIDS.

    Science.gov (United States)

    Vick, Judith W

    2010-01-01

    There are staggering and tragic statistics involving children, car seats, and motor vehicle accidents. According to the Centers for Disease Control and Prevention, motor vehicle injuries are the leading cause of death among children from 0 to 15 years of age, and in the United States during 2005, 1,335 children ages 14 years and younger died as occupants in motor vehicle accidents; approximately 184,000 were injured. That is an average of 4 deaths and 504 injuries each day. National Highway Traffic Safety Administration (NHTSA) statistics show that nearly one-half of deaths and injuries in children occurred because they were not properly restrained. Child safety seats and safety belts, when installed and used properly, can prevent injuries and save lives. Among children under age 5, an estimated 425 lives were saved in 2006 by child restraint use. Research on the effectiveness of child safety seats has found them to reduce fatal injury by 71% for infants, and by 54% for toddlers in passenger cars. This article discusses the need for increased education of parents and healthcare professionals about selection and installation of car safety restraints, and the importance of developing a child safety restraint program.

  19. Safe and secure South Africa. Vehicle landmine protection validation testing

    CSIR Research Space (South Africa)

    Reinecke, JD

    2008-11-01

    Full Text Available The objective of this paper is to provide an overview of vehicle landmine protection validation testing in South Africa. A short history of validation test standards is given, followed by a summary of current open test standards in general use...

  20. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  1. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  2. Safe percutaneous suprapubic catheterisation.

    Science.gov (United States)

    Goyal, N K; Goel, A; Sankhwar, S N

    2012-11-01

    We describe our technique of percutaneous suprapubic catheter insertion with special reference to steps that help to avoid common complications of haematuria and catheter misplacement. The procedure is performed using a stainless steel reusable trocar under local infiltrative anaesthesia, usually at the bedside. After clinical confirmation of a full bladder, the trocar is advanced into the bladder through a skin incision. Once the bladder is entered, the obturator is removed and the assistant inserts a Foley catheter followed by rapid balloon inflation. Slight traction is applied to the catheter for about five minutes. Patients with previous lower abdominal surgery, an inadequately distended bladder or acute pelvic trauma do not undergo suprapubic catheterisation using this method. The procedure was performed in 72 men (mean age: 42.4 years, range: 18-78 years) with urinary retention with a palpable bladder. The average duration of the procedure was less than five minutes. No complications were noted in any of the patients. Trocar suprapubic catheter insertion is a safe and effective bedside procedure for emergency bladder drainage and can be performed by resident surgeons. The common complications associated with the procedure can be avoided with a few careful steps.

  3. Making Our Food Safe

    International Nuclear Information System (INIS)

    Madsen, Michael

    2013-01-01

    Full text: As civilization has progressed societies have strived to make food safer; from using fire to cook our food, and boiling our water to make it safe to drink, advances in technology have helped kill microorganisms that can make food unsafe. The FAO/IAEA Joint Division helps provide technical assistance to Member States that want to implement irradiation technology in making their food safer. Food and waterborne diarrhoeal diseases are estimated to kill roughly 2.2 million people annually, of which 1.9 million are children. Irradiating some of the foods we eat can save many of these lives by reducing the risk of food poisoning and killing the organisms that cause disease. Irradiation works by treating food with a small dose of ionizing radiation, this radiation disrupts the bacteria’s DNA and cell membranes structure stopping the organism from reproducing or functioning, but does not make the food radioactive. It can be applied to a variety of foods from spices and seasonings, to fruits and vegetables and is similar to pasteurization, but without the need for high temperatures that might impair food quality. (author)

  4. Safe Handling of Radioisotopes

    International Nuclear Information System (INIS)

    1958-01-01

    Under its Statute the International Atomic Energy Agency is empowered to provide for the application of standards of safety for protection against radiation to its own operations and to operations making use of assistance provided by it or with which it is otherwise directly associated. To this end authorities receiving such assistance are required to observe relevant health and safety measures prescribed by the Agency. As a first step, it has been considered an urgent task to provide users of radioisotopes with a manual of practice for the safe handling of these substances. Such a manual is presented here and represents the first of a series of manuals and codes to be issued by the Agency. It has been prepared after careful consideration of existing national and international codes of radiation safety, by a group of international experts and in consultation with other international bodies. At the same time it is recommended that the manual be taken into account as a basic reference document by Member States of the Agency in the preparation of national health and safety documents covering the use of radioisotopes.

  5. OPINION: Safe exponential manufacturing

    Science.gov (United States)

    Phoenix, Chris; Drexler, Eric

    2004-08-01

    In 1959, Richard Feynman pointed out that nanometre-scale machines could be built and operated, and that the precision inherent in molecular construction would make it easy to build multiple identical copies. This raised the possibility of exponential manufacturing, in which production systems could rapidly and cheaply increase their productive capacity, which in turn suggested the possibility of destructive runaway self-replication. Early proposals for artificial nanomachinery focused on small self-replicating machines, discussing their potential productivity and their potential destructiveness if abused. In the light of controversy regarding scenarios based on runaway replication (so-called 'grey goo'), a review of current thinking regarding nanotechnology-based manufacturing is in order. Nanotechnology-based fabrication can be thoroughly non-biological and inherently safe: such systems need have no ability to move about, use natural resources, or undergo incremental mutation. Moreover, self-replication is unnecessary: the development and use of highly productive systems of nanomachinery (nanofactories) need not involve the construction of autonomous self-replicating nanomachines. Accordingly, the construction of anything resembling a dangerous self-replicating nanomachine can and should be prohibited. Although advanced nanotechnologies could (with great difficulty and little incentive) be used to build such devices, other concerns present greater problems. Since weapon systems will be both easier to build and more likely to draw investment, the potential for dangerous systems is best considered in the context of military competition and arms control.

  6. Aflatoxins & Safe Storage

    Directory of Open Access Journals (Sweden)

    Philippe eVillers

    2014-04-01

    Full Text Available The paper examines both field experience and research on the prevention of the exponential growth of aflatoxins during multi-month post harvest storage in hot, humid countries. The approach described is the application of modern safe storage methods using flexible, Ultra Hermetic™ structures that create an unbreatheable atmosphere through insect and microorganism respiration alone, without use of chemicals, fumigants, or pumps. Laboratory and field data are cited and specific examples are given describing the uses of Ultra Hermetic storage to prevent the growth of aflatoxins with their significant public health consequences. Also discussed is the presently limited quantitative information on the relative occurrence of excessive levels of aflatoxin (>20 ppb before versus after multi-month storage of such crops as maize, rice and peanuts when under high humidity, high temperature conditions and, consequently, the need for further research to determine the frequency at which excessive aflatoxin levels are reached in the field versus after months of post-harvest storage. The significant work being done to reduce aflatoxin levels in the field is mentioned, as well as its probable implications on post harvest storage. Also described is why, with some crops such as peanuts, using Ultra Hermetic storage may require injection of carbon dioxide or use of an oxygen absorber as an accelerant. The case of peanuts is discussed and experimental data is described.

  7. EUROSAFE forum 2013. Safe disposal of nuclear waste

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2013-07-01

    The proceedings of the EUROSAFE forum 2013 - safe disposal of nuclear waste include contributions to the following topics: Nuclear installation safety - assessment; nuclear installation safety - research; waste and decommissioning - dismantling; radiation protection, 3nvironment and emergency preparedness; security of nuclear installations and materials.

  8. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.

  9. Development of a Health System-Based Nurse-Delivered Aromatherapy Program.

    Science.gov (United States)

    Joswiak, Denise; Kinney, Mary Ellen; Johnson, Jill R; Kolste, Alison K; Griffin, Kristen H; Rivard, Rachael L; Dusek, Jeffery A

    2016-04-01

    Healthcare systems are increasingly looking to integrate aromatherapy (essential oils) as a safe, low-cost, and nonpharmacologic option for patient care to reduce pain, nausea, and anxiety and to improve sleep. This article describes the development and implementation of a healthcare system-wide program of nurse-delivered essential oil therapeutic interventions to inpatients throughout an acute care setting. In addition, we provide lessons learned for nursing administrators interested in developing similar nurse-delivered aromatherapy programs.

  10. Delivering Science from Big Data

    Science.gov (United States)

    Quinn, Peter Joseph

    2015-08-01

    The SKA will be capable of producing a stream of science data products that are Exa-scale in terms of their storage and processing requirements. This Google-scale enterprise is attracting considerable international interest and excitement from within the industrial and academic communities. In this paper we examine the data flow, storage and processing requirements of a number of key SKA survey science projects to be executed on the baseline SKA1 configuration. Based on a set of conservative assumptions about trends for HPC and storage costs, and the data flow process within the SKA Observatory, it is apparent that survey projects of the scale proposed will potentially drive construction and operations costs beyond the current anticipated SKA1 budget. This implies a sharing of the resources and costs to deliver SKA science between the community and what is contained within the SKA Observatory. A similar situation was apparent to the designers of the LHC more than 10 years ago. We propose that it is time for the SKA project and broader community to consider the effort and process needed to design and implement a distributed science data system that leans on the lessons of other projects and looks to recent developments in Cloud technologies to ensure an affordable, effective and global achievement of science goals.

  11. High-Tech Security Help.

    Science.gov (United States)

    Flanigan, Robin L.

    2000-01-01

    Advocates embrace high-tech security measures as necessary to avoid Columbine-style massacres. Critics contend that school systems can go overboard, making students feel less safe and too closely scrutinized. Current electronic, biometric, and computer-mapping devices and school applications are discussed. Vendors are listed. (MLH)

  12. Hydropower's role in delivering sustainability

    International Nuclear Information System (INIS)

    Altinbilek, D.; Seelos, K.; Taylor, R.

    2005-01-01

    equipment within existing infrastructure; this can extend the operating life by a further 30 to 50 years. Small-scale, decentralised development has been responsible for bringing light and power to remote communities. Such schemes have catalysed local commercial diversification and prosperity. The lower investment demand of smaller schemes has enabled private sector involvement through independent power production. Typically smaller schemes become grid connected if the power system is accessible, as this increases the security of supply. Furthermore, schemes at remote sites can assist transmission system stability. A further important role of smaller scale hydro is the recovery of energy at water infrastructure developed for other purposes. In many countries, large schemes play a significant role in national and regional supply security due to the flexibility of storage reservoirs and independence from fuel price fluctuations. Hydro also integrates well with other generation technologies, with its flexibility enabling thermal plants to operate steadily (saving fuel and reducing emissions). In addition, its responsiveness permits the back-up of the intermittent renewables. The question of storage is clearly a major issue in balancing supply and demand. Hydro reservoirs and pump-storage schemes offer security in the stability and reliability of power systems; they can absorb power when there is an excess and follow load demand instantaneously. A major challenge is that 'support' and 'storage' services are rarely understood and encouraged in the market-driven arena. The main arguments against hydropower concern its social impacts, such as land transformation, displacement of people, and environmental changes, i.e. fauna, flora, sedimentation and water quality. The social and environmental impacts can, however, be mitigated by taking appropriate steps according to established codes of good practice. As a tool for this purpose, the hydropower sector has recently developed and

  13. Infectious disease protection for healthcare security officers.

    Science.gov (United States)

    D'Angelo, Michael S; Arias, Jean

    2015-01-01

    Healthcare Security should be considered an active component in an infectious disease event, the authors maintain, and security officers must be included in an Employee Health screening and N95 fit testing initiative to safely welcome the incoming infected patients. In this article, they spell out the different levels of precautions officers should become familiar with in order to protect themselves.

  14. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  15. Fails-to-Deliver Data under 10,000 Shares between September 16, 2008 and July 1, 2009

    Data.gov (United States)

    Securities and Exchange Commission — This file contains the date, CUSIP numbers, ticker symbols, issuer name, price, and total number of fails-to-deliver (i.e., the balance level outstanding) recorded...

  16. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  17. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  18. The Safe and Effective Use of Shared Data Underpinned by Stakeholder Engagement and Evaluation Practice.

    Science.gov (United States)

    Georgiou, Andrew; Magrabi, Farah; Hypponen, Hannele; Wong, Zoie Shui-Yee; Nykänen, Pirkko; Scott, Philip J; Ammenwerth, Elske; Rigby, Michael

    2018-04-22

     The paper draws attention to: i) key considerations involving the confidentiality, privacy, and security of shared data; and ii) the requirements needed to build collaborative arrangements encompassing all stakeholders with the goal of ensuring safe, secure, and quality use of shared data.  A narrative review of existing research and policy approaches along with expert perspectives drawn from the International Medical Informatics Association (IMIA) Working Group on Technology Assessment and Quality Development in Health Care and the European Federation for Medical Informatics (EFMI) Working Group for Assessment of Health Information Systems.  The technological ability to merge, link, re-use, and exchange data has outpaced the establishment of policies, procedures, and processes to monitor the ethics and legality of shared use of data. Questions remain about how to guarantee the security of shared data, and how to establish and maintain public trust across large-scale shared data enterprises. This paper identifies the importance of data governance frameworks (incorporating engagement with all stakeholders) to underpin the management of the ethics and legality of shared data use. The paper also provides some key considerations for the establishment of national approaches and measures to monitor compliance with best practice. Data sharing endeavours can help to underpin new collaborative models of health care which provide shared information, engagement, and accountability amongst all stakeholders. We believe that commitment to rigorous evaluation and stakeholder engagement will be critical to delivering health data benefits and the establishment of collaborative models of health care into the future. Georg Thieme Verlag KG Stuttgart.

  19. Safe Minimum Internal Temperature Chart

    Science.gov (United States)

    ... Internal Temperature Chart Safe steps in food handling, cooking, and storage are essential in preventing foodborne illness. You can't see, smell, or taste harmful bacteria that may cause illness. In every step of food preparation, follow the four guidelines to keep food safe: ...

  20. More than a Safe Space

    Science.gov (United States)

    Sadowski, Michael

    2016-01-01

    Over the past three decades, much of the conversation about LGBTQ students in schools has centered on safety--anti-bullying policies, the "safe space" of gay-straight alliances, and "safe zones" marked by rainbow-colored stickers on classroom doors. In this article, Michael Sadowski argues that it's time to move beyond safety…

  1. Staying Safe in the Water

    Centers for Disease Control (CDC) Podcasts

    In this podcast, Dr. Julie Gilchrist, a pediatrician and medical epidemiologist from CDC’s Injury Center, talks about staying safe in the water. Tips are for all audiences, with a focus on preventing drownings and keeping children safe in and around the pool, lake, or ocean.

  2. Safe Configuration of TLS Connections

    Science.gov (United States)

    2013-10-16

    comparison with observed flows to flag inconsistencies. Keywords: Transport Layer Security ( TLS ), Secure Socket Layer ( SSL ), configuration, secure...servers. SSL / TLS has evolved over 18 years from SSL 1.0 to TLS 1.2 and has been widely deployed and accepted across Internet servers. This has made...and provides a large-scale view of TLS properties across Internet web sites. The guidance provided in [10] describes best practices for SSL / TLS

  3. Safe Anesthesia For Every Tot

    DEFF Research Database (Denmark)

    Weiss, Markus; Vutskits, Laszlo; Hansen, Tom G

    2015-01-01

    PURPOSE OF REVIEW: The term 'safe use of anesthesia in children is ill-defined and requires definition of and focus on the 'safe conduct of pediatric anesthesia'. RECENT FINDINGS: The Safe Anesthesia For Every Tot initiative (www.safetots.org) has been set up during the last year to focus...... on the safe conduct of pediatric anesthesia. This initiative aims to provide guidance on markers of quality anesthesia care. The introduction and implementation of national regulations of 'who, where, when and how' are required and will result in an improved perioperative outcome in vulnerable children....... The improvement of teaching, training, education and supervision of the safe conduct of pediatric anesthesia are the main goals of the safetots.org initiative. SUMMARY: This initiative addresses the well known perioperative risks in young children, perioperative causes for cerebral morbidity as well as gaps...

  4. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  5. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  6. Safe transport of radioactive material. 3. ed

    International Nuclear Information System (INIS)

    2002-01-01

    The IAEA has developed a standardized approach to transport safety training as a means of helping Member States to implement the Transport Regulations. The training manual is an anchor of this standardized approach to training: it contains all the topics presented in the sequential order recommended by the IAEA for the student to gain a thorough understanding of the body of knowledge that is needed to ensure that radioactive material ranked as Class 7 in the United Nations' nomenclature for dangerous goods - is transported safely. The explanations in the text refer, where needed, to the appropriate requirements in the IAEA's Transport Regulations; additional useful information is also provided. Thus, the training manual in addition to the Transport Regulations and their supporting documents is used by the IAEA as the basis for delivering all of its training courses on the safe transport of radioactive material. Enclosed with the training manual is a CD-ROM that contains the text of the manual as well as the visual aids that are used at the IAEA's training courses. The following topics are covered: review of radioactivity and radiation; review of radiation protection principles; regulatory terminology; basic safety concepts: materials and packages; activity limits and material restrictions; selection of optimal package type; test procedures: material and packages; requirements for transport; control of material in transport; fissile material: regulatory requirements and operational aspects; quality assurance; national competent authority; additional regulatory constraints for transport; international liability and insurance; emergency planning and preparedness; training; services provided by the IAEA

  7. Risk management for assuring safe drinking water.

    Science.gov (United States)

    Hrudey, Steve E; Hrudey, Elizabeth J; Pollard, Simon J T

    2006-12-01

    Millions of people die every year around the world from diarrheal diseases much of which is caused by contaminated drinking water. By contrast, drinking water safety is largely taken for granted by many citizens of affluent nations. The ability to drink water that is delivered into households without fear of becoming ill may be one of the key defining characteristics of developed nations in relation to the majority of the world. Yet there is well-documented evidence that disease outbreaks remain a risk that could be better managed and prevented even in affluent nations. A detailed retrospective analysis of more than 70 case studies of disease outbreaks in 15 affluent nations over the past 30 years provides the basis for much of our discussion [Hrudey, S.E. and Hrudey, E.J. Safe Drinking Water--Lessons from Recent Outbreaks in Affluent Nations. London, UK: IWA Publishing; 2004.]. The insights provided can assist in developing a better understanding within the water industry of the causes of drinking water disease outbreaks, so that more effective preventive measures can be adopted by water systems that are vulnerable. This preventive feature lies at the core of risk management for the provision of safe drinking water.

  8. Safe transport of radioactive material. 3. ed

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2002-12-01

    The IAEA has developed a standardized approach to transport safety training as a means of helping Member States to implement the Transport Regulations. The training manual is an anchor of this standardized approach to training: it contains all the topics presented in the sequential order recommended by the IAEA for the student to gain a thorough understanding of the body of knowledge that is needed to ensure that radioactive material ranked as Class 7 in the United Nations' nomenclature for dangerous goods - is transported safely. The explanations in the text refer, where needed, to the appropriate requirements in the IAEA's Transport Regulations; additional useful information is also provided. Thus, the training manual in addition to the Transport Regulations and their supporting documents is used by the IAEA as the basis for delivering all of its training courses on the safe transport of radioactive material. Enclosed with the training manual is a CD-ROM that contains the text of the manual as well as the visual aids that are used at the IAEA's training courses. The following topics are covered: review of radioactivity and radiation; review of radiation protection principles; regulatory terminology; basic safety concepts: materials and packages; activity limits and material restrictions; selection of optimal package type; test procedures: material and packages; requirements for transport; control of material in transport; fissile material: regulatory requirements and operational aspects; quality assurance; national competent authority; additional regulatory constraints for transport; international liability and insurance; emergency planning and preparedness; training; services provided by the IAEA.

  9. Training to Increase Safe Tray Carrying Among Cocktail Servers

    OpenAIRE

    Scherrer, Megan D; Wilder, David A

    2008-01-01

    We evaluated the effects of training on proper carrying techniques among 3 cocktail servers to increase safe tray carrying on the job and reduce participants' risk of developing musculoskeletal disorders. As participants delivered drinks to their tables, their finger, arm, and neck positions were observed and recorded. Each participant received individual safety training that focused on proper carrying positions and techniques after baseline data were collected. A multiple baseline design acr...

  10. Surveillance and Maintenance Plan for the 105-C Reactor Safe Storage Enclosure

    International Nuclear Information System (INIS)

    Logan, T. E.

    1998-01-01

    This document provides a plan for implementing surveillance and maintenance activities to ensure that the 105-C Reactor Safe Storage Enclosure is maintained in a safe, environmentally secure, and cost-effective manner until subsequent closure during the final disposition phase of decommissioning

  11. 75 FR 81556 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2010-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... the public on recommendations for developing new or revised safe harbors and Special Fraud Alerts...

  12. 77 FR 76434 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2012-12-28

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-121-N...

  13. 78 FR 78807 - Solicitation of New Safe Harbors and Special Fraud Alerts

    Science.gov (United States)

    2013-12-27

    ... statute (section 1128B(b) of the Social Security Act), as well as developing new OIG Special Fraud Alerts... of New Safe Harbors and Special Fraud Alerts AGENCY: Office of Inspector General (OIG), HHS. ACTION... revised safe harbors and Special Fraud Alerts. Please assist us by referencing the file code OIG-122-N...

  14. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  15. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  16. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  17. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  18. Indoor Tanning Is Not Safe

    Science.gov (United States)

    ... the sun is by using these tips for skin cancer prevention. Indoor tanning is not a safe way to get vitamin ... to previous findings on the association between indoor tanning and skin cancer. Only a small number of people reported ...

  19. Alcohol use and safe drinking

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/article/001944.htm Alcohol use and safe drinking To use the sharing features on this page, please enable JavaScript. Alcohol use involves drinking beer, wine, or hard liquor. ...

  20. Dukovany NPP - Safely 16 TERA

    International Nuclear Information System (INIS)

    Vlcek, J.

    2008-01-01

    In this presentation increasing of power output of the Dukovany NPP is reviewed. To operate all Dukovany Units safely with the perspective of long-term operation (LTO) of 50 - 60 years it is proposed.

  1. Safe drinking during cancer treatment

    Science.gov (United States)

    ... ency/patientinstructions/000060.htm Drinking water safely during cancer treatment To use the sharing features on this page, please enable JavaScript. During and right after your cancer treatment, your body may not be able to protect ...

  2. Safe handling of radiation sources

    International Nuclear Information System (INIS)

    Abd Nasir Ibrahim; Azali Muhammad; Ab Razak Hamzah; Abd Aziz Mohamed; Mohammad Pauzi Ismail

    2004-01-01

    This chapter discussed the subjects related to the safe handling of radiation sources: type of radiation sources, method of use: transport within premises, transport outside premises; Disposal of Gamma Sources

  3. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  4. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  5. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  6. Towards Safe Robotic Surgical Systems

    DEFF Research Database (Denmark)

    Sloth, Christoffer; Wisniewski, Rafael

    2015-01-01

    a controller for motion compensation in beating-heart surgery, and prove that it is safe, i.e., the surgical tool is kept within an allowable distance and orientation of the heart. We solve the problem by simultaneously finding a control law and a barrier function. The motion compensation system is simulated...... from several initial conditions to demonstrate that the designed control system is safe for every admissible initial condition....

  7. Safe use of ionizing radiations

    Energy Technology Data Exchange (ETDEWEB)

    1973-01-01

    Based on the ''Code of Practice for the protection of persons against ionizing radiations arising from medical and dental use'' (CIS 74-423), this handbook shows how hospital staff can avoid exposing themselves and others to these hazards. It is designed particularly for junior and student nurses. Contents: ionizing radiations, their types and characteristics; their uses and dangers; basic principles in their safe use; safe use in practice; explanation of terms.

  8. Staying Safe in the Water

    Centers for Disease Control (CDC) Podcasts

    2008-05-15

    In this podcast, Dr. Julie Gilchrist, a pediatrician and medical epidemiologist from CDC’s Injury Center, talks about staying safe in the water. Tips are for all audiences, with a focus on preventing drownings and keeping children safe in and around the pool, lake, or ocean.  Created: 5/15/2008 by National Center for Injury Prevention and Control (NCIPC).   Date Released: 5/19/2008.

  9. Safe and effective use of medicines for ethnic minorities

    DEFF Research Database (Denmark)

    Dam, Pernille; El-Souri, Mira Mahmoud; Herborg, Hanne

    2015-01-01

    , there was a need to adapt a previously developed and validated medicine-based intervention “safe and effective use of medicines” to this vulnerable group of unemployed ethnic minority patients. Methods: The objective of this before-after study was to improve medicines adherence, health status and work ability...... of the target group through an individualized pharmacist delivered intervention with focus on safe and effective implementation of medical treatments. The target group was ethnic minorities of non-western origin affiliated with a job center. Results: At baseline, 35.7 % of the patients had a potential adherence...... to the intervention. Conclusion: The counseling program “Safe and effective use of medicines” was successfully adapted to unemployed ethnic minority patients, and tested in a new collaboration between job centers and community pharmacies. The counseling program resulted in statistically significant improvements...

  10. Delivering high performance BWR fuel reliably

    International Nuclear Information System (INIS)

    Schardt, J.F.

    1998-01-01

    Utilities are under intense pressure to reduce their production costs in order to compete in the increasingly deregulated marketplace. They need fuel, which can deliver high performance to meet demanding operating strategies. GE's latest BWR fuel design, GE14, provides that high performance capability. GE's product introduction process assures that this performance will be delivered reliably, with little risk to the utility. (author)

  11. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  12. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  13. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  14. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  15. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  16. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  17. Cyber security best practices for the nuclear industry

    International Nuclear Information System (INIS)

    Badr, I.

    2012-01-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  18. Cyber security best practices for the nuclear industry

    Energy Technology Data Exchange (ETDEWEB)

    Badr, I. [Rational IBM Software Group, IBM Corporation, Evanston, IL 60201 (United States)

    2012-07-01

    When deploying software based systems, such as, digital instrumentation and controls for the nuclear industry, it is vital to include cyber security assessment as part of architecture and development process. When integrating and delivering software-intensive systems for the nuclear industry, engineering teams should make use of a secure, requirements driven, software development life cycle, ensuring security compliance and optimum return on investment. Reliability protections, data loss prevention, and privacy enforcement provide a strong case for installing strict cyber security policies. (authors)

  19. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  20. Natural gas market review 2007. Security in a globalising market to 2015

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-05-03

    Natural gas heats our homes, powers our factories, and increasingly generates electricity, safely and cleanly. Over recent decades, it has been an important element of secure, affordable, and environmentally responsible energy supply. But as production from IEA member countries declines, supplies will have to come from sources in more distant regions. What aspects of OECD gas markets need to be improved to deliver greater security and efficiency? What are the risks of increasing reliance on imports from Russia and the Middle East? Are strategic stocks of natural gas - similar to emergency oil stocks - a viable safety net to a supply disruption? Will there be enough investment in pipeline gas or will more need to be spent on LNG? What are the impacts of gas security on oil markets and power generation security? What do changes in the LNG industry mean for traditional contract terms? This publication, the second issue in a new IEA publications series, addresses key questions in this dynamic market. It offers a global appraisal of current trends in the light of the most recent historical data, including supply and demand projections to 2015.

  1. AP1000 Design for Security

    International Nuclear Information System (INIS)

    Long, L.B.; Cummins, W.E.; Winters, J.W.

    2006-01-01

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000

  2. LACK OF AWARENESS ABOUT SAFE BLOOD IN PAKISTANI POPULATION

    Directory of Open Access Journals (Sweden)

    Muhammad Usman

    2014-12-01

    Full Text Available Blood transfusion is a life saving procedure in various transfusion-dependent life threatening conditions and donation of safe blood is a prerequisite for achieving this goal. This study was designed to evaluate the awareness regarding “safe blood” in Pakistani population. This study was conducted at a large scale through a population survey. The test population was divided into two groups i.e. general population and students. The Performa was designed for a general and student population and included 20 questions related to awareness of safe blood. A total of 4900 individuals belonging to different ethnic groups were included in this population survey. Results of social survey were analyzed by using Usman and Moin awareness chart. Results of this study revealed profound unawareness about safe blood in Pakistani population. This study found lack of awareness about safe blood as a major factor that is playing a vital role in the propagation of blood borne diseases in Pakistan. To secure the recipients from blood borne complications through blood donation, it is necessary to create effective awareness about safe blood in Pakistani population.

  3. Keep Young Riders Safe (A Cup of Health with CDC)

    Centers for Disease Control (CDC) Podcasts

    2014-02-06

    Motor vehicle-related injuries are a leading cause of death among children in the United States. Adults can prevent many of these tragedies by properly securing children in vehicles. In this podcast, Dr. Erin Sauber-Schatz discusses ways to keep kids safe in vehicles.  Created: 2/6/2014 by MMWR.   Date Released: 2/6/2014.

  4. Compatibility of safety and security

    International Nuclear Information System (INIS)

    Jalouneix, J.

    2013-01-01

    Nuclear safety means the achievement of proper operating conditions, prevention of accidents or mitigation of accident consequences, resulting in protection of workers, the public and the environment from undue radiation hazards while nuclear security means the prevention and detection of, and response to, theft, sabotage, unauthorized access, illegal transfer or other malicious acts involving nuclear material. Nuclear safety and nuclear security present large similarities in their aim as in their methods and are mutually complementary in the field of protection with regard to the risk of sabotage. However they show specific attributes in certain areas which leads to differences in their implementation. For instance security culture must integrate deterrence and confidentiality while safety culture implies transparency and open dialogue. Two important design principles apply identically for safety and security: the graded approach and the defense in depth. There are also strong similarities in operating provisions: -) a same need to check the availability of the equipment, -) a same need to treat the experience feedback, or -) a same need to update the basic rules. There are also strong similarities in emergency management, for instance the elaboration of emergency plans and the performance of periodic exercises. Activities related to safety of security of an installation must be managed by a quality management system. For all types of nuclear activities and facilities, a well shared safety culture and security culture is the guarantee of a safe and secure operation. The slides of the presentation have been added at the end of the paper

  5. Delivering a radiation protection dividend: systemic capacity-building for the radiation safety profession in Africa

    Directory of Open Access Journals (Sweden)

    Julian Hilton

    2014-12-01

    Full Text Available Many African countries planning to enter the nuclear energy “family” have little or no experience of meeting associated radiation safety demands, whether operational or regulatory. Uses of radiation in medicine in the continent, whether for diagnostic or clinical purposes, are rapidly growing while the costs of equipment, and hence of access to services, are falling fast. In consequence, many patients and healthcare workers are facing a wide array of unfamiliar challenges, both operational and ethical, without any formal regulatory or professional framework for managing them safely. This, combined with heighted awareness of safety issues post Fukushima, means the already intense pressure on radiation safety professionals in such domains as NORM industries and security threatens to reach breaking point. A systematic competency-based capacity-building programme for RP professionals in Africa is required (Resolution of the Third AFRIRPA13 Regional Conference, Nairobi, September 2010. The goal is to meet recruitment and HR needs in the rapidly emerging radiation safety sector, while also addressing stakeholder concerns in respect of promoting and meeting professional and ethical standards. The desired outcome is an RP “dividend” to society as a whole. A curriculum model is presented, aligned to safety procedures and best practices such as Safety Integrity Level and Layer of Protection analysis; it emphasizes proactive risk communication both with direct and indirect stakeholders; and it outlines disciplinary options and procedures for managers and responsible persons for dealing with unsafe or dangerous behavior at work. This paper reports on progress to date. It presents a five-tier development pathway starting from a generic foundation course, suitable for all RP professionals, accompanied by specialist courses by domain, activity or industry. Delivery options are discussed. Part of the content has already been developed and delivered as

  6. Inherently safe light water reactors

    International Nuclear Information System (INIS)

    Ise, Takeharu

    1987-01-01

    Today's large nuclear power reactors of world-wise use have been designed based on the philosophy. It seems that recent less electricity demand rates, higher capital cost and the TMI accident let us acknowledge relative small and simplified nuclear plants with safer features, and that Chernobyl accident in 1983 underlines the needs of intrinsic and passive safety characteristics. In such background, several inherently safe reactor concepts have been presented abroad and domestically. First describing 'Can inherently safe reactors be designed,' then I introduce representative reactor concepts of inherently safe LWRs advocated abroad so far. All of these innovative reactors employ intrinsic and passive features in their design, as follows: (1) PIUS, an acronym for Process Inherent Ultimate Safety, or an integral PWR with passive heat sink and passive shutdown mechanism, advocated by ASEA-ATOM of Sweden. (2) MAP(Minimum Attention Plant), or a self-pressurized, natural circulation integral PWR, promoted by CE Inc. of the U.S. (3) TPS(TRIGA Power System), or a compact PWR with passive heat sink and inherent fuel characteristics of large prompt temperature coefficient, prompted by GA Technologies Inc. of the U.S. (4) PIUS-BWR, or an inherently safe BWR employing passively actuated fluid valves, in competition with PIUS, prompted by ORNL of the U.S. Then, I will describe the domestic trends in Japan and the innovative inherently safe LWRs presented domestically so far. (author)

  7. Mobile security how to secure, privatize and recover your devices

    CERN Document Server

    Speed, Timothy; Anderson, Joseph; Nampalli, Jaya

    2013-01-01

    Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private.Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

  8. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  9. Prospects for inherently safe reactors

    International Nuclear Information System (INIS)

    Barkenbus, J.N.

    1988-01-01

    Public fears over nuclear safety have led some within the nuclear community to investigate the possibility of producing inherently safe nuclear reactors; that is, reactors that are transparently incapable of producing a core melt. While several promising designs of such reactors have been produced, support for large-scale research and development efforts has not been forthcoming. The prospects for commercialization of inherently safe reactors, therefore, are problematic; possible events such as further nuclear reactor accidents and superpower summits, could alter the present situation significantly. (author)

  10. Is nuclear power safe enough

    Energy Technology Data Exchange (ETDEWEB)

    Andresen, A F [Institutt for Atomenergi, Kjeller (Norway)

    1979-01-01

    The lecture formed a commentary on the report of the Norwegian Government's Commission on Nuclear power Safety which was published in October 1978. It was introductorily pointed out that 'safe' and 'safety' are not in themselves meaningful terms and that the probability of an occurrence is the real measure. The main items in the Commission's report have been core meltdown, releases during reprocessing, waste disposal, plutonium diversion and environmental impacts. The 21 members of the Commission were unanimous in 7 of the 8 chapters. In chapter 2, 'Summary and Conclusions', 3 members dissented from the majority opinion, that, subject to certain conditions, nuclear power was a safe and acceptable source of energy.

  11. Safe and Liquid Mortgage Bonds

    DEFF Research Database (Denmark)

    Dick-Nielsen, Jens; Gyntelberg, Jacob; Lund, Jesper

    This paper shows that strict match pass-through funding of covered bonds provides safe and liquid mortgage bonds. Despite a 30% drop in house prices during the 2008 global crisis Danish mortgage bonds remained as liquid as most European government bonds. The Danish pass-through system effectively...... eliminates credit risk from the investor's perspective. Similar to other safe bonds, funding liquidity becomes the main driver of mortgage bond liquidity and this creates commonality in liquidity across markets and countries. These findings have implications for how to design a robust mortgage bond system...

  12. Particle tracker system delivered to CERN

    CERN Multimedia

    Pitcher, Graham

    2006-01-01

    "The CCLRC Rutherford Appleton Laboratory (RAL) has delivered a system to CERN that will help to process the vast amounts of data generated by the silicon tracking detector within the Compact Muon Solenoid experiment." (1/2 page)

  13. Delivering construction projects using innovative building technologies

    CSIR Research Space (South Africa)

    Ampofo-Anti, Naalamkai

    2017-07-01

    Full Text Available . Figure 1: IBT delivery flowchart Proceedings 11th Built Environment Conference 6 th August – 8 th August 2017 Delivering construction projects using innovative building technologies Durban, South Africa 5. REFERENCES Ampofo-Anti, N...

  14. Delivering high performance BWR fuel reliably

    Energy Technology Data Exchange (ETDEWEB)

    Schardt, J.F. [GE Nuclear Energy, Wilmington, NC (United States)

    1998-07-01

    Utilities are under intense pressure to reduce their production costs in order to compete in the increasingly deregulated marketplace. They need fuel, which can deliver high performance to meet demanding operating strategies. GE's latest BWR fuel design, GE14, provides that high performance capability. GE's product introduction process assures that this performance will be delivered reliably, with little risk to the utility. (author)

  15. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  16. Android: Analysis of its architecture and security mechanism

    Institute of Scientific and Technical Information of China (English)

    2012-01-01

    As Android operation system platform is widely used in smart phone, one important aspect should not be ignored -its security. As android is an open mobile platform, and also a programmable software framework, is it more safe than his competitor - Iphone, Symbian and so on? This paper will present some security issues on the mobile phones, analyze the security principles and mechanisms based on the architecture and features of Android OS platform, then it will compare Android with some other mobile operation systems like Iphone, Symbian in area of security to make a conclusion that Android is a safe mobile OS to a certain extent.

  17. Safe-haven CDS Premia

    DEFF Research Database (Denmark)

    Klingler, Sven; Lando, David

    We argue that Credit Default Swap (CDS) premia for safe-haven sovereigns, like Germany and the United States, are driven to a large extent by regulatory requirements under which derivatives dealing banks have an incentive to buy CDS to hedge counterparty credit risk of their counterparties. We...

  18. Thermodynamics of asymptotically safe theories

    DEFF Research Database (Denmark)

    Rischke, Dirk H.; Sannino, Francesco

    2015-01-01

    We investigate the thermodynamic properties of a novel class of gauge-Yukawa theories that have recently been shown to be completely asymptotically safe, because their short-distance behaviour is determined by the presence of an interacting fixed point. Not only do all the coupling constants freeze...

  19. Safe disposal of radioactive wastes

    International Nuclear Information System (INIS)

    Hooker, P.; Metcalfe, R.; Milodowski, T.; Holliday, D.

    1997-01-01

    A high degree of international cooperation has characterized the two studies reported here which aim to address whether radioactive waste can be disposed of safely. Using hydrogeochemical and mineralogical surveying techniques earth scientists from the British Geological Survey have sought to identify and characterise suitable disposal sites. Aspects of the studies are explored emphasising their cooperative nature. (UK)

  20. Staying Safe on the Water

    Centers for Disease Control (CDC) Podcasts

    2008-06-05

    In this podcast for all audiences, Dr. Julie Gilchrist from CDC's Injury Center outlines tips for safe boating.  Created: 6/5/2008 by National Center for Injury Prevention and Control (NCIPC).   Date Released: 6/8/2008.

  1. Working safely with ionising radiation

    International Nuclear Information System (INIS)

    McDowell, D.J.

    1990-01-01

    A small leaflet provides information on working safely with ionizing radiation. Topics covered include the types of radiation, radiological units, external radiation, contamination and internal radiation, methods of protection form radiation, radiation monitors, protective clothing for contamination, personal dosemeters, radiation dose limits for classified workers and finally the Ionising Radiations Regulations 1985. (UK)

  2. webinos project deliverable: Phase 1 Security Framework

    OpenAIRE

    webinos consortium

    2011-01-01

    The webinos project aims to deliver a cross-device web application runtime environment, providing a unified development platform and standardized inter-device communication and interaction. This document contains the first iteration of the technical security and privacy framework designed for the webinos project. It accompanies two other documents - D3.1 System Specification and D3.2 API Specifications - and refers to concepts developed in them. The security and privacy architecture aims to p...

  3. Security Shift in Future Network Architectures

    OpenAIRE

    Hartog, T.; Schotanus, H.A.; Verkoelen, C.A.A.

    2010-01-01

    In current practice military communication infrastructures are deployed as stand-alone networked information systems. Network-Enabled Capabilities (NEC) and combined military operations lead to new requirements which current communication architectures cannot deliver. This paper informs IT architects, information architects and security specialists about the separation of network and information security, the consequences of this shift and our view on future communication infrastructures in d...

  4. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  5. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  6. (Congressional Interest) Network Information and Space Security Center

    Science.gov (United States)

    2011-09-30

    Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb , Croatia officials to structure terms for a...partnership with UCCS. In the short-term, UCCS will develop and deliver several courses in homeland security and assist the University of Zagreb in... Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees in homeland security. Hosted a group of

  7. SECURE nuclear district heating plant

    International Nuclear Information System (INIS)

    Nilsson; Hannus, M.

    1978-01-01

    The role foreseen for the SECURE (Safe Environmentally Clean Urban REactor) nuclear district heating plant is to provide the baseload heating needs of primarily the larger and medium size urban centers that are outside the range of waste heat supply from conventional nuclear power stations. The rationale of the SECURE concept is that the simplicity in design and the inherent safety advantages due to the use of low temperatures and pressures should make such reactors economically feasible in much smaller unit sizes than nuclear power reactors and should make their urban location possible. It is felt that the present design should be safe enough to make urban underground location possible without restriction according to any criteria based on actual risk evaluation. From the environmental point of view, this is a municipal heat supply plant with negligible pollution. Waste heat is negligible, gaseous radioactivity release is negligible, and there is no liquid radwaste release. Economic comparisons show that the SECURE plant is competitive with current fossil-fueled alternatives. Expected future increase in energy raw material prices will lead to additional energy cost advantages to the SECURE plant

  8. Agricultural Production, Food and Nutrition Security in Rural Benin ...

    African Journals Online (AJOL)

    Agricultural Production, Food and Nutrition Security in Rural Benin, Nigeria. ... that rural-urban migration results in shortage of manpower for agricultural activities. ... to support education, health care, sanitation and safe drinking water supply.

  9. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  10. Ensuring a Safe Technological Revolution

    Science.gov (United States)

    2016-12-01

    much lower, and the performance gained can dramatically reduce life -cycle costs. Validated cost data are scarce, and accurate AM cost models need to be...reduce costs, minimize obsolescence issues and improve both capability and readi- ness across the entire life cycle of naval systems—including both the...of naval weapon systems. The Navy is actively engaging its various communi- ties to align needs and ensure that AM can be safely acceler- ated and

  11. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  12. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  13. Transfer pricing and safe harbours

    Directory of Open Access Journals (Sweden)

    Veronika Solilová

    2013-01-01

    Full Text Available Transfer prices are significant for both taxpayers and tax administrations because they determine in large part taxable profits of associated enterprises in different tax jurisdictions. Moreover, in the context of taxation, transfer prices must be complied with the arm’s length principle. However, Multinational Enterprises have been faced daily by conflicting rules and approaches to applying the arm’s length principle, burdensome documentation requirements, inconsistent audit standards and unpredictable competent authority outcomes. Therefore, the Committee on Fiscal Affairs launched another project on the administrative aspects of transfer pricing in 2010. On 16 May 2013 as a partial solution of this project was approved by the OECD Council the Revised Section E on Safe Harbours in Chapter IV of the Transfer Pricing Guidelines for Multinational Enterprises and Tax Authorities. The paper is focused on significant changes of newly approved chapter IV of the Transfer Pricing Guidelines for Multinational Enterprises and Tax Authorities, further on analysis of practice in this area, on advantages and disadvantages of safe harbours for taxpayers and competent authorities with aim to suggest recommendations on use of safe harbours in the Czech Republic.

  14. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  15. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  16. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  17. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  18. An Examination of Issues Surrounding Information Security in California Colleges

    Science.gov (United States)

    Butler, Robert D.

    2013-01-01

    Technological advances have provided increasing opportunities in higher education for delivering instruction and other services. However, exposure to information security attacks has been increasing as more organizations conduct their businesses online. Higher education institutions have one of the highest frequencies of security breaches as…

  19. Delivering service adaptation with 3G technology

    NARCIS (Netherlands)

    Liotta, A.; Yew, A.; Bohoris, C.; Pavlou, G.; Feridun, M.; Kropf, P.G.; Babin, G.

    2002-01-01

    Now that 3G technologies have reached their maturity, newly advanced services can be delivered to the mobile user. These include context- aware services, adaptable services and Virtual Home Environment (VHE)-like services. Important research issues relate, however, to managing such services through

  20. Utah Delivers Opportunities for Career Exploration

    Science.gov (United States)

    Dobson, Kristine; Fischio, Shannon

    2006-01-01

    Providing information and resources to support career exploration is key to the mission of career and technical education (CTE) in Utah. Utah CTE has responded in a variety of ways to meet the career exploration needs of students of all ages. This article discusses how the career and technical education in Utah delivers opportunities for career…

  1. Is International Accounting Education Delivering Pedagogical Value?

    Science.gov (United States)

    Patel, Chris; Millanta, Brian; Tweedie, Dale

    2016-01-01

    This paper examines whether universities are delivering pedagogical value to international accounting students commensurate with the costs of studying abroad. The paper uses survey and interview methods to explore the extent to which Chinese Learners (CLs) in an Australian postgraduate accounting subject have distinct learning needs. The paper…

  2. Delivering Online Examinations: A Case Study

    Directory of Open Access Journals (Sweden)

    John MESSING

    2004-07-01

    Full Text Available Delivering Online Examinations: A Case Study Jason HOWARTH John MESSING Irfan ALTAS Charles Sturt University Wagga Wagga-AUSTRALIA ABSTRACT This paper represents a brief case study of delivering online examinations to a worldwide audience. These examinations are delivered in partnership with a commercial online testing company as part of the Industry Master’s degree at Charles Sturt University (CSU. The Industry Master’s degree is an academic program for students currently employed in the IT industry. Using Internet Based Testing (IBT, these students are examined in test centres throughout the world. This offers many benefits. For example, students have the freedom of sitting exams at any time during a designated interval. Computer-based testing also provides instructors with valuable feedback through test statistics and student comments. In this paper, we document CSU’s use of the IBT system, including how tests are built and delivered, and how both human and statistical feedback is used to evaluate and enhance the testing process.

  3. How natural capital delivers ecosystem services

    NARCIS (Netherlands)

    Smith, A.C.; Harrison, P.A.; Pérez Soba, M.; Archaux, F.; Blicharska, M.; Egoh, B.N.; Erős, T.; Fabrega Domenech, N.; György, I.; Haines-Young, R.; Li, S.; Lommelen, E.; Meiresonne, L.; Miguel Ayala, L.; Mononen, L.; Simpson, G.; Stange, E.; Turkelboom, F.; Uiterwijk, M.; Veerkamp, C.J.; Wyllie de Echeverria, V.

    2017-01-01

    There is no unified evidence base to help decision-makers understand how the multiple components of natural capital interact to deliver ecosystem services. We systematically reviewed 780 papers, recording how natural capital attributes (29 biotic attributes and 11 abiotic factors) affect the

  4. A Minimally Invasive, Translational Method to Deliver Hydrogels to the Heart Through the Pericardial Space

    Directory of Open Access Journals (Sweden)

    Jose R. Garcia, MS

    2017-10-01

    Full Text Available Biomaterials are a new treatment strategy for cardiovascular diseases but are difficult to deliver to the heart in a safe, precise, and translatable way. We developed a method to deliver hydrogels to the epicardium through the pericardial space. Our device creates a temporary compartment for hydrogel delivery and gelation using anatomic structures. The method minimizes risk to patients from embolization, thrombotic occlusion, and arrhythmia. In pigs there were no clinically relevant acute or subacute adverse effects from pericardial hydrogel delivery, making this a translatable strategy to deliver biomaterials to the heart.

  5. How safe are nuclear plants? How safe should they be?

    International Nuclear Information System (INIS)

    Kouts, H.

    1988-01-01

    It has become customary to think about safety of nuclear plants in terms of risk as defined by the WASH-1400 study that some of the implications for the non-specialist escape our attention. Yet it is known that a rational program to understand safety, to identify unsafe events, and to use this kind of information or analysis to improve safety, requires us to use the methods of quantitative risk assessment. How this process can be made more understandable to a broader group of nontechnical people and how can a wider acceptance of the results of the process be developed have been questions under study and are addressed in this report. These are questions that have been struggled with for some time in the world of nuclear plant safety. The Nuclear Regulatory Commission examined them for several years as it moved toward developing a position on safety goals for nuclear plants, a requirement that had been assigned it by Congress. Opinion was sought from a broad spectrum of individuals, within the field of nuclear power and outside it, on the topic that was popularly called, ''How safe is safe enough?'' Views were solicited on the answer to the question and also on the way the answer should be framed when it was adopted. This report discusses the public policy and its implementation

  6. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  7. The struggle for safe nuclear expansion in China

    International Nuclear Information System (INIS)

    Xu, Y.C.

    2014-01-01

    After a temporary halt following the Fukushima nuclear disaster in March 2011, China resumed its fast, yet cautious, expansion of nuclear energy programme. Nuclear energy is considered as part of the general strategy to deal with the challenges of energy security and climate change and to advance with ‘state of the art’ technology in its development. This article briefly discusses recent development in and driving forces behind nuclear industry in China, and several challenges it has been facing: how to adopt, adapt, standardise and indigenise whose technologies, and how to address the shortage of qualified nuclear engineers, scientists, skilled labour force and qualified regulators. More importantly, it argues that safe and secure nuclear development requires consistent policies and effective regulations. Therefore, it is crucial to build policy and regulatory capacities based on coordination, planning and management of government agencies and the industry. - Highlights: • Nuclear energy development in China. • Nuclear technology selection. • Human capital. • Regulatory regime. • Safe and secure development

  8. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  9. Delivering care to oncology patients in the community: an innovative integrated approach.

    LENUS (Irish Health Repository)

    Hanan, Terry

    2014-08-01

    A community oncology nursing programme was developed in Ireland between the hospital and community health services for patients receiving systemic cancer therapy, in response to a service need. A robust evaluation of the pilot programme was undertaken, which found that defined clinical procedures traditionally undertaken in hospitals were safely undertaken in the patient\\'s home with no adverse effects. There was a dramatic decrease in hospital attendances for these defined clinical procedures, and hospital capacity was consequently freed up. Patients valued having aspects of their care delivered at home and reported that it improved their quality of life, including reduced hospital visits and travel time. Community nurses expanded their scope of practice and became partners with oncology day-ward nurses in caring for these patients. Community nurses developed the competence and confidence to safely deliver cancer care in the community. This initiative shows that defined elements of acute cancer care can be safely delivered in the community so long as the training and support are provided. The findings and recommendations of the evaluation resulted in university accreditation and approval for national roll-out of the programme. Integration of services between primary and secondary care is a key priority. This innovative programme is a good example of shared integrated care that benefits both patients and health-care providers.

  10. Small intrinsically safe reactor implications

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1985-01-01

    Reviewing the history of nuclear power, it is found that peaceful uses of nuclear power are children of the war-like atom. Importance of special growth in a shielded environment is emphasized to exploit fully the advantages of nuclear power. Nuclear power reactors must be safe for their assimilation into society from the points of view of both technology and social psychology. ISR/ISER is identified as a missing link in the development of nuclear power reactors from this perspective and advocated for international development and utilization, being unleashed from the concerns of politicization, safety, and proliferation

  11. Mifrenz: Safe email for children

    Directory of Open Access Journals (Sweden)

    Tim Hunt

    Full Text Available Products currently available for monitoring children\\'s email usage are either considered to encourage dubious ethical behaviour or are time consuming for parents to administer. This paper describes the development of a new email client application for children called Mifrenz. This new application gives parents the ability to let their children safely use email, with the minimum of intervention. It was developed using mostly free software and also with the desire to provide real first hand programming examples to demonstrate to students.

  12. Type-safe pattern combinators

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2009-01-01

    Macros still haven't made their way into typed higher-order programming languages such as Haskell and Standard ML. Therefore, to extend the expressiveness of Haskell or Standard ML, one must express new linguistic features in terms of functions that fit within the static type systems of these lan...... of these languages. This is particularly challenging when introducing features that span across multiple types and that bind variables. We address this challenge by developing, in a step by step manner, mechanisms for encoding patterns and pattern matching in Haskell in a type-safe way....

  13. Sodium heat pipe module test for the SAFE-30 reactor prototype

    International Nuclear Information System (INIS)

    Reid, Robert S.; Sena, J. Tom; Martinez, Adam L.

    2001-01-01

    Reliable, long-life, low-cost heat pipes can enable safe, affordable space fission power and propulsion systems. Advanced versions of these systems can in turn allow rapid access to any point in the solar system. Twelve stainless steel-sodium heat pipe modules were built and tested at Los Alamos for use in a non-nuclear thermohydraulic simulation of the SAFE-30 reactor (Poston et al., 2000). SAFE-30 is a near-term, low-cost space fission system demonstration. The heat pipes were designed to remove thermal power from the SAFE-30 core, and transfer this power to an electrical power conversion system. These heat pipe modules were delivered to NASA Marshall Space Flight Center in August 2000 and were assembled and tested in a prototypical configuration during September and October 2000. The construction and test of one of the SAFE-30 modules is described

  14. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  15. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  16. The Replacement of Safe Assets: Evidence from the U.S. Bond Portfolio

    OpenAIRE

    Bertaut, Carol C.; Tabova, Alexandra M.; Wong, Vivian

    2014-01-01

    The expansion in financial sector "safe" assets, largely in the form of structured products from the U.S. and the Caribbean, in the lead-up to the global financial crisis has by now been fairly well documented. Using a unique dataset derived from security-level data on U.S. portfolio holdings of foreign securities, we show that since the crisis, it is mostly the foreign financial sector that appears to have met U.S. demand for safe and liquid investment assets by expanding its supply of debt ...

  17. Development of Cyber Security Scheme for Nuclear Power Plant

    Energy Technology Data Exchange (ETDEWEB)

    Hong, S. B.; Choi, Y. S.; Cho, J. W. (and others)

    2009-12-15

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures.

  18. Development of Cyber Security Scheme for Nuclear Power Plant

    International Nuclear Information System (INIS)

    Hong, S. B.; Choi, Y. S.; Cho, J. W.

    2009-12-01

    Nuclear I and C system is considered to be safe on the cyber threat because of the use of exclusive communication network and operating system. But the trend of open architecture and standardization on the equipment of I and C system, it is not safe on the cyber threat such as hacking and cyber terror. It is needed to protect nuclear I and C systems by the cyber attack, Countermeasures of the cyber security is required a lot of time and endeavors because there are many factors on the environment of cyber security and cyber attack. For the nuclear cyber security, we should make structural framework and eliminate cyber vulnerabilities by the analysis of cyber environment. The framework for the cyber security includes planning, embodiment of security technologies, security audit, security management and security maintenance. In this report, we examined IT security technology and the trend of standard in the industrial I and C system, and proposed a method to construct cyber security for the nuclear power plant. We analysed the threat of cyber security, vulnerability and cyber risk, then we present a method for the cyber security structure and the countermeasures

  19. 77 FR 1076 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-01-09

    ... associated with updates to MTSA; (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) NMSAC continues to be consulted in regards to the Global Supply Chain Security Initiative... Management Facility (M-30), U.S. Department of Transportation, West Building Ground Floor, Room W12-140, 1200...

  20. 77 FR 25721 - National Maritime Security Advisory Committee; Meeting

    Science.gov (United States)

    2012-05-01

    ... meeting will be closed to the public. (2) Global Supply Chain Security Initiative. Per the SAFE Port Act (Pub. L. 109-347) the Coast Guard consults with the NMSAC on the Global Supply Chain Security... submitting comments. Mail: Docket Management Facility (M-30), U.S. Department of Transportation, West...

  1. The Handbook for Campus Safety and Security Reporting. 2016 Edition

    Science.gov (United States)

    US Department of Education, 2016

    2016-01-01

    Campus security and safety is an important feature of postsecondary education. The Department of Education is committed to assisting schools in providing students nationwide a safe environment in which to learn and to keep students, parents and employees well informed about campus security. These goals were advanced by the Crime Awareness and…

  2. Impact of Implementing VPN to Secure Wireless LAN

    OpenAIRE

    H. Bourdoucen; A. Al Naamany; A. Al Kalbani

    2009-01-01

    Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards based technologies that can be delivered by Virtual Private Networking (VPN) bein...

  3. A study of the security technology and a new security model for WiFi network

    Science.gov (United States)

    Huang, Jing

    2013-07-01

    The WiFi network is one of the most rapidly developing wireless communication networks, which makes wireless office and wireless life possible and greatly expands the application form and scope of the internet. At the same time, the WiFi network security has received wide attention, and this is also the key factor of WiFi network development. This paper makes a systematic introduction to the WiFi network and WiFi network security problems, and the WiFi network security technology are reviewed and compared. In order to solve the security problems in WiFi network, this paper presents a new WiFi network security model and the key exchange algorithm. Experiments are performed to test the performance of the model, the results show that the new security model can withstand external network attack and ensure stable and safe operation of WiFi network.

  4. Security Management and Safeguards Office

    Science.gov (United States)

    Bewley, Nathaniel M.

    2004-01-01

    The Security Management and Safeguards Office at NASA is here to keep the people working in a safe environment. They also are here to protect the buildings and documents from sabotage, espionage, and theft. During the summer of 2004, I worked with Richard Soppet in Physical Security. While I was working here I helped out with updating the map that we currently use at NASA Glenn Research Center, attended meetings for homeland security, worked with the security guards and the locksmith. The meetings that I attended for homeland security talked about how to protect ourselves before something happened, they told us to always be on the guard and look for anything suspicious, and the different ways that terrorist groups operate. When I was with the security guards I was taught how to check someone into the base, showed how to use a radar gun, observed a security guard make a traffic stop for training and was with them while they patrolled NASA Glenn Research Center to make sure things were running smooth and no one was in danger. When I was with the lock smith I was taught how to make keys and locks for the employees here at NASA. The lock smith also showed me that he had inventory cabinets of files that show how many keys were out to people and who currently has access to the rooms that they keys were made for. I also helped out the open house at NASA Glenn Research Center. I helped out by showing the Army Reserves, and Brook Park's SWAT team where all the main events were going to take place a week before the open house was going to begin. Then during the open house I helped out by making sure people had there IDS, checked through there bags, and handed out a map to them that showed where the different activities were going to take place. So the main job here at NASA Glenn Research Center for the Security Management and Safeguards Office is to make sure that nothing is stolen, sabotaged, and espionaged. Also most importantly make sure all the employees here at NASA are

  5. Safe transport of radioactive material

    International Nuclear Information System (INIS)

    1990-01-01

    Recently the Agency redefined its policy for education and training in radiation safety. The emphasis is now on long-term strategic planning of general education and training programmes. In line with this general policy the Agency's Standing Advisory Group for the Safe Transport of Radioactive Material (SAGSTRAM) in its 7th meeting (April 1989) agreed that increased training activity should be deployed in the area of transport. SAGSTRAM specifically recommended the development of a standard training programme on this subject area, including audio-visual aids, in order to assist Member States in the implementation of the Agency's Regulations for the Safe Transport of Radioactive Material. This training programme should be substantiated by a biennial training course which is thought to be held either as an Interregional or a Regional Course depending on demand. This training manual, issued as a first publication in the Training Course Series, represents the basic text material for future training courses in transport safety. The topic areas covered by this training manual and most of the texts have been developed from the course material used for the 1987 Bristol Interregional Course on Transport Safety. The training manual is intended to give guidance to the lecturers of a course and will be provided to the participants for retention. Refs, figs and tabs

  6. Safe Driving After Propofol Sedation.

    Science.gov (United States)

    Summerlin-Grady, Lee; Austin, Paul N; Gabaldon, Dion A

    2017-10-01

    Propofol is a short-acting medication with fast cognitive and psychomotor recovery. However, patients are usually instructed not to drive a motor vehicle for 24 hours after receiving propofol. The purpose of this article was to review the evidence examining when it is safe to drive after receiving propofol for sedation for diagnostic and surgical procedures. This is a systematic review of the literature. A search of the literature was conducted using Google Scholar, PubMed, and the Cochrane Library for the time period 1990 to 2015. Two randomized controlled trials and two observational studies met the inclusion criteria. Using a simulator, investigators examined driving ability of subjects who received modest doses (about 100 mg) of propofol for endoscopic procedures and surveyed subjects who drove immediately after discharge. There were methodological concerns with the studies such as small sample sizes, modest doses of propofol, and three of the four studies were done in Japan by the same group of investigators limiting generalizability. This limited research suggests that it may be safe for patients to drive sooner than 24 hours after receiving propofol. However, large multicenter trials using heterogenous samples using a range of propofol doses are needed to support an evidence-based revision to the current discharge guidelines for patients receiving propofol. Copyright © 2016 American Society of PeriAnesthesia Nurses. Published by Elsevier Inc. All rights reserved.

  7. Keeping you safe by making machine tools safe

    CERN Multimedia

    2012-01-01

    CERN’s third safety objective for 2012 concerns the safety of equipment - and machine tools in particular.   There are three prerequisites for ensuring that a machine tool can be used safely: ·      the machine tool must comply with Directive 2009/104/EC, ·      the layout of the workshop must be compliant, and ·      everyone who uses the machine tool must be trained. Provided these conditions are met, the workshop head can grant authorisation to use the machine tool. To fulfil this objective, an inventory of the machine tools must be drawn up and the people responsible for them identified. The HSE Unit's Safety Inspection Service produces compliance reports for the machine tools. In order to meet the third objective set by the Director-General, the section has doubled its capacity to carry out inspections: ...

  8. 17 CFR 230.701 - Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and...

    Science.gov (United States)

    2010-04-01

    ... irrevocable election to defer is made. (iii) Derivative securities. In calculating outstanding securities for..., must be delivered. (6) If the sale involves a stock option or other derivative security, the issuer... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales...

  9. Maritime supply chain security: navigating through a sea of compliance requirements

    CSIR Research Space (South Africa)

    Maspero, EL

    2008-11-01

    Full Text Available MTSA Maritime Transportation Security Act RFID Radio Frequency Identification SAFE Security and Accountability For Every port SOLAS Safety Of Life At Sea SST Smart and Secure Tradelane UNCTAD United Nations Conference on Trade and Development... for increased security within maritime shipping and so the SOLAS (the Safety of Lives at Sea) Convention Chapter 11 was amended to provide for the inclusion of the International Ships and Port Facilities Security Code (ISPS Code), which was internationally...

  10. International codes concerning the security of radioisotopes

    International Nuclear Information System (INIS)

    Kusama, Keiji

    2013-01-01

    Explained is the title subject with international and Japanese official argument or publications and actions, where the security is defined as protection of sealed and unsealed radioisotopes (RI) from malicious acts. IAEA worked out the Code of Conduct on the Safety and Security of Radioactive Sources in 2004 based on its preceding argument and with the turning point of the terrorism 3.11 (2001), and Nuclear Security Recommendations on radioactive material and associated facilities (2011), for whose prerequisite, Security of radioactive sources: implementing guide (2009) and Security in the transport of radioactive material (2008) had been drawn up. The Code of Conduct indicates the security system to regulate the sealed sources that each nation has to build up through legislation, setup of regulatory agency, registration of the sources, provision of concerned facilities with radiation protection, etc. For attaining this purpose, IAEA defined Guidance on the Import and Export of Radioactive Sources (2005, 2012), Categorization of radioactive sources (2005) and Dangerous quantities of radioactive material (D-VALUES) (2006). For updating the related matters, IAEA holds international conferences somewhere in the world every year. The Nuclear Security Recommendations indicate the nation's responsibility of building up and maintaining the security system above with well-balanced measures between the safe and secure use of RI without the invalid inhibition of their usage. Japan government worked out the concept essential for ensuring the nuclear security in Sep. 2011, in which for RI, defined were the risk and benefit in use and security, and securing role of the present legal systems concerning the safety handling and objective RI involved in their registration system. Securing measures of RI in such usage as medical and industrial aids must be of advanced usefulness and safety in harmony with activities of other countries. (T.T)

  11. Risk-informed, performance-based safety-security interface

    International Nuclear Information System (INIS)

    Mrowca, B.; Eltawila, F.

    2012-01-01

    Safety-security interface is a term that is used as part of the commercial nuclear power security framework to promote coordination of the many potentially adverse interactions between plant security and plant safety. Its object is to prevent the compromise of either. It is also used to describe the concept of building security into a plant's design similar to the long standing practices used for safety therefore reducing the complexity of the operational security while maintaining or enhancing overall security. With this in mind, the concept of safety-security interface, when fully implemented, can influence a plant's design, operation and maintenance. It brings the approach use for plant security to one that is similar to that used for safety. Also, as with safety, the application of risk-informed techniques to fully implement and integrate safety and security is important. Just as designers and operators have applied these techniques to enhance and focus safety, these same techniques can be applied to security to not only enhance and focus the security but also to aid in the implementation of effective techniques to address the safety-security interfaces. Implementing this safety-security concept early within the design process can prevent or reduce security vulnerabilities through low cost solutions that often become difficult and expensive to retrofit later in the design and/or post construction period. These security considerations address many of the same issues as safety in ensuring that the response of equipment and plant personnel are adequate. That is, both safety and security are focused on reaching safe shutdown and preventing radiological release. However, the initiation of challenges and the progression of actions in response these challenges and even the definitions of safe shutdown can be considerably different. This paper explores the techniques and limitations that are employed to fully implement a risk-informed, safety-security interface

  12. Distributed security framework for modern workforce

    Energy Technology Data Exchange (ETDEWEB)

    Balatsky, G.; Scherer, C. P., E-mail: gbalatsky@lanl.gov, E-mail: scherer@lanl.gov [Los Alamos National Laboratory, Los Alamos, NM (United States)

    2014-07-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  13. Distributed security framework for modern workforce

    International Nuclear Information System (INIS)

    Balatsky, G.; Scherer, C. P.

    2014-01-01

    Safe and sustainable nuclear power production depends on strict adherence to nuclear security as a necessary prerequisite for nuclear power. This paper considers the current challenges for nuclear security, and proposes a conceptual framework to address those challenges. We identify several emerging factors that affect nuclear security: 1. Relatively high turnover rates in the nuclear workforce compared to the earlier years of the nuclear industry, when nuclear workers were more likely to have secure employment, a lifelong career at one company, and retirement on a pension plan. 2. Vulnerabilities stemming from the ubiquitous presence of modern electronics and their patterns of use by the younger workforce. 3. Modern management practices, including outsourcing and short-term contracting (which relates to number 1 above). In such a dynamic and complex environment, nuclear security personnel alone cannot effectively guarantee adequate security. We propose that one solution to this emerging situation is a distributed security model in which the components of nuclear security become the responsibility of each and every worker at a nuclear facility. To implement this model, there needs to be a refurbishment of current workforce training and mentoring practices. The paper will present an example of distributed security framework model, and how it may look in practice. (author)

  14. A simple circuit to deliver bubbling CPAP.

    Science.gov (United States)

    Kaur, Charanjit; Sema, Akatoli; Beri, Rajbir S; Puliyel, Jacob M

    2008-04-01

    Nasal continuous positive airway pressure (CPAP), especially bubbling CPAP, is known to reduce the need for more invasive ventilation. We here describe a circuit that can deliver bubbling CPAP in resource poor settings. We describe how the oxygen concentration can be altered from 98% to 21% oxygen using this system. Addition of a humidifier in the circuit has the effect of reducing the oxygen concentration by 1 to 5%. The cost of putting together the system is approximately Rs 5000.

  15. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  16. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  17. Impact of peer delivered wellness coaching.

    Science.gov (United States)

    Swarbrick, Margaret; Gill, Kenneth J; Pratt, Carlos W

    2016-09-01

    People receiving publicly funded behavioral health services for severe mental disorders have shorter lifespans and significantly impaired health-related quality of life compared to the general population. The aim of this article was to explore how peer wellness coaching (PWC), a manualized approach to pursue specific physical wellness goals, impacted goal attainment and overall health related quality of life. Deidentified archival program evaluation data were examined to explore whether peer delivered wellness coaching had an impact on 33 service recipients with regard to goal attainment and health-related quality of life. Participants were served by 1 of 12 wellness coach trainees from a transformation transfer initiative grant who had been trained in the manualized approach. Coaching participants and their coaches reported significant progress toward the attainment of individually chosen goals, 2 to 4 weeks after establishing their goals. After 8 to 10 weeks of peer delivered wellness coaching, improvements were evident in the self-report of physical health, general health, and perceived health. These improvements were sustained 90 days later. PWC is potentially a promising practice for helping people choose and pursue individual goals and facilitating positive health and wellness changes. Rigorous controlled research with larger samples is needed to evaluate the benefits of peer delivered wellness coaching. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  18. Dementia - keeping safe in the home

    Science.gov (United States)

    ... this page: //medlineplus.gov/ency/patientinstructions/000031.htm Dementia - keeping safe in the home To use the ... make sure the homes of people who have dementia are safe for them. Safety Tips for the ...

  19. Breastfeeding FAQs: Safely Storing Breast Milk

    Science.gov (United States)

    ... Search English Español Breastfeeding FAQs: Safely Storing Breast Milk KidsHealth / For Parents / Breastfeeding FAQs: Safely Storing Breast ... may have. How do I store my breast milk? You can freeze and/or refrigerate your pumped ( ...

  20. Arkansas People Participating in Lead Education (APPLE): results of a lead-safe training program.

    Science.gov (United States)

    Ferguson, Alesia; Bursac, Zoran; Kern, David F

    2011-06-01

    Lead is still seen as one of the most harmful environmental toxins for young children, with the predominant source being deteriorating lead-based paint. Those at continued risk include those living in homes built before 1978, renovators and remodelers, and especially those with limited access to proper healthcare and diets. Proper training on lead-safe work practices focused on preventing and reducing the spread of lead dust can help reduce lead exposure. Presented in this paper are experiences in delivering lead-safe work practices training in six Arkansas cities, and results from pre- and post- surveys delivered before and immediately after the training. Pre- and post-surveys assess strong and weak areas of training. Participants demonstrated positive shifts in attitude and behavior towards lead-safe work practices following training. However, our research found that more emphasis should be focused on clarifying current lead exposure sources and routes for children.

  1. Hybrid architecture for building secure sensor networks

    Science.gov (United States)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  2. Modeling, simulation and analysis of a securities settlement system:The case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F; Palacios, Arturo; Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  3. Modeling, simulation and analysis of a securities settlement system: the case of Central Securities Depository of Mexico

    OpenAIRE

    Muñoz, David F.; Palacios, Arturo; de Lascurain, Miguel

    2012-01-01

    The Instituto para el Depósito de Valores (INDEVAL) is the Central Securities Depository of Mexico. It is the only Mexican institution authorized to perform, in an integrated manner, the activities of safe-keeping, custody, management, clearing, settlement and transfer of securities. In this article, we report the modeling, simulation and analysis of a new Securities Settlement System (SSS) implemented by INDEVAL, as part of a project for the implementation of a safer and more efficient opera...

  4. Working safely with electronics racks

    CERN Document Server

    Simon Baird, HSE Unit Head

    2016-01-01

    Think of CERN and you’ll probably think of particle accelerators and detectors. These are the tools of the trade in particle physics, but behind them are the racks of electronics that include power supplies, control systems and data acquisition networks.   Inside an electronics rack: danger could be lurking if the rack is not powered off. In routine operation, these are no more harmful than the home entertainment system in your living room. But unscrew the cover and it’s a different matter. Even after following appropriate training, and with formal authorisation from your group leader or equivalent to carry out electrical work or any work in the vicinity of electrical hazards, and even with extensive experience of carrying out such operations, it’s important to incorporate safe working practices into your routine. At CERN, before the racks of electronics reach their operational configurations for the accelerators and detectors, they play a vital role in test set-ups ...

  5. Workshop on Developing Safe Software

    International Nuclear Information System (INIS)

    Lawrence, J.D.

    1994-11-01

    The Workshop on Developing Safe Software was held July 22--23, 1992, at the Hotel del Coronado, San Diego, California. The purpose of the workshop was to have four world experts discuss among themselves software safety issues which are of interest to the US Nuclear Regulatory Commission. These issues concern the development of software systems for use in nuclear power plant protection systems. The workshop comprised four sessions. Wednesday morning, July 22, consisted of presentations from each of the four panel members. On Wednesday afternoon, the panel members went through a list of possible software development techniques and commented on them. The Thursday morning, July 23, session consisted of an extended discussion among the panel members and the observers from the NRC. A final session on Thursday afternoon consisted of a discussion among the NRC observers as to what was learned from the workshop

  6. Workshop on developing safe software

    International Nuclear Information System (INIS)

    Lawrence, J.D.

    1992-01-01

    The Workshop on Developing Safe Software was held July 22--23 at the Hotel del Coronado, San Diego, California. The purpose of the workshop was to have four world experts discuss among themselves software safety issues which are of interest to the U. S. Nuclear Regulatory Commission (NRC). These issues concern the development of software systems for use in nuclear power plant protection systems. The workshop comprised four sessions. Wednesday morning, July 22, consisted of presentations from each of the four panel members. On Wednesday afternoon, the panel members went through a list of possible software development techniques and commented on them. The Thursday morning, July 23, session consisted of an extended discussion among the panel members and the observers from the NRC. A final session on Thursday afternoon consisted of a discussion among the NRC observers as to what was teamed from the workshop

  7. The Difference Safe Spaces Make

    Directory of Open Access Journals (Sweden)

    Kendric Coleman

    2016-05-01

    Full Text Available In the last decade, lesbian, gay, bisexual, and transgender (LGBT students have become very visible at Historically Black Colleges and Universities (HBCUs, but this visibility is not reflected in some colleges’ student programs and activities. Only a few notable HBCUs, such as Howard University and Spelman College, have made a concerted effort. Acknowledging that the LGBT community is significant and exists, and fostering such support, comes up against a steep wall of religious tradition and doctrines, and conservative administrations. It is imperative that HBCUs address LGBT issues and create and support a safe space for students to articulate their identity. Meanwhile, many LGBT students on these campuses find voice and understanding in Black scholars and writers such as Audre Lorde’s Zami: A New Spelling of My Name and Charles Michael Smith’s Fighting Words: Personal Essays by Black Gay Men.

  8. Safe Distribution of Declarative Processes

    DEFF Research Database (Denmark)

    Hildebrandt, Thomas; Mukkamala, Raghava Rao; Slaats, Tijs

    2011-01-01

    of projections that covers a DCR Graph that the network of synchronously communicating DCR Graphs given by the projections is bisimilar to the original global process graph. We exemplify the distribution technique on a process identified in a case study of an cross-organizational case management system carried...... process model generalizing labelled prime event structures to a systems model able to finitely represent ω-regular languages. An operational semantics given as a transition semantics between markings of the graph allows DCR Graphs to be conveniently used as both specification and execution model....... The technique for distribution is based on a new general notion of projection of DCR Graphs relative to a subset of labels and events identifying the set of external events that must be communicated from the other processes in the network in order for the distribution to be safe.We prove that for any vector...

  9. Spark-safe power source

    Energy Technology Data Exchange (ETDEWEB)

    Mester, I M; Konushkin, N A; Nevozinskiy, A K; Rubinshteyn, B Sh; Serov, V I; Vasnev, M A

    1981-01-01

    A shortcoming of the known power sources is their low reliability. The purpose of the invention is to improve the reliability of the device. This is achieved because the spark-safe power source is equipped with a by-passing transistor and potentiometer, and also a generator of control interruptions in the circuit, an I-element, first separating transformer, control block, second separating transformer whose secondary winding has a relay winding whose contacts are connected to the load circuit are connected in series. The generator of control separations of the circuit is connected to the base of the by-passing transistor and to the power source outlet, the potentiometer is connected in series to the main thyristor. The middle point of the potentiometer is connected to the second inlet of the I-element.

  10. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  11. Safe injection procedures, injection practices, and needlestick ...

    African Journals Online (AJOL)

    Results: Safe injection procedures regarding final waste disposal were sufficiently adopted, while measures regarding disposable injection equipment, waste containers, hand hygiene, as well as injection practices were inadequately carried out. Lack of job aid posters that promote safe injection and safe disposal of ...

  12. Developing Safe Schools Partnerships with Law Enforcement

    Science.gov (United States)

    Rosiak, John

    2009-01-01

    Safe schools are the concern of communities throughout the world. If a school is safe, and if children feel safe, students "are better able to learn. But what are the steps to make" this happen? First, it is important to understand the problem: What are the threats to school safety? These include crime-related behaviors that find their way to…

  13. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  14. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  15. Sex preferences among mothers delivering at Patan Hospital.

    Science.gov (United States)

    Chhetri, U D; Ansari, I; Bandary, S; Adhikari, N

    2011-01-01

    High sex ratios at birth (SRB) are seen in China, Taiwan, South Korea, parts of India and Vietnam. The imbalance is the result of son preference, accentuated by declining fertility. Prenatal sex determination and female feticides are common in many countries. It is reflected in sex ratio To determine reasons for the preferences for different sex; to find out whether there is altered sex ratio at birth and to find out whether female feticide are common among women who had abortion. It is a prospective study. Women who had previous history of abortion and had delivered at Patan Hospital in the year 2066 were interviewed as per questionnaires. Among 560 women with total live births of 965, (462 male and 503 female) during their life time the overall sex ratio was 92 male per 100 female birth; total abortions were 663. Preferences for male were 10%, female 15.4% and either was for 74%. The reason for male preference was to continue family lineage, to bring honor, old age security, and performing funeral rites while the reasons for daughter preferences were that they understand mothers pain, help in household work. The sex ratio of the babies born during the study period was 113 male per 100 female births. The Sex ratio at birth from 1st to 6th deliveries was 61, 79, 101, 210, 286 and 1100 male per 100 female birth respectively. Prenatal sex selection was 8% (by USG) but none had sex selected abortion. Sex ratio of those delivered during the study period was skewed (136 boys per 100 girls) towards male. There was shift in SRB in 4th and subsequent pregnancies in favor of boys. As the male sex ratio increased the number of induced abortion decreased in subsequent pregnancies.

  16. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  17. Safe Handover : Safe Patients - The Electronic Handover System.

    Science.gov (United States)

    Till, Alex; Sall, Hanish; Wilkinson, Jonathan

    2014-01-01

    Failure of effective handover is a major preventable cause of patient harm. We aimed to promote accurate recording of high-quality clinical information using an Electronic Handover System (EHS) that would contribute to a sustainable improvement in effective patient care and safety. Within our hospital the human factors associated with poor communication were compromising patient care and unnecessarily increasing the workload of staff due to the poor quality of handovers. Only half of handovers were understood by the doctors expected to complete them, and more than half of our medical staff felt it posed a risk to patient safety. We created a standardised proforma for handovers that contained specific sub-headings, re-classified patient risk assessments, and aided escalation of care by adding prompts for verbal handover. Sources of miscommunication were removed, accountability for handovers provided, and tasks were re-organised to reduce the workload of staff. Long-term, three-month data showed that each sub-heading achieved at least 80% compliance (an average improvement of approximately 40% for the overall quality of handovers). This translated into 91% of handovers being subjectively clear to junior doctors. 87% of medical staff felt we had reduced a risk to patient safety and 80% felt it increased continuity of care. Without guidance, doctors omit key information required for effective handover. All organisations should consider implementing an electronic handover system as a viable, sustainable and safe solution to handover of care that allows patient safety to remain at the heart of the NHS.

  18. Securing Power during the Transition

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    Electricity security has been a priority of energy policy for decades due to the dependence of modern society on ongoing supply of electricity. Only a few years ago there was confidence that liberalised electricity markets in IEA member countries could deliver sufficient and timely generation investments needed to ensure security of supply. However, policies to decarbonise electricity systems have served to magnify investment risk and uncertainty. At the same time as renewable support schemes have proven effective in facilitating deployment of wind and solar photovoltaics, they also introduce new challenges to design a stable regulatory framework and well-functioning markets. Securing Power during the Transition, a report in the Electricity Security Action Plan series, assesses the threats and identifies options for competitive electricity markets embarking on the transition towards generating electricity from low-carbon sources . The analysis covers the impact of the global economic and financial situation, energy policy context and the implications for electricity market design. Its objective is to identify opportunities to improve regulatory and market designs to create a framework for timely and adequate investment, with a particular focus on conventional power plants.

  19. Global Security Program Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Bretzke, John C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-03-25

    The Global Security Directorate mission is to protect against proliferant and unconventional nuclear threats –regardless of origin - and emerging new threats. This mission is accomplished as the Los Alamos National Laboratory staff completes projects for our numerous sponsors. The purpose of this Program Management Plan is to establish and clearly describe the GS program management requirements including instructions that are essential for the successful management of projects in accordance with our sponsor requirements. The detailed information provided in this document applies to all LANL staff and their subcontractors that are performing GS portfolio work. GS management is committed to a culture that ensures effective planning, execution, and achievement of measurable results in accordance with the GS mission. Outcomes of such a culture result in better communication, delegated authority, accountability, and increased emphasis on safely and securely achieving GS objectives.

  20. Safe management of spent radiation source

    International Nuclear Information System (INIS)

    Kosako, Toshiso; Sugiura, Nobuyuki; Valdezco, E.M.; Choi, Kwang-Sub

    2003-01-01

    Presented are 8 investigation reports concerning the safe management of spent radiation source (SRS) during the current 2 years. Four reports from Japan are: Scheme for SRS management (approach and present status of the SRS management and consideration toward solving problems); Current International Atomic Energy Agency (IAEA) activities related to safety of radiation sources (Chronology of action plan development, Outline of revised action plan, and Asian regional activities); Current status of SRS management in Japan (Regulation system, Obligations of licensed users, Regulatory system on sealed sources, Status in the incidents on sources occurred, Incident of source loss, and Incidents of orphan sources); and SRS management system in Japan (Current status of using of sealed sources, collection system of SRS-Japan Radioisotope Association (JRIA) services, and Disposal of SRS). Four reports from the Asian countries also concern the current statuses of SRS management in the Philippine (Radioactive waste sources, Waste management strategies, Conditioning of Ra sources, Ra project action plan, as low as reasonably achievable (ALARA) program, Dose assessment, Regulations on radioactive waste, Action plan on the safety and security of sources, IAEA Regional Demonstration Centers, and sitting studies for a near surface disposal facility); Thailand (Current status of using sealed sources, Inventory of SRS, and Current topics of SRS management); Indonesia (Principles of management of radiation sources, Legislative framework of SRS management practices, Regulatory on SRS, management of sealed SRS, management hurdles, and reported incidents); and Korea (Regulatory frame work, Collection systems of SRS, Radioisotope waste generation, Radiation exposure incident, and Scrap monitoring system). (N.I.)

  1. Proceedings of TopSafe 2008 Transactions

    International Nuclear Information System (INIS)

    2008-01-01

    The aim of the conference is to provide a forum for addressing the current status and future perspectives with regards to safety at nuclear installations worldwide. Previous TopSafe editions took place in Budapest (1995) and Valencia (1998). The conference is directed at a broad range of experts in the area of nuclear safety, including professionals from the different disciplines involved in the safety of nuclear power plants, installations in other parts of the fuel cycle, and research reactors. It is aimed at professionals coming from the research organisations, universities, vendors, operators, regulatory bodies as well as policy makers. Top level representatives of the Countries that are constructing new nuclear power plants are invited. Regulators of all individual Countries with nuclear programme are expected to contribute the Conference. The topics of the conference are: Safety Issues of Operating Power Plants PWR and BWR, CANDU, WWER, RBMK; Application of European Utilities Requirements; Probabilistic and Deterministic Analysis; Shutdown Safety; Advances in Safety: Analysis Codes and Techniques; Severe Accidents Management; International Safety Studies; Emergency Planning; Risk Informed Application and Licensing; Regulatory Safety Requirements; Ageing and Life Extension; Power Upgrades and Relevant Topics; Management of Safety and Quality; Safety Culture and Self Assessment; Political and Public Perception of Nuclear Energy; Nuclear Power Plant Security; Safety Issues of Future Power Plants-Near term deployment reactors (EPR, SWR1000, AP1000, ESBWR, SBWR, ACR-1000) and Generation IV reactors; Safety Issues of Research Reactors (pool type and others); Fuel Cycle Facilities Safety-Uranium mining and conversion, enrichment and fuel production, reprocessing and transmutation, waste disposal. (authors)

  2. A better way to deliver bad news.

    Science.gov (United States)

    Manzoni, Jean-François

    2002-09-01

    In an ideal world, a subordinate would accept critical feedback from a manager with an open mind. He or she would ask a few clarifying questions, promise to work on certain performance areas, and show signs of improvement over time. But things don't always turn out that way. Such conversations can be unpleasant. Emotions can run high; tempers can flare. Fearing that the employee will become angry and defensive, the boss all too often inadvertently sabotages the meeting by preparing for it in a way that stifles honest discussion. This unintentional--indeed, unconscious--stress-induced habit makes it difficult to deliver corrective feedback effectively. Insead professor Jean-François Manzoni says that by changing the mind-set with which they develop and deliver negative feedback, managers can increase their odds of having productive conversations without damaging relationships. Manzoni describes two behavioral phenomena that color the feedback process--the fundamental attribution error and the false consensus effect--and uses real-world examples to demonstrate how bosses' critiques can go astray. Managers tend to frame difficult situations and decisions in a way that is narrow (alternatives aren't considered) and binary (there are only two possible outcomes--win or lose). And during the feedback discussion, managers' framing of the issues often remains frozen, regardless of the direction the conversation takes. Manzoni advises managers not to just settle on the first acceptable explanation for a behavior or situation they've witnessed. Bosses also need to consider an employee's circumstances rather than just attributing weak performance to a person's disposition. In short, delivering more effective feedback requires an open-minded approach, one that will convince employees that the process is fair and that the boss is ready for an honest conversation.

  3. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  4. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  5. Delivering IT and eBusiness value

    CERN Document Server

    Willcocks, Leslie

    2001-01-01

    Delivering Business Value from IT' is focused on the evaluation issue in IT and how IT evaluation can proceed across the life-cycle of any IT investment and be linked positively to improving business performance. .Chapters 1,2 and 3 detail an approach to IT evaluation whilst chapters 4 and 5 build on these by showing two distinctive approaches to linking IT to business performance. The remaining three chapters deal with a range of evaluation issues emerging as important - specifically Internet evaluation, Y2K and beyond, EMU, quality outsourcing, infrastructure, role of benchmarking, and cost

  6. Safe Handover : Safe Patients – The Electronic Handover System

    Science.gov (United States)

    Till, Alex; Sall, Hanish; Wilkinson, Jonathan

    2014-01-01

    Failure of effective handover is a major preventable cause of patient harm. We aimed to promote accurate recording of high-quality clinical information using an Electronic Handover System (EHS) that would contribute to a sustainable improvement in effective patient care and safety. Within our hospital the human factors associated with poor communication were compromising patient care and unnecessarily increasing the workload of staff due to the poor quality of handovers. Only half of handovers were understood by the doctors expected to complete them, and more than half of our medical staff felt it posed a risk to patient safety. We created a standardised proforma for handovers that contained specific sub-headings, re-classified patient risk assessments, and aided escalation of care by adding prompts for verbal handover. Sources of miscommunication were removed, accountability for handovers provided, and tasks were re-organised to reduce the workload of staff. Long-term, three-month data showed that each sub-heading achieved at least 80% compliance (an average improvement of approximately 40% for the overall quality of handovers). This translated into 91% of handovers being subjectively clear to junior doctors. 87% of medical staff felt we had reduced a risk to patient safety and 80% felt it increased continuity of care. Without guidance, doctors omit key information required for effective handover. All organisations should consider implementing an electronic handover system as a viable, sustainable and safe solution to handover of care that allows patient safety to remain at the heart of the NHS. PMID:26734244

  7. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological

  8. Confirmed low prevalence of Listeria mastitis in she-camel milk delivers a safe, alternative milk for human consumption.

    Science.gov (United States)

    Osman, Kamelia M; Samir, Ahmed; Orabi, Ahmed; Zolnikov, Tara Rava

    2014-02-01

    She-camel milk is an alternative solution for people allergic to milk; unfortunately, potential harmful bacteria have not been tested in she-camel milk. Listeria monocytogenes is one harmful bacterium that causes adverse health effects if chronically or acutely ingested by humans. The purpose of this study was to estimate the prevalence, characterize the phenotypic, genetic characterization, virulence factors, and antibiopotential harmful bacteria resistance profile of Listeria isolated from the milk of she-camel. Udder milk samples were collected from 100 she-camels and screened for mastitis using the California mastitis test (46 healthy female camels, 24 subclinical mastitic animals and 30 clinical mastitic animals). Samples were then examined for the presence of pathogenic Listeria spp; if located, the isolation of Listeria was completed using the International Organization for Standards technique to test for pathogenicity. The isolates were subjected to PCR assay for virulence-associated genes. Listeria spp. were isolated from 4% of samples and only 1.0% was confirmed as L. monocytogenes. The results of this study provide evidence for the low prevalence of intramammary Listeria infection; additionally, this study concludes she-camel milk in healthy camels milked and harvested in proper hygienic conditions may be used as alternative milk for human consumption. Copyright © 2013 Elsevier B.V. All rights reserved.

  9. Eye safe laser range finders

    International Nuclear Information System (INIS)

    Snir, M.; Margaliot, M.; Amitzi, A.

    2004-01-01

    During the 1970's, Ruby (Q switched) laser based range finders with a wavelength of 694nm were first used. These lasers operated in a pulse mode within the visible light range and produced a risk for the eye retina. The laser beam striking the macula could damage the eye and might cause blindness. Over the years, Nd:YAG (Q switched) lasers were developed (operating at 1064nm) for range finding and designation uses. The wavelength of these lasers, operating in the near Infra-Red range (invisible), is also focused tightly on the retina. The human eye does not respond to the invisible light so there is no natural protection (eye blink reflex) as in the visible light. The operation of these lasers worldwide, especially when the laser beam is exposed, causes occasional eye accidents. Another risk is stemming from the use of observation systems with a high optical gain, in the laser operation areas, which enlarge the range of risk quite significantly. Therefore, research and development efforts were invested in order to introduce eye safe lasers. One of the solutions for this problem is presented in following document

  10. Working safely with radioactive materials

    International Nuclear Information System (INIS)

    Davies, Wynne

    1993-01-01

    In common with exposure to many other laboratory chemicals, exposure to ionising radiations and to radioactive materials carries a small risk of causing harm. Because of this, there are legal limits to the amount of exposure to ionising radiations at work and special rules for working with radioactive materials. Although radiation protection is a complex subject it is possible to simplify to 10 basic things you should do -the Golden Rules. They are: 1) understand the nature of the hazard and get practical training; 2) plan ahead to minimise time spent handling radioactivity; 3) distance yourself appropriately from sources of radiation; 4) use appropriate shielding for the radiation; 5) contain radioactive materials in defined work areas; 6) wear appropriate protective clothing and dosimeters; 7) monitor the work area frequently for contamination control; 8) follow the local rules and safe ways of working; 9) minimise accumulation of waste and dispose of it by appropriate routes, and 10) after completion of work, monitor, wash, and monitor yourself again. These rules are expanded in this article. (author)

  11. Materials for passively safe reactors

    International Nuclear Information System (INIS)

    Simnad, T.

    1993-01-01

    Future nuclear power capacity will be based on reactor designs that include passive safety features if recent progress in advanced nuclear power developments is realized. There is a high potential for nuclear systems that are smaller and easier to operate than the current generation of reactors, especially when passive or intrinsic characteristics are applied to provide inherent stability of the chain reaction and to minimize the burden on equipment and operating personnel. Taylor, has listed the following common generic technical features as the most important goals for the principal reactor development systems: passive stability, simplification, ruggedness, case of operation, and modularity. Economic competitiveness also depends on standardization and assurance of licensing. The performance of passively safe reactors will be greatly influenced by the successful development of advanced fuels and materials that will provide lower fuel-cycle costs. A dozen new designs of advanced power reactors have been described recently, covering a wide spectrum of reactor types, including pressurized water reactors, boiling water reactors, heavy-water reactors, modular high-temperature gas-cooled reactors (MHTGRs), and fast breeder reactors. These new designs address the need for passive safety features as well as the requirement of economic competitiveness

  12. Safe and green nuclear power

    International Nuclear Information System (INIS)

    Kushwaha, H.S.

    2010-01-01

    Energy development plays an important role in the national economic growth. Presently the per capita consumption of energy in our country is about 750 kWh including captive power generation which is low in comparison to that in the developed countries like USA where it is about 12,000 kWh. As of now the total installed capacity of electricity generation is about 152,148 MW(e) which is drawn from Thermal (65%), Hydel (24%), Nuclear (3%) power plants and Renewables (8%). It is expected that by the end of year 2020, the required installed capacity would be more than 3,00,000 MW(e), if we assume per capita consumption of about 800-1000 kWh for Indian population of well over one billion. To meet the projected power requirement in India, suitable options need to be identified and explored for generation of electricity. For choosing better alternatives various factors such as availability of resources, potential to generate commercial power, economic viability, etc. need to be considered. Besides these factors, an important factor which must be taken into consideration is protection of environment around the operating power stations. This paper attempts to demonstrate that the nuclear power generation is an environmentally benign option for meeting the future requirement of electricity in India. It also discusses the need for creating the public awareness about the safe operations of the nuclear power plants and ionising radiation. (author)

  13. SAFE testing nuclear rockets economically

    International Nuclear Information System (INIS)

    Howe, Steven D.; Travis, Bryan; Zerkle, David K.

    2003-01-01

    Several studies over the past few decades have recognized the need for advanced propulsion to explore the solar system. As early as the 1960s, Werner Von Braun and others recognized the need for a nuclear rocket for sending humans to Mars. The great distances, the intense radiation levels, and the physiological response to zero-gravity all supported the concept of using a nuclear rocket to decrease mission time. These same needs have been recognized in later studies, especially in the Space Exploration Initiative in 1989. One of the key questions that has arisen in later studies, however, is the ability to test a nuclear rocket engine in the current societal environment. Unlike the Rover/NERVA programs in the 1960s, the rocket exhaust can no longer be vented to the open atmosphere. As a consequence, previous studies have examined the feasibility of building a large-scale version of the Nuclear Furnace Scrubber that was demonstrated in 1971. We have investigated an alternative that would deposit the rocket exhaust along with any entrained fission products directly into the ground. The Subsurface Active Filtering of Exhaust, or SAFE, concept would allow variable sized engines to be tested for long times at a modest expense. A system overview, results of preliminary calculations, and cost estimates of proof of concept demonstrations are presented. The results indicate that a nuclear rocket could be tested at the Nevada Test Site for under $20 M

  14. 29 CFR 2550.404a-2 - Safe harbor for automatic rollovers to individual retirement plans.

    Science.gov (United States)

    2010-07-01

    ... retirement plans. 2550.404a-2 Section 2550.404a-2 Labor Regulations Relating to Labor (Continued) EMPLOYEE... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-2 Safe..., whether or not such return is guaranteed, consistent with liquidity; (ii) For purposes of paragraph (c)(3...

  15. 29 CFR 2550.404a-3 - Safe harbor for distributions from terminated individual account plans.

    Science.gov (United States)

    2010-07-01

    ... RETIREMENT INCOME SECURITY ACT OF 1974 RULES AND REGULATIONS FOR FIDUCIARY RESPONSIBILITY § 2550.404a-3 Safe... rate of return, whether or not such return is guaranteed, consistent with liquidity (except that... liquidity; (v) A statement explaining what fees, if any, will be paid from the participant or beneficiary's...

  16. Unmanned Aerial Systems Traffic Management (UTM): Safely Enabling UAS Operations in Low-Altitude Airspace

    Science.gov (United States)

    Jung, Jaewoo; Kopardekar, Parimal H.

    2016-01-01

    Flexibility where possible, and structure where necessary. Consider the needs of national security, safe airspace operations, economic opportunities, and emerging technologies. Risk-based approach based on population density, assets on the ground, density of operations, etc. Digital, virtual, dynamic, and as needed UTM services to manage operations.

  17. DESIGNS MATTER: Delivering Information Sources for Tourism

    Directory of Open Access Journals (Sweden)

    Margie A. Nolasco

    2016-11-01

    Full Text Available Tourism has benefits not just for travelers, but also to the local economy. Since, Bicol Region has natural and cultural attractions; it is a potential travel destination in the country. Technology in delivering information sources played vital role for the success of the tourism industry in the Region. This allows travel enthusiasts to get more information about various tourist attractions. This paper analyzes the effectiveness of delivering information sources such as web advertisement and desktop publishing for tourist promotion in the Bicol Region. Specifically, it determined the status of tourism, and identified common forms of promotions for tourism development. The study adopted mixed method of research. This method was utilized to confirm and validate findings. Interviews and focus group discussions were used to gather data from the respondents of the selected Local Government Units, Department of Tourism, Travel Agencies and Hotel Agents in the Region. Based on the findings, of the total foreign visitors in the country, only 9.14% visited Bicol Region in 2014. That is why, domestic tourist showed high percentage against foreign visitors with 25.7%. Brochures with EZ maps as most commonly used desktop publishing materials and websites and social media for web advertisement. Thus, there is a need to reevaluate promotional activities by the DOT and other agencies. Adoption suggestive features for creative desktop publishing materials and web services should be considered to increase tourist visitors in the Region.

  18. Can the Clean Development Mechanism (CDM) deliver?

    International Nuclear Information System (INIS)

    Subbarao, Srikanth; Lloyd, Bob

    2011-01-01

    The paper investigates whether the Clean Development Mechanism (CDM) under the Kyoto Protocol has played a significant role in the development of rural communities, specifically investigating uptake of small-scale renewable energy projects. The investigation involved an assessment of 500 registered small-scale CDM projects under the Kyoto Protocol in terms of their potential impact on the envisaged sustainable development goals for rural communities. Five case studies from the Indian subcontinent were also examined. The paper concludes that the CDM in its current state and design has typically failed to deliver the promised benefits with regard to development objectives in rural areas. Successful projects were found to have had good community involvement and such projects were typically managed by cooperative ventures rather than money making corporations. The paper puts forward a new framework for the assessment of such benefits in the hope that future projects can be better assessed in this regard. The key problem, however, remains on how to deal with the inherent contradiction between development and sustainability. - Research Highlights: → Role of CDM towards sustainable development of rural communities. → Assessment of 500 registered small-scale CDM projects. → CDM in its current state and design has typically failed to deliver. → A new framework for sustainable development assessment of small-scale CDM projects. → Inherent contradiction between development and sustainability.

  19. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  20. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  1. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  2. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  3. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  4. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  5. MOBILE DEVICES AND EFFECTIVE INFORMATION SECURITY

    Directory of Open Access Journals (Sweden)

    Igor Bernik

    2013-05-01

    Full Text Available Rapidly increasing numbers of sophisticated mobile devices (smart phones, tab computers, etc. all over the world mean that ensuring information security will only become a more pronounced problem for individuals and organizations. It’s important to effectively protect data stored on or accessed by mobile devices, and also during transmission of data between devices and between device and information system. Technological and other trends show, that the cyber threats are also rapidly developing and spreading. It's crucial to educate users about safe usage and to increase their awareness of security issues. Ideally, users should keep-up with technological trends and be well equipped with knowledge otherwise mobile technology will significantly increase security risks. Most important is that we start educating youth so that our next generations of employees will be part of a culture of data and information security awareness.

  6. Security Measures to Protect Mobile Agents

    Science.gov (United States)

    Dadhich, Piyanka; Govil, M. C.; Dutta, Kamlesh

    2010-11-01

    The security issues of mobile agent systems have embarrassed its widespread implementation. Mobile agents that move around the network are not safe because the remote hosts that accommodate the agents initiates all kinds of attacks. These hosts try to analyze the agent's decision logic and their accumulated data. So, mobile agent security is the most challenging unsolved problems. The paper analyzes various security measures deeply. Security especially the attacks performed by hosts to the visiting mobile agent (the malicious hosts problem) is a major obstacle that prevents mobile agent technology from being widely adopted. Being the running environment for mobile agent, the host has full control over them and could easily perform many kinds of attacks against them.

  7. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  8. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  9. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  10. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  11. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  12. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  13. Safe prescribing: a titanic challenge.

    Science.gov (United States)

    Routledge, Philip A

    2012-10-01

    The challenge to achieve safe prescribing merits the adjective 'titanic'. The organisational and human errors leading to poor prescribing (e.g. underprescribing, overprescribing, misprescribing or medication errors) have parallels in the organisational and human errors that led to the loss of the Titanic 100 years ago this year. Prescribing can be adversely affected by communication failures, critical conditions, complacency, corner cutting, callowness and a lack of courage of conviction, all of which were also factors leading to the Titanic tragedy. These issues need to be addressed by a commitment to excellence, the final component of the 'Seven C's'. Optimal prescribing is dependent upon close communication and collaborative working between highly trained health professionals, whose role is to ensure maximum clinical effectiveness, whilst also protecting their patients from avoidable harm. Since humans are prone to error, and the environments in which they work are imperfect, it is not surprising that medication errors are common, occurring more often during the prescribing stage than during dispensing or administration. A commitment to excellence in prescribing includes a continued focus on lifelong learning (including interprofessional learning) in pharmacology and therapeutics. This should be accompanied by improvements in the clinical working environment of prescribers, and the encouragement of a strong safety culture (including reporting of adverse incidents as well as suspected adverse drug reactions whenever appropriate). Finally, members of the clinical team must be prepared to challenge each other, when necessary, to ensure that prescribing combines the highest likelihood of benefit with the lowest potential for harm. © 2012 The Author. British Journal of Clinical Pharmacology © 2012 The British Pharmacological Society.

  14. Safe prescribing: a titanic challenge

    Science.gov (United States)

    Routledge, Philip A

    2012-01-01

    The challenge to achieve safe prescribing merits the adjective ‘titanic’. The organisational and human errors leading to poor prescribing (e.g. underprescribing, overprescribing, misprescribing or medication errors) have parallels in the organisational and human errors that led to the loss of the Titanic 100 years ago this year. Prescribing can be adversely affected by communication failures, critical conditions, complacency, corner cutting, callowness and a lack of courage of conviction, all of which were also factors leading to the Titanic tragedy. These issues need to be addressed by a commitment to excellence, the final component of the ‘Seven C's’. Optimal prescribing is dependent upon close communication and collaborative working between highly trained health professionals, whose role is to ensure maximum clinical effectiveness, whilst also protecting their patients from avoidable harm. Since humans are prone to error, and the environments in which they work are imperfect, it is not surprising that medication errors are common, occurring more often during the prescribing stage than during dispensing or administration. A commitment to excellence in prescribing includes a continued focus on lifelong learning (including interprofessional learning) in pharmacology and therapeutics. This should be accompanied by improvements in the clinical working environment of prescribers, and the encouragement of a strong safety culture (including reporting of adverse incidents as well as suspected adverse drug reactions whenever appropriate). Finally, members of the clinical team must be prepared to challenge each other, when necessary, to ensure that prescribing combines the highest likelihood of benefit with the lowest potential for harm. PMID:22738396

  15. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  16. Embracing Safe Ground Test Facility Operations and Maintenance

    Science.gov (United States)

    Dunn, Steven C.; Green, Donald R.

    2010-01-01

    Conducting integrated operations and maintenance in wind tunnel ground test facilities requires a balance of meeting due dates, efficient operation, responsiveness to the test customer, data quality, effective maintenance (relating to readiness and reliability), and personnel and facility safety. Safety is non-negotiable, so the balance must be an "and" with other requirements and needs. Pressure to deliver services faster at increasing levels of quality in under-maintained facilities is typical. A challenge for management is to balance the "need for speed" with safety and quality. It s especially important to communicate this balance across the organization - workers, with a desire to perform, can be tempted to cut corners on defined processes to increase speed. Having a lean staff can extend the time required for pre-test preparations, so providing a safe work environment for facility personnel and providing good stewardship for expensive National capabilities can be put at risk by one well-intending person using at-risk behavior. This paper documents a specific, though typical, operational environment and cites management and worker safety initiatives and tools used to provide a safe work environment. Results are presented and clearly show that the work environment is a relatively safe one, though still not good enough to keep from preventing injury. So, the journey to a zero injury work environment - both in measured reality and in the minds of each employee - continues. The intent of this paper is to provide a benchmark for others with operational environments and stimulate additional sharing and discussion on having and keeping a safe work environment.

  17. Delivering Hubble Discoveries to the Classroom

    Science.gov (United States)

    Eisenhamer, B.; Villard, R.; Weaver, D.; Cordes, K.; Knisely, L.

    2013-04-01

    Today's classrooms are significantly influenced by current news events, delivered instantly into the classroom via the Internet. Educators are challenged daily to transform these events into student learning opportunities. In the case of space science, current news events may be the only chance for educators and students to explore the marvels of the Universe. Inspired by these circumstances, the education and news teams developed the Star Witness News science content reading series. These online news stories (also available in downloadable PDF format) mirror the content of Hubble press releases and are designed for upper elementary and middle school level readers to enjoy. Educators can use Star Witness News stories to reinforce students' reading skills while exposing students to the latest Hubble discoveries.

  18. Delivering advanced therapies: the big pharma approach.

    Science.gov (United States)

    Tarnowski, J; Krishna, D; Jespers, L; Ketkar, A; Haddock, R; Imrie, J; Kili, S

    2017-09-01

    After two decades of focused development and some recent clinical successes, cell and gene therapy (CGT) is emerging as a promising approach to personalized medicines. Genetically engineered cells as a medical modality are poised to stand alongside or in combination with small molecule and biopharmaceutical approaches to bring new therapies to patients globally. Big pharma can have a vital role in industrializing CGT by focusing on diseases with high unmet medical need and compelling genetic evidence. Pharma should invest in manufacturing and supply chain solutions that deliver reproducible, high-quality therapies at a commercially viable cost. Owing to the fast pace of innovation in this field proactive engagement with regulators is critical. It is also vital to understand the needs of patients all along the patient care pathway and to establish product pricing that is accepted by prescribers, payers and patients.

  19. Combining Technologies to Deliver Distance Education

    Directory of Open Access Journals (Sweden)

    Vicki Freeman

    1999-01-01

    Full Text Available In 1997 a Health Resources and Services Administration (HRSA grant was awarded to the Department of Clinical Laboratory Sciences (CLS at The University of Texas Medical Branch - Galveston (UTMB for support of the Laboratory Education and Advancement Project (LEAP. The project entailed three primary objectives, targeting laboratory practitioners in rural and medically underserved areas of Texas for delivering a bachelor's degree, laboratory-intensive course of study via distance education. Several delivery mechanisms were utilized and evaluated for their effectiveness and friendliness to both the faculty and students. The authors discuss and describe the mechanisms utilized for delivery of courses, the advantages and disadvantages encountered with each mechanism, and subjective evaluation of the effectiveness of the courses. Also discussed are the lessons learned and plans for future development.

  20. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  1. Photochemical internalization enhanced macrophage delivered chemotherapy.

    Science.gov (United States)

    Shin, Diane; Christie, Catherine; Ju, David; Nair, Rohit Kumar; Molina, Stephanie; Berg, Kristian; Krasieva, Tatiana B; Madsen, Steen J; Hirschberg, Henry

    2018-03-01

    Macrophage (Ma) vectorization of chemotherapeutic drugs has the advantage for cancer therapy in that it can actively target and maintain an elevated concentration of drugs at the tumor site, preventing their spread into healthy tissue. A potential drawback is the inability to deliver a sufficient number of drug-loaded Ma into the tumor, thus limiting the amount of active drug delivered. This study examined the ability of photochemical internalization (PCI) to enhance the efficacy of released drug by Ma transport. Tumor spheroids consisting of either F98 rat glioma cells or F98 cells combined with a subpopulation of empty or doxorubicin (DOX)-loaded mouse Ma (RAW264.7) were used as in vitro tumor models. PCI was performed with the photosensitizer AlPcS 2a and laser irradiation at 670 nm. RAW264.7 Ma pulsed with DOX released the majority of the incorporated DOX within two hours of incubation. PCI significantly increased the toxicity of DOX either as pure drug or derived from monolayers of DOX-loaded Ma. Significant growth inhibition of hybrid spheroids was also observed with PCI even at subpopulations of DOX-loaded Ma as low as 11% of the total initial hybrid spheroid cell number. Results show that RAW264.7 Ma, pulsed with DOX, could effectively incorporate and release DOX. PCI significantly increased the ability of both free and Ma-released DOX to inhibit the growth of tumor spheroids in vitro. The growth of F98 + DOX loaded Ma hybrid spheroids were synergistically reduced by PCI, compared to either photodynamic therapy or released DOX acting alone. Copyright © 2017 Elsevier B.V. All rights reserved.

  2. Temperature of gas delivered from ventilators.

    Science.gov (United States)

    Chikata, Yusuke; Onodera, Mutsuo; Imanaka, Hideaki; Nishimura, Masaji

    2013-01-01

    Although heated humidifiers (HHs) are the most efficient humidifying device for mechanical ventilation, some HHs do not provide sufficient humidification when the inlet temperature to the water chamber is high. Because portable and home-care ventilators use turbines, blowers, pistons, or compressors to inhale in ambient air, they may have higher gas temperature than ventilators with piping systems. We carried out a bench study to investigate the temperature of gas delivered from portable and home-care ventilators, including the effects of distance from ventilator outlet, fraction of inspiratory oxygen (FIO2), and minute volume (MV). We evaluated five ventilators equipped with turbine, blower, piston, or compressor system. Ambient air temperature was adjusted to 24°C ± 0.5°C, and ventilation was set at FIO2 0.21, 0.6, and 1.0, at MV 5 and 10 L/min. We analyzed gas temperature at 0, 40, 80, and 120 cm from ventilator outlet and altered ventilator settings. While temperature varied according to ventilators, the outlet gas temperature of ventilators became stable after, at the most, 5 h. Gas temperature was 34.3°C ± 3.9°C at the ventilator outlet, 29.5°C ± 2.2°C after 40 cm, 25.4°C ± 1.2°C after 80 cm and 25.1°C ± 1.2°C after 120 cm (P < 0.01). FIO2 and MV did not affect gas temperature. Gas delivered from portable and home-care ventilator was not too hot to induce heated humidifier malfunctioning. Gas soon declined when passing through the limb.

  3. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  4. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  5. Research and realization of info-net security controlling system

    Science.gov (United States)

    Xu, Tao; Zhang, Wei; Li, Xuhong; Wang, Xia; Pan, Wenwen

    2017-03-01

    The thesis introduces some relative concepts about Network Cybernetics, and we design and realize a new info-net security controlling system based on Network Cybernetics. The system can control the endpoints, safely save files, encrypt communication, supervise actions of users and show security conditions, in order to realize full-scale security management. At last, we simulate the functions of the system. The results show, the system can ensure the controllability of users and devices, and supervise them real-time. The system can maximize the security of the network and users.

  6. National and international safety, safeguardability and security

    International Nuclear Information System (INIS)

    Wakabayashi, Hiroaki

    1987-01-01

    All nuclear power and fuel cycle facility development must comply with the predecided national regulation and security codes which each country's Atomic Energy Commission stipulates. Those codes will basically evolve as technologies and the social system will develop, change and shift. It is also to be noted that the IAEA's international guidelines have been adopted particularly by developing countries as a good reference for their proper establishment of their safety codes. The report first discusses the plant safety regulation of the inherently safe reactors in comparison to the existing code (or licensing guide) of the Japanese government. Then the new trend seen now in a regulatory body (the US NRC) is reviewed and a proposal of the smooth transition into the new philosophy is presented. In the second part of the paper, the fuel safeguarding and facility security (or physical protection) are discussed, because in the case of inherently safe reactors like ISER-PIUS, it seems that safety has much more to do with the safeguard and the security. In the third part, the international relevances to the security of the ISER-PIUS are discussed, because any ISER-PIUS will be meaningless unless they are used extensively and freely in any part of the world precluding the security concerns. In collaborative use of the state and international codes, regulatory guides and practices, it is evident that ISER-PIUS system can clear the requirements on all the aspects by ample margin. (Nogami, K.)

  7. Securing Health Sensing Using Integrated Circuit Metric

    Science.gov (United States)

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-01-01

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250

  8. Securing Health Sensing Using Integrated Circuit Metric

    Directory of Open Access Journals (Sweden)

    Ruhma Tahir

    2015-10-01

    Full Text Available Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  9. Securing health sensing using integrated circuit metric.

    Science.gov (United States)

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-10-20

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  10. Energy security: between markets and sovereign politics

    Directory of Open Access Journals (Sweden)

    Dudau Radu

    2016-09-01

    Full Text Available Energy security is a constant presence in the energy-related political discourse all over the world. States strive to secure steady inflows of needed energy supplies, as well as the price affordability of those supplies. However, what are deemed to be the best means to meet such goals depends on one’s theoretical vantage point. On the one hand, economically-minded theorists maintain that energy security is only a matter of market rules and interactions. Thus, they call upon energy markets to deliver both steady supplies and competitive prices. On the other hand, politically-minded scholars emphasize the political and hard-power nature of international energy trades, especially in a global context market by the emergence of state-centered, authoritarian regimes that use large national energy companies as foreign policy instruments. These two positions delineate competing approaches to how energy security risks ought to be managed. The former approaches energy security risks by means similar to portfolio management, requiring diversification of investments in order to insulate them from market shocks. The latter approaches energy security as a matter of foreign policy, by which states envisage interest coordination and favorable alignments within countervailing alliances against the agent of energy security risk. The present paper goes beyond the uncontentious point that these two dimensions are complementary. It argues that, depending on the international context, a more market-driven or a more-politically driven behavior may be adequate.

  11. The right to adequate and safe working conditions in Ukraine

    Directory of Open Access Journals (Sweden)

    Едуард Валентинович Гаврилов

    2016-06-01

    Full Text Available The special attention is given to the rights of the citizens for independent and safe working conditions. The rights secured by law and guaranteed of each among workers and employers have been considered. The court case on infliction of harm to health in the performance of job duties has been analyzed. Taking this case as an example one can see different possible ways of its solution that cause controversy and contradictions. The Court of First Instance takes the side of the employer, Court of Appeal – on the side of the victim and consideration of the case on cassation appeal - shows only that the state taking the role of the judge is on the employer side not on the side of the worker as a victim. So, one can see that course of the state policy secured by legislators in the numerous normative acts and being reflection of the constitutional principle of the recognition by the state of  the human being, his or her life and health, honour and dignity, inviolability and security as the highest social value that is foreseen by Article 3 and by the provision of Part 4 Article 43 of the Basic Law does not correspond to the realities of life.

  12. Be-safe travel, a web-based geographic application to explore safe-route in an area

    Science.gov (United States)

    Utamima, Amalia; Djunaidy, Arif

    2017-08-01

    In large cities in developing countries, the various forms of criminality are often found. For instance, the most prominent crimes in Surabaya, Indonesia is 3C, that is theft with violence (curas), theft by weighting (curat), and motor vehicle theft (curanmor). 3C case most often occurs on the highway and residential areas. Therefore, new entrants in an area should be aware of these kind of crimes. Route Planners System or route planning system such as Google Maps only consider the shortest distance in the calculation of the optimal route. The selection of the optimal path in this study not only consider the shortest distance, but also involves other factors, namely the security level. This research considers at the need for an application to recommend the safest road to be passed by the vehicle passengers while drive an area. This research propose Be-Safe Travel, a web-based application using Google API that can be accessed by people who like to drive in an area, but still lack of knowledge of the pathways which are safe from crime. Be-Safe Travel is not only useful for the new entrants, but also useful for delivery courier of valuables goods to go through the safest streets.

  13. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  14. Unix Security Cookbook

    Science.gov (United States)

    Rehan, S. C.

    This document has been written to help Site Managers secure their Unix hosts from being compromised by hackers. I have given brief introductions to the security tools along with downloading, configuring and running information. I have also included a section on my recommendations for installing these security tools starting from an absolute minimum security requirement.

  15. Untangle network security

    CERN Document Server

    El-Bawab, Abd El-Monem A

    2014-01-01

    If you are a security engineer or a system administrator and want to secure your server infrastructure with the feature-rich Untangle, this book is for you. For individuals who want to start their career in the network security field, this book would serve as a perfect companion to learn the basics of network security and how to implement it using Untangle NGFW.

  16. Arguing Against Security Communitarianism

    DEFF Research Database (Denmark)

    Bilgin, Pinar

    2016-01-01

    Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by way of arguing against ‘security communitarianism’. I understand the latter...

  17. Security research roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Rouhiainen, V. (ed.)

    2007-02-15

    VTT has a broad range of security research ongoing in many areas of technology. The main areas have been concentrating on public safety and security, but VTT is also participating in several research projects related to defence technology. To identify and define expertise and research goals in more detail, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of a critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important security products and technologies needed are, for example, management of total security, detection, identification, localisation and communication, protection of information networks and systems, as well as physical protection. In the EU's Security programme, which aims at ensuring the security of society and its vital functions, it is stated that. Technology alone can not assure security, but security can not be assured without the support of technology. VTT is conducting security research in all its areas of expertise and clusters. The area has a significant research potential. The development of products and systems designed for the improvement of security has just started. There is still room for innovation. This report presents knowledge and development needs in more detail, as well as future development potential seen in the area of security. (orig.)

  18. Software Implementation of a Secure Firmware Update Solution in an IOT Context

    Directory of Open Access Journals (Sweden)

    Lukas Kvarda

    2016-01-01

    Full Text Available The present paper is concerned with the secure delivery of firmware updates to Internet of Things (IoT devices. Additionally, it deals with the design of a safe and secure bootloader for a UHF RFID reader. A software implementation of a secure firmware update solution is performed. The results show there is space to integrate even more security features into existing devices.

  19. Further developments in generating type-safe messaging

    Energy Technology Data Exchange (ETDEWEB)

    Neswold, R.; King, C.; /Fermilab

    2011-11-01

    At ICALEPCS 09, we introduced a source code generator that allows processes to communicate safely using data types native to each host language. In this paper, we discuss further development that has occurred since the conference in Kobe, Japan, including the addition of three more client languages, an optimization in network packet size and the addition of a new protocol data type. The protocol compiler is continuing to prove itself as an easy and robust way to get applications written in different languages hosted on different computer architectures to communicate. We have two active Erlang projects that are using the protocol compiler to access ACNET data at high data rates. We also used the protocol compiler output to deliver ACNET data to an iPhone/iPad application. Since it takes an average of two weeks to support a new language, we're willing to expand the protocol compiler to support new languages that our community uses.

  20. IAEA nuclear security program

    Energy Technology Data Exchange (ETDEWEB)

    Ek, D. [International Atomic Energy Agency, Vienna (Austria)

    2006-07-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  1. IAEA nuclear security program

    International Nuclear Information System (INIS)

    Ek, D.

    2006-01-01

    Although nuclear security is a State responsibility, it is nevertheless an international concern, as the consequences of a nuclear security incident would have worldwide impact. These concerns have resulted in the development of numerous international instruments on nuclear security since the terrorist events in the USA on September 11, 2001. The IAEA Office of Nuclear Security has been charged to assist Member States to improvement their nuclear security and to meet the intent of these international obligations in order to ensure a cohesive thread of nuclear security protects the global community. The programs underway and planned by the Office of Nuclear Security will be discussed in this paper. (author)

  2. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  3. Personal security a guide for international travelers

    CERN Document Server

    Spencer, Tanya

    2013-01-01

    Personal Security: A Guide for International Travelers provides the perfect mix of lessons-learned, tools, and recommendations from experts so that readers can personalize their own approach to managing travel risks. If followed, the information provided will allow readers to get out and experience the local culture while still traveling safely.-Bernie Sullivan, Director Global Security, Hanesbrands Inc....a must-have for any traveler. Having worked in South and Southeast Asia, I know the advice provided in the book holds the key to keeping safe, avoiding dangerous situations, and managing threats when they occur. The book's methodological framework, combined with the author's extensive experience and hands-on knowledge, provide very practical and useful advice.-Kathrine Alexandrowiz, Independent consultant at Kathalyst, former coordinator for the "Regional Risk Management Project for NGOs in Asia Pacific" (ECHO)... a go-to guide for all travelers irrespective of mission or purpose. An excellent piece of work...

  4. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  5. Virus Alert: Ten Steps to Safe Computing.

    Science.gov (United States)

    Gunter, Glenda A.

    1997-01-01

    Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)

  6. Implementation of an Improved Safe Operating Envelope

    International Nuclear Information System (INIS)

    Prime, Robyn; McIntyre, Mark; Reeves, David

    2008-01-01

    This paper is a continuation of the paper presented at IYNC 2004 on 'The Definition of a Safe Operating Envelope'. The current paper concentrates on the implementation process of the Safe Operating Envelope employed at the Point Lepreau Generating Station. (authors)

  7. Creating Safe Spaces for Music Learning

    Science.gov (United States)

    Hendricks, Karin S.; Smith, Tawnya D.; Stanuch, Jennifer

    2014-01-01

    This article offers a practical model for fostering emotionally safe learning environments that instill in music students a positive sense of self-belief, freedom, and purpose. The authors examine the implications for music educators of creating effective learning environments and present recommendations for creating a safe space for learning,…

  8. Implementation of an Improved Safe Operating Envelope

    Energy Technology Data Exchange (ETDEWEB)

    Prime, Robyn; McIntyre, Mark [NB Power Nuclear, P.O. Box 600, Lepreau, NB (Canada); Reeves, David [Atlantic Nuclear Services Ltd., PO Box 1268 Fredericton, NB (Canada)

    2008-07-01

    This paper is a continuation of the paper presented at IYNC 2004 on 'The Definition of a Safe Operating Envelope'. The current paper concentrates on the implementation process of the Safe Operating Envelope employed at the Point Lepreau Generating Station. (authors)

  9. Alternative Fuels Data Center: Seattle Bakery Delivers With Biodiesel

    Science.gov (United States)

    Trucks Seattle Bakery Delivers With Biodiesel Trucks to someone by E-mail Share Alternative Fuels Data Center: Seattle Bakery Delivers With Biodiesel Trucks on Facebook Tweet about Alternative Fuels Data Center: Seattle Bakery Delivers With Biodiesel Trucks on Twitter Bookmark Alternative Fuels

  10. Apparatus for delivering and receiving radioactive gas

    International Nuclear Information System (INIS)

    Dansky, B.; Epifano, L.; Farella, R.

    1980-01-01

    An apparatus for delivering and receiving gas to and from a patient, such as for lung ventilation studies. In accordance with the invention there is provided a restrictive breathing chamber adapted for coupling to the patient's breathing organs. A system, including a first check valve, is provided for coupling the breathing chamber to an inflatable gas receptacle so as to allow flow only toward the inflatable gas receptacle. Active gas input apparatus, including a second check valve, is also coupled to the breathing chamber, the second check valve allowing flow only toward the breathing chamber means. First and second auxiliary tubes and a gas filter are also provided. A system is provided for coupling the first auxiliary tube from the inflatable receptacle through the gas filter and to an ambient air environment. The second auxiliary tube is coupled from the inflatable receptacle to an ambient air environment. Finally, a gas pump is switchably coupled as between the first and second auxiliary tubes and operative to selectively cause gas flow in the first auxiliary tube toward the ambient environment, and in the second auxiliary tube toward the inflatable receptacle. A gas trap structure is also disclosed

  11. Delivering bad news in emergency care medicine.

    Science.gov (United States)

    Maynard, Douglas W

    2017-01-01

    Forecasting is a strategy for delivering bad news and is compared to two other strategies, stalling and being blunt. Forecasting provides some warning that bad news is forthcoming without keeping the recipient in a state of indefinite suspense (stalling) or conveying the news abruptly (being blunt). Forecasting appears to be more effective than stalling or being blunt in helping a recipient to "realize" the bad news because it involves the deliverer and recipient in a particular social relation. The deliverer of bad news initiates the telling by giving an advance indication of the bad news to come; this allows the recipient to calculate the news in advance of its final presentation, when the deliverer confirms what the recipient has been led to anticipate. Thus, realization of bad news emerges from intimate collaboration, whereas stalling and being blunt require recipients to apprehend the news in a social vacuum. Exacerbating disruption to recipients' everyday world, stalling and being blunt increase the probability of misapprehension (denying, blaming, taking the situation as a joke, etc.) and thereby inhibit rather than facilitate realization. Particular attention is paid to the "perspective display sequence", a particular forecasting strategy that enables both confirming the recipient's perspective and using that perspective to affirm the clinical news. An example from acute or emergency medicine is examined at the close of the paper.

  12. Changes in nurse education: delivering the curriculum.

    Science.gov (United States)

    Carr, Graham

    2008-01-01

    The aim of this study is to examine changes in pre-registration nursing education through the personal accounts of nurse teachers. This paper is based on 37 in-depth interviews within a central London Healthcare Faculty. Each interview was subjected to a process of content analysis described by Miles and Huberman. The interviews took place between August 2003 and March 2004 and totalled 34.4 hours or 305,736 words. There were thirty female and seven male participants, who shared 1015 years of nursing experience, averaging at 27.4 years (min 7-max 42). These were supplemented by 552 years of teaching practice, the average being 15 years (min 0.5-max 29). This paper--delivering the nursing curriculum--identifies that the nature of nursing has changed as it has both expanded and contracted. Participants identified three major changes; the nature of nursing, selection of future nurses and the current impact that large cohorts have on our traditional model of person-centred education. The practice placements remain central to nursing education and it is the nursing role that should define the curriculum and the values of higher education should be supportive of this identity.

  13. Delivering new physics at impressive speed

    CERN Multimedia

    2010-01-01

    The speed with which the heavy ion run at the LHC is delivering new physics is impressive not only for the insights it is bringing to the early Universe, but also for the clear demonstration it gives of the value of competition and complementarity between the experiments.   ALICE was the first off the mark to publish papers from the ion run, as you’d expect from the LHC’s dedicated ion experiment, but results emerging from ATLAS and CMS are bringing new understanding in their own right. Each collaboration’s result plays to the strengths of its detector, and it is by taking all the results together that our knowledge advances. The creation, observation and understanding of the hot dense matter that would have existed in the early Universe, normally known as Quark Gluon Plasma (QGP), is complex science and one of the ion programme’s key goals. Many signals for QGP exist, and like pieces of a puzzle, we must assemble all of them to get the full picture. At th...

  14. Secure Electronic Cards in Public Services

    Directory of Open Access Journals (Sweden)

    Cristian TOMA

    2008-01-01

    Full Text Available The paper presents the electronic wallet solution implemented within a GSM SIM technology for accessing public services. The solution is implemented in the medical field to provide information on the patient’s medical history and payment for private medical services. The security issue is a very important one as the patient’s history is confidential and the payment has to be safe.

  15. Autonomous Highway Systems Safety and Security

    OpenAIRE

    Sajjad, Imran

    2017-01-01

    Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, t...

  16. Content Sharing Based on Personal Information in Virtually Secured Space

    Science.gov (United States)

    Sohn, Hosik; Ro, Yong Man; Plataniotis, Kostantinos N.

    User generated contents (UGC) are shared in an open space like social media where users can upload and consume contents freely. Since the access of contents is not restricted, the contents could be delivered to unwanted users or misused sometimes. In this paper, we propose a method for sharing UGCs securely based on the personal information of users. With the proposed method, virtual secure space is created for contents delivery. The virtual secure space allows UGC creator to deliver contents to users who have similar personal information and they can consume the contents without any leakage of personal information. In order to verify the usefulness of the proposed method, the experiment was performed where the content was encrypted with personal information of creator, and users with similar personal information have decrypted and consumed the contents. The results showed that UGCs were securely shared among users who have similar personal information.

  17. 21 CFR 1301.72 - Physical security controls for non-practitioners; narcotic treatment programs and compounders for...

    Science.gov (United States)

    2010-04-01

    ... of No. 10 gauge steel fabric on a metal door frame in a metal door flange, and in all other respects... secured areas: (1) Where small quantities permit, a safe or steel cabinet; (i) Which safe or steel cabinet... radiological techniques; (ii) Which safe or steel cabinet, if it weighs less than 750 pounds, is bolted or...

  18. Usable Security and E-Banking: ease of use vis-a-vis security

    Directory of Open Access Journals (Sweden)

    Morten Hertzum

    2004-05-01

    Full Text Available Electronic banking must be secure and easy to use. An evaluation of six Danish web-based electronic banking systems indicates that the systems have serious weaknesses with respect to ease of use. Our analysis of the weaknesses suggests that security requirements are among their causes and that the weaknesses may in turn cause decreased security. We view the conflict between ease of use and security in the context of usable security, a concept that is intended to match security principles and demands against user knowledge and motivation. Automation, instruction, and understanding can be identified as different approaches to usable security. Instruction is the main approach of the systems evaluated; automation relieves the user from involvement in security, as far as possible; and understanding goes beyond step-by-step instructions, to enable users to act competently and safely in situations that transcend preconceived instructions. We discuss the pros and cons of automation and understanding as alternative approaches to the design of web-based e-banking systems.

  19. 17 CFR 401.9 - Exemption for certain foreign government securities brokers or dealers.

    Science.gov (United States)

    2010-04-01

    ... legally necessary, its customers (with respect to customer information) to permit the foreign broker or..., delivering, and safeguarding funds and securities in connection with the transactions on behalf of the U.S...

  20. Defining the e-learner’s security profile: Towards awareness ...

    Indian Academy of Sciences (India)

    Marjan Milošević

    open source learning content management system [22]. A .... of security agent that would ''do a real job''. Usersecurity is a structure ... which then use appropriate awareness resource to deliver content to ..... Int. J. Human-Comput. Stud. 72(12):.

  1. Delivering Results for Peace and Development

    International Nuclear Information System (INIS)

    Felix Barrio

    2018-01-01

    Regular budget and Technical Cooperation Fund are the two main financial resources allowing IAEA financing his missions and activities concerning nuclear applications in Member States. The IAEA is composed by six Department among which the Department of Technical Cooperation (TC). The TC Program is a bridge between Member States and the Agency allowing the IAEA to enhance the contribution of nuclear technologies for development. Improving human health, supporting agriculture and rural development, advancing water resource management, addressing environmental challenges, providing analysis for sustainable energy development and promoting safety and security are the main intervention’s field of the TC Programme. In africa, around 350 projects per year are conducted by the Technical cooperation programme involving members states and IAEA in different domains. The project team is composed by Programme Management Officer (PMO) composed by Programme Management Officer (PMO), Technical Officer(s), National Liaison Officer (NLO) and the National Counterpart. After establishment of a National Framework Programme for 5 years, budget is estimated for cycles of 2 years and approved annually.In partnerships with other UN organisations, the NLO play an important roles for the success of projects between IAEA and his member states.

  2. Gulf team delivers on DP drillship promise

    Energy Technology Data Exchange (ETDEWEB)

    Flatern, R von

    2001-06-01

    The technological achievements of the project by Amoco and BP to complete a deepwater subsea well in the Gulf of Mexico from a dynamically positioned (DP) vessel are described. In 2000, the dual activity drillship, Discoverer Enterprise (owned by Transocean Sedco Forex), completed the Nile well in the Viosca Knoll area and then the King Well in Mississippi Canyon Block 85. Stringent safety and environmental protection criteria imposed by Amoco and BP drove the design of the Dril-Quip subsea wellhead to ensure that the wellhead profile and connector coped with the worst case scenario. BP also specified a disconnect system that would secure the well in less than a minute. The SenTREE 7 and Commander telemetry systems developed by Schlumberger, the components of the work string and test work with the Nile well to ensure BP conditions were met and that the perforation and surge procedure proceeded successfully are explained. The time reduction achieved by using large DP drillships and future BP plans are outlined.

  3. An Enterprise Security Program and Architecture to Support Business Drivers

    OpenAIRE

    Brian Ritchot

    2013-01-01

    This article presents a business-focused approach to developing and delivering enterprise security architecture that is focused on enabling business objectives while providing a sensible and balanced approach to risk management. A balanced approach to enterprise security architecture can create the important linkages between the goals and objectives of a business, and it provides appropriate measures to protect the most critical assets within an organization while accepting risk where appropr...

  4. (Congressional Interest) Institute for Science, Space and Security (ISSS)

    Science.gov (United States)

    2012-03-19

    Studies program between UCCS and University of Zagreb , Croatia (City of Zagreb funding). Conducted three days of meetings with City/University of Zagreb ...security and assist the University of Zagreb in establishing a regional (Eastern Europe) Center of Excellence in Homeland Security. In the long-term...UCCS will assist the University of Zagreb in maturing the Center of Excellence and designing, developing and delivering masters and doctoral degrees

  5. Simply delivered meals: a tale of collaboration.

    Science.gov (United States)

    Martin, Sarah L; Connelly, Nancy; Parsons, Cassandra; Blackstone, Katlyn

    2018-06-01

    Western medicine is undergoing a transition toward transparency of quality and costs, and healthcare systems are striving to achieve the Triple Aim, a framework for improving the patient experience of care, improving the health of populations, and reducing the per capita cost of healthcare. Meanwhile, there is growing recognition of the impact of social determinants of health and a new federal requirement for nonprofit hospitals to implement prevention strategies. A specialized meal delivery program called Simply Delivered for ME (SDM) was formed in an effort to improve care and reduce 30-day hospital readmission rates.The Maine Medical Center (MMC) partnered with the Southern Maine Agency on Aging to offer SDM on a voluntary basis to high-risk Medicare patients already enrolled in the Community-based Care Transition Program (CCTP) at MMC. We report the results of the 2-year intervention in terms of 30-day hospital readmission rates and cost measures (ie, return on investment and cost savings).Of the 622 MMC patients who received SDM during the 24 months, the 30-day readmission rate was 10.3% (compared with the 16.6% 30-day rate of hospital readmission at baseline [ie, before the adoption of CCTP]) for all-cause readmissions. The cost savings for reduced readmissions were $212,160. The return on investment was 387%, or a benefit-cost ratio of $3.87 for every $1.00 spent on meals. Programs such as SDM may reduce the rate of hospital readmission among high-risk older adults and, thereby, yield lower healthcare costs.

  6. InaSAFE applications in disaster preparedness

    Science.gov (United States)

    Pranantyo, Ignatius Ryan; Fadmastuti, Mahardika; Chandra, Fredy

    2015-04-01

    Disaster preparedness activities aim to reduce the impact of disasters by being better prepared to respond when a disaster occurs. In order to better anticipate requirements during a disaster, contingency planning activities can be undertaken prior to a disaster based on a realistic disaster scenario. InaSAFE is a tool that can inform this process. InaSAFE is a free and open source software that estimates the impact to people and infrastructure from potential hazard scenarios. By using InaSAFE, disaster managers can develop scenarios of disaster impacts (people and infrastructures affected) to inform their contingency plan and emergency response operation plan. While InaSAFE provides the software framework exposure data and hazard data are needed as inputs to run this software. Then InaSAFE can be used to forecast the impact of the hazard scenario to the exposure data. InaSAFE outputs include estimates of the number of people, buildings and roads are affected, list of minimum needs (rice and clean water), and response checklist. InaSAFE is developed by Indonesia's National Disaster Management Agency (BNPB) and the Australian Government, through the Australia-Indonesia Facility for Disaster Reduction (AIFDR), in partnership with the World Bank - Global Facility for Disaster Reduction and Recovery (GFDRR). This software has been used in many parts of Indonesia, including Padang, Maumere, Jakarta, and Slamet Mountain for emergency response and contingency planning.

  7. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  8. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  9. Digital watermarking for secure and adaptive teleconferencing

    Science.gov (United States)

    Vorbrueggen, Jan C.; Thorwirth, Niels

    2002-04-01

    The EC-sponsored project ANDROID aims to develop a management system for secure active networks. Active network means allowing the network's customers to execute code (Java-based so-called proxylets) on parts of the network infrastructure. Secure means that the network operator nonetheless retains full control over the network and its resources, and that proxylets use ANDROID-developed facilities to provide secure applications. Management is based on policies and allows autonomous, distributed decisions and actions to be taken. Proxylets interface with the system via policies; among actions they can take is controlling execution of other proxylets or redirection of network traffic. Secure teleconferencing is used as the application to demonstrate the approach's advantages. A way to control a teleconference's data streams is to use digital watermarking of the video, audio and/or shared-whiteboard streams, providing an imperceptible and inseparable side channel that delivers information from originating or intermediate stations to downstream stations. Depending on the information carried by the watermark, these stations can take many different actions. Examples are forwarding decisions based on security classifications (possibly time-varying) at security boundaries, set-up and tear-down of virtual private networks, intelligent and adaptive transcoding, recorder or playback control (e.g., speaking off the record), copyright protection, and sender authentication.

  10. Transmission Line Security Monitor: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  11. Integrity and security in an Ada runtime environment

    Science.gov (United States)

    Bown, Rodney L.

    1991-01-01

    A review is provided of the Formal Methods group discussions. It was stated that integrity is not a pure mathematical dual of security. The input data is part of the integrity domain. The group provided a roadmap for research. One item of the roadmap and the final position statement are closely related to the space shuttle and space station. The group's position is to use a safe subset of Ada. Examples of safe sets include the Army Secure Operating System and the Penelope Ada verification tool. It is recommended that a conservative attitude is required when writing Ada code for life and property critical systems.

  12. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  13. Safe actinide disposition in molten salt reactors

    International Nuclear Information System (INIS)

    Gat, U.

    1997-01-01

    Safe molten salt reactors (MSR) can readily accommodate the burning of all fissile actinides. Only minor compromises associated with plutonium are required. The MSRs can dispose safely of actinides and long lived isotopes to result in safer and simpler waste. Disposing of actinides in MSRs does increase the source term of a safety optimized MSR. It is concluded that the burning and transmutation of actinides in MSRs can be done in a safe manner. Development is needed for the processing to handle and separate the actinides. Calculations are needed to establish the neutron economy and the fuel management. 9 refs

  14. Food irradiation is safe: Half a century of studies

    International Nuclear Information System (INIS)

    Roberts, Peter B.

    2014-01-01

    The potential benefits of food irradiation are yet to be realized due to slow progress in the commercialization of the technology. Processing food with ionizing radiation has encountered several barriers, one of which is the belief that consumers will not purchase irradiated food and a consequent caution among food retailers and producers. There is sufficient evidence that consumers will purchase irradiated foods when offered at retail in contrast to the data from many surveys of general public opinion. Communicating this evidence to food retailers and producers is essential if a major barrier to a greater use of the technology is to be overcome. - Highlights: • Food irradiation is safe and can benefit food safety, security and trade. • Commercial use remains limited. • The food trade tends to believe consumers will not buy irradiated food. • There is good evidence that consumers buy irradiated food when it is offered. • Demonstrating this evidence to industry is vital for commercial success

  15. On the safeness of examinees and the reliability of system

    International Nuclear Information System (INIS)

    Kudo, Kazumi; Kanda, Kosuke; Saito, Kazuhiko; Maesawa, Tsuneharu; Idekami, Tomio

    1979-01-01

    The control technique of the reliability of examination system was investigated from the viewpoint of patient safety and image information, based on the prevention of microshock owing to circulatory organ checking system. As for the equipments in hospitals, the size of rooms, air conditioning system, power source installation, earth and piping arrangements should be fully discussed at the planning stage. EPR system must be introduced for the prevention for microshock. Intensive education and training are required for operators to secure safeness in operation. Thorough care should be taken to prevent bacilli infection. Further examinations were made on the control technique of the reliability of photographing system from viewpoint of image information, and it is necessary to study the factors for obtaining the reliability of compound machinery components and the devices of generating radiation. (Kobatake, H.)

  16. Securing the Vista Environment

    CERN Document Server

    Gregory, Peter

    2007-01-01

    "Securing the Vista Environment" takes you on a quick tour of the most significant security features in Vista, Microsoft's first revision of Windows in almost six years. You'll get background on threats and vulnerabilities that will make you think differently about security. Security is more than just the technology and configurations--it's about how we use the system that makes it secure or not. Then we'll cover Vista's security features, from user privileges to Windows Defender, User Account Control, and BitLocker, as well as strategies for protecting your information from unwanted disclo

  17. Digital security technology simplified.

    Science.gov (United States)

    Scaglione, Bernard J

    2007-01-01

    Digital security technology is making great strides in replacing analog and other traditional security systems including CCTV card access, personal identification and alarm monitoring applications. Like any new technology, the author says, it is important to understand its benefits and limitations before purchasing and installing, to ensure its proper operation and effectiveness. This article is a primer for security directors on how digital technology works. It provides an understanding of the key components which make up the foundation for digital security systems, focusing on three key aspects of the digital security world: the security network, IP cameras and IP recorders.

  18. ICT security management

    OpenAIRE

    SCHREURS, Jeanne; MOREAU, Rachel

    2007-01-01

    Security becomes more and more important and companies are aware that it has become a management problem. It’s critical to know what are the critical resources and processes of the company and their weaknesses. A security audit can be a handy solution. We have developed BEVA, a method to critically analyse the company and to uncover the weak spots in the security system. BEVA results also in a general security score and security scores for each security factor. These will be used in the risk ...

  19. Android apps security

    CERN Document Server

    Gunasekera, Sheran

    2012-01-01

    Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.  Overview of Android OS versions, features, architecture and security.  Detailed examination of areas where attacks on applications can take place and what controls should b

  20. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  1. Modelling security and trust with Secure Tropos

    NARCIS (Netherlands)

    Giorgini, P.; Mouratidis, H.; Zannone, N.; Mouratidis, H.; Giorgini, P.

    2006-01-01

    Although the concepts of security and trust play an important issue in the development of information systems, they have been mainly neglected by software engineering methodologies. In this chapter we present an approach that considers security and trust throughout the software development process.

  2. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  3. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  4. Simulation of cloud data security processes and performance

    OpenAIRE

    Chand, K; Ramachandran, M; Kor, AL

    2015-01-01

    In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security ...

  5. An evaluation of smartphone communication (in)security

    OpenAIRE

    Brodd-Reijer, Christoffer

    2014-01-01

    The purpose of this study is to examine and evaluate the security of the data traffic sent to and from smartphone devices. Since smartphones are becoming more common, are highly connected, often use cloud based computation, and contain highly personal data, it is important that the communication is secure and safe. This paper examines the Android and iOS platforms and focuses on three key parts: platform, application, and user. The platforms are evaluated on the basis of their libraries, APIs...

  6. Earth Observations for Global Water Security

    Science.gov (United States)

    Lawford, Richard; Strauch, Adrian; Toll, David; Fekete, Balazs; Cripe, Douglas

    2013-01-01

    The combined effects of population growth, increasing demands for water to support agriculture, energy security, and industrial expansion, and the challenges of climate change give rise to an urgent need to carefully monitor and assess trends and variations in water resources. Doing so will ensure that sustainable access to adequate quantities of safe and useable water will serve as a foundation for water security. Both satellite and in situ observations combined with data assimilation and models are needed for effective, integrated monitoring of the water cycle's trends and variability in terms of both quantity and quality. On the basis of a review of existing observational systems, we argue that a new integrated monitoring capability for water security purposes is urgently needed. Furthermore, the components for this capability exist and could be integrated through the cooperation of national observational programmes. The Group on Earth Observations should play a central role in the design, implementation, management and analysis of this system and its products.

  7. Security of pipeline facilities

    Energy Technology Data Exchange (ETDEWEB)

    Lee, S.C. [Alberta Energy and Utilities Board, Calgary, AB (Canada); Van Egmond, C.; Duquette, L. [National Energy Board, Calgary, AB (Canada); Revie, W. [Canada Centre for Mineral and Energy Technology, Ottawa, ON (Canada)

    2005-07-01

    This working group provided an update on provincial, federal and industry directions regarding the security of pipeline facilities. The decision to include security issues in the NEB Act was discussed as well as the Pipeline Security Management Assessment Project, which was created to establish a better understanding of existing security management programs as well as to assist the NEB in the development and implementation of security management regulations and initiatives. Amendments to the NEB were also discussed. Areas of pipeline security management assessment include physical safety management; cyber and information security management; and personnel security. Security management regulations were discussed, as well as implementation policies. Details of the Enbridge Liquids Pipelines Security Plan were examined. It was noted that the plan incorporates flexibility for operations and is integrated with Emergency Response and Crisis Management. Asset characterization and vulnerability assessments were discussed, as well as security and terrorist threats. It was noted that corporate security threat assessment and auditing are based on threat information from the United States intelligence community. It was concluded that the oil and gas industry is a leader in security in North America. The Trans Alaska Pipeline Incident was discussed as a reminder of how costly accidents can be. Issues of concern for the future included geographic and climate issues. It was concluded that limited resources are an ongoing concern, and that the regulatory environment is becoming increasingly prescriptive. Other concerns included the threat of not taking international terrorism seriously, and open media reporting of vulnerability of critical assets, including maps. tabs., figs.

  8. Implicit attitudes towards risky and safe driving

    DEFF Research Database (Denmark)

    Martinussen, Laila Marianne; Sømhovd, Mikael Julius; Møller, Mette

    ; further, self-reports of the intention to drive safely (or not) are socially sensitive. Therefore, we examined automatic preferences towards safe and risky driving with a Go/No-go Association Task (GNAT). The results suggest that (1) implicit attitudes towards driving behavior can be measured reliably...... with the GNAT; (2) implicit attitudes towards safe driving versus towards risky driving may be separable constructs. We propose that research on driving behavior may benefit from routinely including measures of implicit cognition. A practical advantage is a lesser susceptibility to social desirability biases......, compared to self-report methods. Pending replication in future research, the apparent dissociation between implicit attitudes towards safe versus risky driving that we observed may contribute to a greater theoretical understanding of the causes of unsafe and risky driving behavior....

  9. High-Protein Diets: Are They Safe?

    Science.gov (United States)

    Healthy Lifestyle Nutrition and healthy eating Are high-protein diets safe for weight loss? Answers from Katherine ... L.D. For most healthy people, a high-protein diet generally isn't harmful, particularly when followed ...

  10. Safe delivery, Service utilization, Metekel Zone

    African Journals Online (AJOL)

    decision making power of subjects were found to have a statistically significant association with preference of safe delivery ... Studies that focused on maternal mortality and proportion of ...... Anna M, Hannekee M, Frank Odhiambo et.al. Use.

  11. The safe transport of radioactive materials

    International Nuclear Information System (INIS)

    Messenger, W. de L.M.

    1979-02-01

    The hazards of radioactive materials in transport are surveyed. The system whereby they are safely transported between nuclear establishments in the United Kingdom and overseas is outlined. Several popular misconceptions are dealt with. (author)

  12. Layered Safe Motion Planning for Autonomous Vehicles.

    Science.gov (United States)

    1995-09-01

    The major problem addressed by this research is how to plan a safe motion for autonomous vehicles in a two dimensional, rectilinear world. With given start and goal configurations, the planner performs motion planning which

  13. AFSC/REFM: Groundfish SAFE Economic Report

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Groundfish SAFE Economic Report, published annually as a supplement to the Stock Assessment and Fishery Evaluation Reports for Bering Sea and Aleutian Islands...

  14. Think Before You Ink: Are Tattoos Safe?

    Science.gov (United States)

    ... Consumers Consumer Updates Think Before You Ink: Are Tattoos Safe? Share Tweet Linkedin Pin it More sharing ... I be concerned about unsafe practices, or the tattoo ink itself? Both. While you can get serious ...

  15. Safe Eats - Eating Out and Bringing In

    Science.gov (United States)

    ... to stay safe. What's On the Menu? When dining out: Remember that harmful bacteria can be hidden ... above the "danger zone." Remember the 2-Hour Rule : Discard any perishables (foods that can spoil or ...

  16. SAFE users manual. Volume 4. Computer programs

    International Nuclear Information System (INIS)

    Grady, L.M.

    1983-06-01

    Documentation for the Safeguards Automated Facility Evaluation (SAFE) computer programs is presented. The documentation is in the form of subprogram trees, program abstracts, flowcharts, and listings. Listings are provided on microfiche

  17. Standards for safe operation of research reactors

    International Nuclear Information System (INIS)

    1996-01-01

    The safety of research reactors is based on many factors such as suitable choice of location, design and construction according to the international standards, it also depends on well trained and qualified operational staff. These standards determine the responsibilities of all who are concerned with the research reactors safe operation, and who are responsible of all related activities in all the administrative and technical stages in a way that insures the safe operation of the reactor

  18. Influencing behaviour for safe working environments

    OpenAIRE

    Boer, de, J. (Johannes); Teeuw, W.B. (Wouter)

    2011-01-01

    Safety at work The objective of the project Safety at Work is to increase safety at the workplace by applying and combining state of the art artefacts from personal protective equipment and ambient intelligence technology. In this state of the art document we focus on the developments with respect to how (persuasive) technology can help to influence behaviour in a natural, automatic way in order to make industrial environments safer. We focus on personal safety, safe environments and safe beh...

  19. Licensing issues for inherently safe fast reactors

    International Nuclear Information System (INIS)

    Kastenberg, W.E.; Lee, S.; Okrent, D.

    1986-01-01

    There has been considerable interest recently in a new generation of liquid metal reactor (LMR) concepts in the US. Some significant changes in regulatory philosophy will be required if the anticipated cost advantages of inherently safe designs are to be achieved. The defense in depth philosophy will need to be significantly re-evaluated in the context of inherently safe reactors. It is the purpose of this paper to begin such a re-evaluation of this regulatory philosophy

  20. Using smartphone technology to deliver a virtual pedestrian environment: usability and validation.

    Science.gov (United States)

    Schwebel, David C; Severson, Joan; He, Yefei

    2017-09-01

    Various programs effectively teach children to cross streets more safely, but all are labor- and cost-intensive. Recent developments in mobile phone technology offer opportunity to deliver virtual reality pedestrian environments to mobile smartphone platforms. Such an environment may offer a cost- and labor-effective strategy to teach children to cross streets safely. This study evaluated usability, feasibility, and validity of a smartphone-based virtual pedestrian environment. A total of 68 adults completed 12 virtual crossings within each of two virtual pedestrian environments, one delivered by smartphone and the other a semi-immersive kiosk virtual environment. Participants completed self-report measures of perceived realism and simulator sickness experienced in each virtual environment, plus self-reported demographic and personality characteristics. All participants followed system instructions and used the smartphone-based virtual environment without difficulty. No significant simulator sickness was reported or observed. Users rated the smartphone virtual environment as highly realistic. Convergent validity was detected, with many aspects of pedestrian behavior in the smartphone-based virtual environment matching behavior in the kiosk virtual environment. Anticipated correlations between personality and kiosk virtual reality pedestrian behavior emerged for the smartphone-based system. A smartphone-based virtual environment can be usable and valid. Future research should develop and evaluate such a training system.

  1. Security Protocols in a Nutshell

    OpenAIRE

    Toorani, Mohsen

    2016-01-01

    Security protocols are building blocks in secure communications. They deploy some security mechanisms to provide certain security services. Security protocols are considered abstract when analyzed, but they can have extra vulnerabilities when implemented. This manuscript provides a holistic study on security protocols. It reviews foundations of security protocols, taxonomy of attacks on security protocols and their implementations, and different methods and models for security analysis of pro...

  2. Curiosity's Autonomous Surface Safing Behavior Design

    Science.gov (United States)

    Neilson, Tracy A.; Manning, Robert M.

    2013-01-01

    The safing routines on all robotic deep-space vehicles are designed to put the vehicle in a power and thermally safe configuration, enabling communication with the mission operators on Earth. Achieving this goal is made a little more difficult on Curiosity because the power requirements for the core avionics and the telecommunication equipment exceed the capability of the single power source, the Multi-Mission Radioisotope Thermoelectric Generator. This drove the system design to create an operational mode, called "sleep mode", where the vehicle turns off most of the loads in order to charge the two Li-ion batteries. The system must keep the vehicle safe from over-heat and under-heat conditions, battery cell failures, under-voltage conditions, and clock failures, both while the computer is running and while the system is sleeping. The other goal of a safing routine is to communicate. On most spacecraft, this simply involves turning on the receiver and transmitter continuously. For Curiosity, Earth is above the horizon only a part of the day for direct communication to the Earth, and the orbiter overpass opportunities only occur a few times a day. The design must robustly place the Rover in a communicable condition at the correct time. This paper discusses Curiosity's autonomous safing behavior and describes how the vehicle remains power and thermally safe while sleeping, as well as a description of how the Rover communicates with the orbiters and Earth at specific times.

  3. Managing Cassini Safe Mode Attitude at Saturn

    Science.gov (United States)

    Burk, Thomas A.

    2010-01-01

    The Cassini spacecraft was launched on October 15, 1997 and arrived at Saturn on June 30, 2004. It has performed detailed observations and remote sensing of Saturn, its rings, and its satellites since that time. In the event safe mode interrupts normal orbital operations, Cassini has flight software fault protection algorithms to detect, isolate, and recover to a thermally safe and commandable attitude and then wait for further instructions from the ground. But the Saturn environment is complex, and safety hazards change depending on where Cassini is in its orbital trajectory around Saturn. Selecting an appropriate safe mode attitude that insures safe operation in the Saturn environment, including keeping the star tracker field of view clear of bright bodies, while maintaining a quiescent, commandable attitude, is a significant challenge. This paper discusses the Cassini safe table management strategy and the key criteria that must be considered, especially during low altitude flybys of Titan, in deciding what spacecraft attitude should be used in the event of safe mode.

  4. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  5. Security of Dependable Systems

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2011-01-01

    Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very...... much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security...... in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions....

  6. Security in Computer Applications

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development. The last part of the lecture covers some miscellaneous issues like the use of cryptography, rules for networking applications, and social engineering threats. This lecture was first given on Thursd...

  7. Wireshark network security

    CERN Document Server

    Verma, Piyush

    2015-01-01

    If you are network administrator or a security analyst with an interest in using Wireshark for security analysis, then this is the book for you. Basic familiarity with common network and application services terms and technologies is assumed.

  8. OverView of Space Applications for Environment (SAFE) initiative

    Science.gov (United States)

    Hamamoto, Ko; Fukuda, Toru; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi; Nukui, Tomoyuki

    2014-06-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes.

  9. Is safe surgery possible when resources are scarce?

    Science.gov (United States)

    O'Hara, Nathan N

    2015-07-01

    The greatest burden of surgical disease exists in low- and middle-income countries, where the quality and safety of surgical treatment cause major challenges. Securing necessary and appropriate medical supplies and infrastructure remains a significant and under-recognised limitation to providing safe and high-quality surgical care in these settings. The majority of surgical instruments are sold in high-income countries. Limited market pressures lead to superfluous designs and inflated costs for these devices. This context creates an opportunity for frugal innovation-the search for designs that will enable low-cost care without compromising quality. Although progressive examples of frugal surgical innovations exist, policy innovation is required to augment design pathways while fostering appropriate safety controls for prospective devices. Many low-cost, high-quality medical technologies will increase access to safe surgical care in low-income countries and have widespread applicability as all countries look to reduce the cost of providing care, without compromising quality. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  10. OverView of Space Applications for Environment (SAFE) initiative

    International Nuclear Information System (INIS)

    Hamamoto, Ko; Fukuda, Toru; Nukui, Tomoyuki; Tajima, Yoshimitsu; Takeuchi, Wataru; Sobue, Shinichi

    2014-01-01

    Climate change and human activities have a direc or indirect influence on the acceleration of environmental problems and natural hazards such as forest fires, draughts and floods in the Asia-Pacific countries. Satellite technology has become one of the key information sources in assessment, monitoring and mitigation of these disasters and related phenomenon. However, there are still gaps between science and application of satellite technology in real-world usage. Asia-Pacific Regional Space Agency Forum (APRSAF) recommended to initiate the Space Applications for Environment (SAFE) proposal providing opportunity to potential user agencies in the Asia Pacific region to develop prototype applications of satellite technology for number of key issues including forest resources management, coastal monitoring and management, agriculture and food security, water resource management and development user-friendly tools for application of satellite technology. This paper describes the overview of SAFE initiative and outcomes of two selected prototypes; agricultural drought monitoring in Indonesia and coastal management in Sri Lanka, as well as the current status of on-going prototypes

  11. Medical Information Security

    OpenAIRE

    William C. Figg, Ph.D.; Hwee Joo Kam, M.S.

    2011-01-01

    Modern medicine is facing a complex environment, not from medical technology but rather government regulations and information vulnerability. HIPPA is the government’s attempt to protect patient’s information yet this only addresses traditional record handling. The main threat is from the evolving security issues. Many medical offices and facilities have multiple areas of information security concerns. Physical security is often weak, office personnel are not always aware of security needs an...

  12. Windows Security patch required

    CERN Multimedia

    3004-01-01

    This concerns Windows PCs (XP, 2000, NT) which are NOT centrally managed at CERN for security patches, e.g. home PCs, experiment PCs, portables,... A security hole which can give full privileges on Windows systems needs to be URGENTLY patched. Details of the security hole and hotfix are at: http://cern.ch/it-div/news/hotfix-MS03-026.asp http://www.microsoft.com/technet/security/bulletin/MS03-026.asp

  13. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  14. Security system signal supervision

    International Nuclear Information System (INIS)

    Chritton, M.R.; Matter, J.C.

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs

  15. Android application security essentials

    CERN Document Server

    Rai, Pragati

    2013-01-01

    Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way.If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.

  16. Finance/security/life.

    OpenAIRE

    Langley, P.

    2017-01-01

    What is the contemporary relation between finance and security? This essay encourages further research into the securitization of finance by developing the notion of ‘finance/security/life’. A focus on the intersections of finance/security/life will be shown to prompt a broadened range of critical, cross-disciplinary concerns with the various ways in which financial markets are positioned as vital to securing wealth, welfare and wellbeing.

  17. Electronic healthcare information security

    CERN Document Server

    Dube, Kudakwashe; Shoniregun, Charles A

    2010-01-01

    The ever-increasing healthcare expenditure and pressing demand for improved quality and efficiency of patient care services are driving innovation in healthcare information management. The domain of healthcare has become a challenging testing ground for information security due to the complex nature of healthcare information and individual privacy. ""Electronic Healthcare Information Security"" explores the challenges of e-healthcare information and security policy technologies. It evaluates the effectiveness of security and privacy implementation systems for anonymization methods and techniqu

  18. Hybrid Security Policies

    Directory of Open Access Journals (Sweden)

    Radu CONSTANTINESCU

    2006-01-01

    Full Text Available Policy is defined as the rules and regulations set by the organization. They are laid down by management in compliance with industry regulations, law and internal decisions. Policies are mandatory. Security policies rules how the information is protected against security vulnerabilities and they are the basis for security awareness, training and vital for security audits. Policies are focused on desired results. The means of achieving the goals are defined on controls, standards and procedures.

  19. Mobile platform security

    CERN Document Server

    Asokan, N; Dmitrienko, Alexandra

    2013-01-01

    Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrat

  20. Nuclear Technologies Secure Food For Future

    International Nuclear Information System (INIS)

    2012-01-01

    use of such techniques to protect plants and animals against disease and pests means many more farmers can produce enough food to feed their own families and to sell on markets. Ultimately, fewer people go hungry. The IAEA collaborates with the United Nations Food and Agriculture Organization (FAO) in providing support through a joint division in Vienna. ''While our profile is modest, the size of our footprint is significant,'' said Qu Liang, Director of the Joint FAO/IAEA Division of Nuclear Techniques. ''We are putting the benefits of tried and tested nuclear technologies into the hands of farmers, particularly small producers in poorer countries, to improve their food security and livelihood.'' ''The assistance is driven by advanced technologies,'' Liang added. ''But what we are delivering has to be appropriate to farmers' needs. That means crops that can flourish in changing and often harsher conditions, pest control without a chemical legacy and protection for livestock.'' The Scientific Forum will be opened by the IAEA Director General and ministers from Indonesia, Kenya and Vietnam. FAO Director General Graziano da Silva will deliver a video address. The Forum will address IAEA activities in the fields of food production, food protection and food safety. Each session features a panel of experts who will present and discuss the benefits of nuclear techniques in food and agriculture. A moderator will guide the discussions. (IAEA)

  1. EMI Security Architecture

    CERN Document Server

    White, J.; Schuller, B.; Qiang, W.; Groep, D.; Koeroo, O.; Salle, M.; Sustr, Z.; Kouril, D.; Millar, P.; Benedyczak, K.; Ceccanti, A.; Leinen, S.; Tschopp, V.; Fuhrmann, P.; Heyman, E.; Konstantinov, A.

    2013-01-01

    This document describes the various architectures of the three middlewares that comprise the EMI software stack. It also outlines the common efforts in the security area that allow interoperability between these middlewares. The assessment of the EMI Security presented in this document was performed internally by members of the Security Area of the EMI project.

  2. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  3. Selecting Security Technology Providers

    Science.gov (United States)

    Schneider, Tod

    2009-01-01

    The world of security technology holds great promise, but it is fraught with opportunities for expensive missteps and misapplications. The quality of the security technology consultants and system integrators one uses will have a direct bearing on how well his school masters this complex subject. Security technology consultants help determine…

  4. Microsoft Azure security

    CERN Document Server

    Freato, Roberto

    2015-01-01

    This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.

  5. Operations Security (OPSEC) Guide

    Science.gov (United States)

    2011-04-01

    Request for Proposal TAC Threat Analysis Center TECHINT Technical Intelligence TMAP Telecommunications Monitoring and Assessment Program TTP...communications security, use of secure telephones, and a robust Telecommunications Monitoring and Assessment Program ( TMAP ) prevents undetermined...and AFI 33-219, Telecommunications Monitoring and Assessment Program ( TMAP ), or Information Assurance (IA) or Communications Security (COMSEC

  6. SOCIAL MEDIA SECURITY

    Science.gov (United States)

    RESPONSIBILITY CENTCOM COALITION MEDIA SOCIAL MEDIA NEWS ARTICLES PRESS RELEASES IMAGERY VIDEOS TRANSCRIPTS VISITORS AND PERSONNEL FAMILY CENTER FAMILY READINESS CENTCOM WEBMAIL SOCIAL MEDIA SECURITY ACCOUNTABILITY HomeVISITORS AND PERSONNELSOCIAL MEDIA SECURITY FAQ on Security for Social Media Due to the widespread use of

  7. Mobile communication security

    NARCIS (Netherlands)

    Broek, F.M.J. van den

    2016-01-01

    Security of the mobile network Fabian van den Broek We looked at the security of the wireless connection between mobile phone and cell towers and suggested possible improvements. The security was analysed on a design level, by looking at the protocols and encryption techniques, but also on an

  8. Learning Puppet security

    CERN Document Server

    Slagle, Jason

    2015-01-01

    If you are a security professional whose workload is increasing, or a Puppet professional looking to increase your knowledge of security, or even an experienced systems administrator, then this book is for you. This book will take you to the next level of security automation using Puppet. The book requires no prior knowledge of Puppet to get started.

  9. Refelctions on the security

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2013-07-01

    Full Text Available In this paper are presented the author‘s reflections about concept meaning of the security, about his systemic perception and actual scientific access to the security research. The author presented securitology paradigm for valuation security optional reference object.

  10. Deterrence and the New Global Security Environment - Lecture note

    International Nuclear Information System (INIS)

    Sitt, Bernard

    2006-01-01

    This lecture note makes an analysis of a collective publication entitled 'Deterrence and the New Global Security Environment', edited by Ian Kenyon and John Simpson (Routledge, New York, 2006). This collection of papers rigorously examines the current place of deterrence in international security relations, delivering the best of contemporary thinking. This is a special issue of the leading journal 'Contemporary Security Policy'. The present Lecture note emphasises a particular deterrence situation mentioned in this publication which is the one involving terrorist actors

  11. Security engineering: Phisical security measures for high-risk personnel

    Directory of Open Access Journals (Sweden)

    Jelena S. Cice

    2013-06-01

    terrorist or criminal targets based on their grade, assignment, symbolic value, criticality, and threat and vulnerability assessment. Levels of protection The recommendations contained in this criterion are intended to minimize the possibility of HRP casualties in buildings or portions of buildings in which they work and live. These recommendations provide appropriate and implementable measures to establish a level of protection against terrorist attacks where no known threat of terrorist activity currently exists. While complete protection against all potential threats is cost prohibitive, the intent of these recommendations can be achieved through prudent master planning, real estate acquisition, and design and construction practices. Tag number The tag number at the beginning of each physical security measure (recommendation is unique and is intended to be a communication aid when linking the requirement (recommendation to the supporting text or commentary. The three-character tag number uses the following legend. Tag Number First Character -The first character is an abbreviation for the defense zone layer that is most applicable for the countermeasure. “S” is used to represent site or external zone issues. “P” is used to represent the perimeter zone. “G” is used to represent issues relative to the property grounds. “E” is used to represent issues associated with the building exterior of the HRP office or residence. “I” is used to represent issues associated with the building interior. “H” is used to represent issues associated with the safe room or safe haven. Tag Number Second Character - The second character is a sequential number for countermeasures in a given zone - a requirement or a recommendation. This number ensures a unique tag number. Tag Number Third Character- The third character indicates whether the countermeasure is applicable to offices, residences, or both (common. “O” indicates a requirement or recommendation unique to

  12. Practices on nuclear security and international cooperation

    International Nuclear Information System (INIS)

    Shen Ning

    2009-01-01

    Full text: Nuclear terrorism has been a great threat against the safety and security of the world. It has been reached the consensus by international community to strengthen the nuclear security regime to protect the nuclear and other radiological materials and related facilities. Protection of the security of nuclear and other radiological materials in use, storage and transport and related facilities is always a important issue faced by each country and it depends on the technologies, funds and human resources can be utilized. As nuclear technology has been widely used in different area, China competent authorities have issued a series of regulations, implementation rules and guidelines on security of nuclear and radioactive materials and related facilities. China supports and has taken an active part in the international efforts to strengthen the international nuclear security regime to combat nuclear terrorism. China has paid great importance on international cooperations on nuclear security with IAEA and other countries. More than 10 various national workshops and training courses on nuclear security and physical protection were delivered per year, which provided a communication platform for Chinese facility operators and managers to know the international technology-development and share the research achievements. In cooperation with the IAEA, China has held a great number of regional and national training courses on physical protection and nuclear security since 1998. Different types of training, such as training on awareness, Design Basis Threat (DBT), physical security system design, equipments operation and vulnerability analysis, benefited the administrators, facility operators, engineers and technical staff in charge of physical security system design, operation and maintenance from China and regional countries. Under the framework of the bilateral agreement on Peaceful Use of Nuclear Technology (PUNT), China and U.S. jointly conducted a Technical Demo

  13. Core software security security at the source

    CERN Document Server

    Ransome, James

    2013-01-01

    First and foremost, Ransome and Misra have made an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. This book clarifies to executives the decisions to be made on software security and then provides guidance to managers and developers on process and procedure. Readers are armed with firm solutions for the fight against cyber threats.-Dr. Dena Haritos Tsamitis. Carnegie Mellon UniversityIn the wake of cloud computing and mobile apps, the issue of software security has never been more importan

  14. Implementing AORN recommended practices for a safe environment of care, part II.

    Science.gov (United States)

    Kennedy, Lynne

    2014-09-01

    Construction in and around a working perioperative suite is a challenge beyond merely managing traffic patterns and maintaining the sterile field. The AORN "Recommended practices for a safe environment of care, part II" provides guidance on building design; movement of patients, personnel, supplies, and equipment; environmental controls; safety and security; and control of noise and distractions. Whether the OR suite evolves through construction, reconstruction, or remodeling, a multidisciplinary team of construction experts and health care professionals should create a functional plan and communicate at every stage of the project to maintain a safe environment and achieve a well-designed outcome. Emergency preparedness, a facility-wide security plan, and minimization of noise and distractions in the OR also help enhance the safety of the perioperative environment. Copyright © 2014 AORN, Inc. Published by Elsevier Inc. All rights reserved.

  15. Oral microflora in infants delivered vaginally and by caesarean section

    DEFF Research Database (Denmark)

    Nelun Barfod, Mette; Magnusson, Kerstin; Lexner, Michala Oron

    2011-01-01

    International Journal of Paediatric Dentistry 2011 Background. Early in life, vaginally delivered infants exhibit a different composition of the gut flora compared with infants delivered by caesarean section (C-section); however, it is unclear whether this also applies to the oral cavity. Aim....... To investigate and compare the oral microbial profile between infants delivered vaginally and by C-section. Design. This is a cross-sectional case-control study. Eighty-four infants delivered either vaginally (n = 42) or by C-section (n = 42) were randomly selected from the 2009 birth cohort at the County...

  16. Hi-g lithium thionyl chloride flat cells for artillery/air delivered expendables. Quarterly report no. 1, 10 October 31-December 1980

    Energy Technology Data Exchange (ETDEWEB)

    Snuggerud, D.; Surprenant, J.; Waterhouse, R.

    1981-05-01

    Rate capability studies on small prototype cells showed that single anode designs should be adequate for Hi-G rate specifications. Large prototype cells safely delivered 1.6 amps for 6 hours. Design work was begun on seal structures to withstand extreme g forces.

  17. Waste Issues Associated with the Safe Movement of Hazardous Chemicals

    International Nuclear Information System (INIS)

    Dare, J. H.; Cournoyer, M. E.

    2002-01-01

    Moving hazardous chemicals presents the risk of exposure for workers engaged in the activity and others that might be in the immediate area. Adverse affects are specific to the chemicals and can range from minor skin, eye, or mucous membrane irritation, to burns, respiratory distress, nervous system dysfunction, or even death. A case study is presented where in the interest of waste minimization; original shipping packaging was removed from a glass bottle of nitric acid, while moving corrosive liquid through a security protocol into a Radiological Control Area (RCA). During the transfer, the glass bottle broke. The resulting release of nitric acid possibly exposed 12 employees with one employee being admitted overnight at a hospital for observation. This is a clear example of administrative controls to reduce the generation of suspect radioactive waste being implemented at the expense of employee health. As a result of this event, material handling procedures that assure the safe movement of hazardous chemicals through a security protocol into a radiological control area were developed. Specifically, hazardous material must be transferred using original shipping containers and packaging. While this represents the potential to increase the generation of suspect radioactive waste in a radiological controlled area, arguments are presented that justify this change. Security protocols for accidental releases are also discussed. In summary, the 12th rule of ''Green Chemistry'' (Inherently Safer Chemistry for Accident Prevention) should be followed: the form of a substance used in a chemical process (Movement of Hazardous Chemicals) should be chosen to minimize the potential for chemical accidents, including releases

  18. Waste Issues Associated with the Safe Movement of Hazardous Chemicals

    Energy Technology Data Exchange (ETDEWEB)

    Dare, J. H.; Cournoyer, M. E.

    2002-02-26

    Moving hazardous chemicals presents the risk of exposure for workers engaged in the activity and others that might be in the immediate area. Adverse affects are specific to the chemicals and can range from minor skin, eye, or mucous membrane irritation, to burns, respiratory distress, nervous system dysfunction, or even death. A case study is presented where in the interest of waste minimization; original shipping packaging was removed from a glass bottle of nitric acid, while moving corrosive liquid through a security protocol into a Radiological Control Area (RCA). During the transfer, the glass bottle broke. The resulting release of nitric acid possibly exposed 12 employees with one employee being admitted overnight at a hospital for observation. This is a clear example of administrative controls to reduce the generation of suspect radioactive waste being implemented at the expense of employee health. As a result of this event, material handling procedures that assure the safe movement of hazardous chemicals through a security protocol into a radiological control area were developed. Specifically, hazardous material must be transferred using original shipping containers and packaging. While this represents the potential to increase the generation of suspect radioactive waste in a radiological controlled area, arguments are presented that justify this change. Security protocols for accidental releases are also discussed. In summary, the 12th rule of ''Green Chemistry'' (Inherently Safer Chemistry for Accident Prevention) should be followed: the form of a substance used in a chemical process (Movement of Hazardous Chemicals) should be chosen to minimize the potential for chemical accidents, including releases.

  19. Modelling the System of Ensuring the Investment Security

    Directory of Open Access Journals (Sweden)

    Moroz Maxim O.

    2017-11-01

    Full Text Available The article explores approaches to modelling the system of ensuring the investment security. Necessity of observance of investment security of Ukraine has been substantiated. The author’s own vision of the modelling essentials has been provided. The eligibility for consideration of the system of ensuring the investment security of Ukraine in the functional, structural, process, formative, and factor aspects has been proved. The target setting and tasks of a functional model of the system of ensuring the investment security have been defined. The functions, subjects, organizational-economic mechanisms of the system of ensuring the investment security of Ukraine have been characterized. A structural model of the system of ensuring the investment security has been presented. Special attention has been given to the definition of objects of direct and indirect influence, control and controlled subsystems, aggregate of indicators, safe levels, principles of formation of the investment security system. The process and formative models of the system of ensuring the investment security, as well as the algorithm of the complex assessment of the level of investment security, were analyzed in detail. Measures to ensure the investment security of Ukraine have been defined.

  20. The Theoretical Aspects of the Security of Human Development

    Directory of Open Access Journals (Sweden)

    Markova Natalia S.

    2017-10-01

    Full Text Available The article is aimed at substantiating the basic categories of the conception of security of human development and formation of a definition of the concept of «security of human development» that would provide the most comprehensive understanding of the nature of this process. The main approaches to researching the phenomenon of «security» were analyzed. Characteristics of the formation of human security as part of a holistic paradigm of human development were considered together with rethinking it as a new theory of global security. A cross-categorical analysis of the concepts of «human development» and of «human security» was carried out by the main criteria: characteristics, time frames, main purpose and objectives. As a result, the human security is complementary to the concept of human development in the part of safe variants of choice (freedom from needs; it further facilitated the security provision at the level of prosperity and progress, not at the level of survival. It has been determined that the conception of human security is at the same time an element of the conception of human development as well as of human security.