WorldWideScience

Sample records for energy security issues

  1. Energy security issues at household level in India

    International Nuclear Information System (INIS)

    Jain, Garima

    2010-01-01

    Energy security at the household level implies ensuring assured and regular supply of clean energy fuels at an affordable price for various household activities. Threat to physical availability of clean energy fuels for cooking and lighting is determined through various indicators such as dependence on traditional fuels and limited access to clean fuels. Energy insecurity translates into various adverse social impacts. Financial threat to energy security is indicated by expenses incurred on energy fuels and affordability of clean fuels. Households spend a major portion of their income on acquiring energy fuels; however, due to high price of clean fuels, they continue to depend on traditional and inefficient fuels. There is an urgent need to address factors that pose a threat to energy security at the household level. In this regard, measures taken by the government agencies and other institutions are also reviewed. The paper also suggests the regulatory and policy interventions required to address the energy security issues at the household level.

  2. Emerging Regional Energy Security Issues China

    Science.gov (United States)

    2009-09-29

    moving toward European standards and taxation of least efficient vehicles www.csis.org | 7 China’s Energy Strategy - Clean Power Generation...Project Type of Contract Signature Date Estimated Value Contractor(s) Remarks Malaysian Amona (Main Contractor), Chinese COSL and CNOOC The first...infrastructure. List of Upstream Agreements Between Iran and China in Recent Years ** The original buyback contract w as signed betw een Malaysian Amona and

  3. Security issues at the Department of Energy and records management

    International Nuclear Information System (INIS)

    NUSBAUM, ANNA W.

    2000-01-01

    In order to discuss the connection between security issues within the Department of Energy and records management, the author covers a bit of security history and talks about what she calls ''the Amazing Project''. Initiated in late May 1999, it was to be a tri-laboratory (Lawrence Livermore National Laboratory of Livermore, California, Los Alamos National Laboratory of Los Alamos, New Mexico, and Sandia National Laboratories of Albuquerque, New Mexico, and Livermore, California) project. The team that formed was tasked to develop the best set of security solutions that still enabled weapon mission work to get done and the security solutions were to be the same set for everyone. The amazing project was called ''The Integrated Security Management Project'', or ''ISecM' for short. She'll describe why she thinks this project was so amazing and what it accomplished. There's a bit of sad news about the project, but then she'll move onto discuss what was learned at Sandia as a result of the project and what they're currently doing in records management

  4. Achieving a secure energy future: Environmental and economic issues

    International Nuclear Information System (INIS)

    Pimentel, David; Herdendorf, M.; Eisenfeld, S.

    1994-01-01

    Energy, economics, and the environment are interdependent. Land, water, atmospheric, and biological resources are being degraded by current high energy consumption. U.S. energy consumption is the highest in the world and the U.S. Department of Energy reports that the United States has only about 10 years of known and potentially discoverable oil reserves. The U.S. should reduce its energy consumption by one half to help restore the quality of the environment while improving the American standard of living by strengthening the economy and increasing the number of jobs. Because of the interdependence of energy, economics, and the environment, energy efficiency and transition to renewable energy sources are critical. An estimated 40% of current energy consumption could be produced employing solar energy technologies, but would require about 20% of total U.S. land area. Therefore, the development of solar energy technologies to substitute for fossil energy is projected to compete for land required for agriculture and forestry as well as have other environmental impacts

  5. Germany and energy security in the 2000s. Rise and fall of a policy issue?

    International Nuclear Information System (INIS)

    Duffield, John S.

    2009-01-01

    After some two decades of inattention, the issue of energy security once again moved to the top of the policy agenda in Germany in the mid-2000s. After briefly achieving renewed prominence, however, it was eclipsed in German energy policy, at least temporarily, by heightened concerns about climate change. This paper explains the re-emergence of concerns about energy insecurity in recent years as well as the reasons for their subsequent overshadowing. It describes and explains the steps that have been taken during this period to promote German energy security and analyzes their adequacy. The paper identifies a number of reasons to be skeptical about how much the agreed policies will improve Germany's energy security, but it concludes that there are nevertheless good reasons to expect the issue to regain the attention of policy-makers in the future. (author)

  6. Germany and energy security in the 2000s. Rise and fall of a policy issue?

    Energy Technology Data Exchange (ETDEWEB)

    Duffield, John S. [Department of Political Science, Georgia State University, Atlanta, GA 30303 (United States)

    2009-11-15

    After some two decades of inattention, the issue of energy security once again moved to the top of the policy agenda in Germany in the mid-2000s. After briefly achieving renewed prominence, however, it was eclipsed in German energy policy, at least temporarily, by heightened concerns about climate change. This paper explains the re-emergence of concerns about energy insecurity in recent years as well as the reasons for their subsequent overshadowing. It describes and explains the steps that have been taken during this period to promote German energy security and analyzes their adequacy. The paper identifies a number of reasons to be skeptical about how much the agreed policies will improve Germany's energy security, but it concludes that there are nevertheless good reasons to expect the issue to regain the attention of policy-makers in the future. (author)

  7. Germany and energy security in the 2000s: Rise and fall of a policy issue?

    Energy Technology Data Exchange (ETDEWEB)

    Duffield, John S., E-mail: duffield@gsu.ed [Department of Political Science, Georgia State University, Atlanta, GA 30303 (United States)

    2009-11-15

    After some two decades of inattention, the issue of energy security once again moved to the top of the policy agenda in Germany in the mid-2000s. After briefly achieving renewed prominence, however, it was eclipsed in German energy policy, at least temporarily, by heightened concerns about climate change. This paper explains the re-emergence of concerns about energy insecurity in recent years as well as the reasons for their subsequent overshadowing. It describes and explains the steps that have been taken during this period to promote German energy security and analyzes their adequacy. The paper identifies a number of reasons to be skeptical about how much the agreed policies will improve Germany's energy security, but it concludes that there are nevertheless good reasons to expect the issue to regain the attention of policy-makers in the future.

  8. Addressing 2030 EU policy framework for energy and climate: Cost, risk and energy security issues

    International Nuclear Information System (INIS)

    Llano-Paz, Fernando de; Martínez Fernandez, Paulino; Soares, Isabel

    2016-01-01

    The different energy sources, their costs and impacts on the environment determine the electricity production process. Energy planning must solve the existence of uncertainty through the diversification of power generation technologies portfolio. The European Union energy and environmental policy has been mainly based on promoting the security of supply, efficiency, energy savings and the promotion of Renewable Energy Sources. The recent European Commission communication “Towards an European Energy Union: A secure, sustainable, competitive and affordable energy for every European” establishes the path for the European future. This study deals with the analysis of the latest EU “Energy Union” goals through the application of Markowitz portfolio theory considering technological real assets. The EU targets are assessed under a double perspective: economic and environmental. The model concludes that implementing a high share of Renewable Energy target in the design of European Policies is not relevant: the maximization of Renewable Energy share could be achieved considering a sole Low Emissions of carbon dioxide policy. Additionally it is confirmed the need of Nuclear energy in 2030: a zero nuclear energy share in 2030 European Mix is not possible, unless the technological limits participation for Renewable Energy Sources were increased. - Highlights: • Implementing a high RES share target in European Policies could not be relevant. • Maximizing RES share could be achieved considering a sole Low Emissions policy. • The EU 2030 Nuclear energy 50% shutting down could be feasible. • Minimizing risk portfolio presents high diversification and energy security levels.

  9. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  10. Global energy issues and Swedish security policy; Globala energifraagor och svensk saekerhetspolitik

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    An important part of the Swedish Energy Agency's world surveillance is to identify trends that may affect Sweden's security of energy supply. Sweden can not be considered in isolation with its own energy supply, but is affected much by what happens if the global energy flows are disturbed by conflicts or weather-related events. Several different policy areas influence the energy markets, in addition to the energy and environmental policy. Geopolitical events of the last few years have more and more focused on power over energy resources. To get a comprehensive picture of the global energy situation, the Agency has engaged the Royal Military Sciences to produce a report that describes the 'Global Energy Issues and Swedish Security Policy'. The report's starting point is to describe how global events affect European and Swedish energy supply and security policy. Descriptions and analysis in the report are the authors own conclusions and need not always be the Agency's official views. The political environment that the report deals with is constantly changing, why some facts and circumstances may have changed since the report was completed. During the final preparation of the report, the scene changed in Moscow. On May 8, Vladimir Putin once again was appointed a position as Russia's president. The former president Medvedev, at the same time, takes over as Prime Minister.

  11. Regional growth and energy supply: Is there an energy security issue?

    Energy Technology Data Exchange (ETDEWEB)

    Roop, J.M.; Freund, K.A.; Godoy-Kain, P.; Gu, A.Y.; Johnson, A.K.; Paananen, O.H.; Woodruff, M.G.

    1996-12-01

    This study examines how the growth of the developing world might affect energy markets in the future. Based on recent growth trends, world energy demand could reasonably be expected to grow from about 350 Exajoules (EJ: 1.0E18=0.95 Quad) to nearly 1025 EJ by the year 2020, nearly 3x current consumption estimates. Introduction of more energy-efficient technologies could reduce this growth by about 17% to 830 EJ. But one cannot rely exclusively on current trends to forecast future energy demand. The growth of the developing world will interact with supply to affect prices, which in turn will mitigate the growth of demand, and growth rates of energy use will be much more modes. Under the Business as Usual scenario, energy demand will grow to 835 EJ by 2020, and this could be reduced a further 15% to 714 EJ through the adoption of more energy efficient technologies. Fuel prices based on model results are analyzed. Energy security implications of rapid growth in the developing world are considered and found to be of likely little significance.

  12. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2007-01-01

    Why this book on the Physics of Societal Issues? The subdivisions of physics - nuclear physics, particle physics, condensed-matter physics, biophysics - have their textbooks, while the subdivision of physics and society lacks an equation-oriented text on the physics of arms, energy and the environment. Physics of Societal Issues is intended for undergraduate and doctoral students who may work on applied topics, or who simply want to know why things are the way they are. Decisions guiding policies on nuclear arms, energy and the environment often seem mysterious and contradictory. What is the science behind the deployment of MIRVed ICBMs, the quest for space-based beam weapons, the fear of powerline EM fields, the wholesale acceptance of SUVs, the issues of climactic change, and the failure of the pre-embargo market to produce buildings and appliances that now save over 50 power plants? Physics of Societal Issues is three "mini-texts" in one: National Security (5 chapters): Weapons, offense, defense, verificat...

  13. Energy audit and energy security

    Directory of Open Access Journals (Sweden)

    Beata Agnieszka Kulessa

    2013-07-01

    Full Text Available In article, we present the issue of energy security. This article to answer the questions concerning the future of energy in Poland. These activities are directly related to energy security and the reduction of CO2 emissions. One element of this plan is the introduction in the EU energy certification of buildings. The energy certificates in Poland launched on 01.01.2009 and implements the objectives adopted by the European Union and contribute to energy security, increasing energy efficiency in construction and environmental protection.

  14. Physics of societal issues calculations on national security, environment, and energy

    CERN Document Server

    Hafemeister, David

    2014-01-01

    This book provides the reader with essential tools needed to analyze complex societal issues and demonstrates the transition from physics to modern-day laws and treaties. This second edition features new equation-oriented material and extensive data sets drawing upon current information from experts in their fields. Problems to challenge the reader and extend discussion are presented on three timely issues:   •        National Security: Weapons, Offense, Defense, Verification, Nuclear Proliferation, Terrorism •        Environment: Air/Water, Nuclear, Climate Change, EM Fields/Epidemiology •        Energy: Current Energy Situation, Buildings, Solar Buildings, Renewable  Energy, Enhanced End-Use Efficiency, Transportation, Economics   Praise for the first edition: "This insight is needed in Congress and the Executive Branch. Hafemeister, a former Congressional fellow with wide Washington experience, has written a book for physicists, chemists and engineers who want to learn science...

  15. Energy security in Yemen

    International Nuclear Information System (INIS)

    Torosyan, Emil

    2009-09-01

    Yemen, situated in the Arab world, has considerable energy resources. However, its history of repeated revolts, civil wars and terrorism and also the presence of the Wahabi movement and al Qaeda in the country constitute security issues for the energy industry and its infrastructure. The aim of this paper is to assess the impact level on the security of the energy sector in Yemen and the effect that the threats to that sector could have on global energy security. Analyses of the political environment, the security threats and the measures taken to respond to these threats have been carried out. Results showed that Yemen's resources are depleting and that the government is having trouble containing the escalation of conflicts; this situation could lead to Yemen's political collapse which could have an important impact on global energy security.

  16. CLOUD COMPUTING SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    Florin OGIGAU-NEAMTIU

    2012-01-01

    Full Text Available The term “cloud computing” has been in the spotlights of IT specialists the last years because of its potential to transform this industry. The promised benefits have determined companies to invest great sums of money in researching and developing this domain and great steps have been made towards implementing this technology. Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. The reality is that cloud computing has simplified some technical aspects of building computer systems, but the myriad challenges facing IT environment still remain. Organizations which consider adopting cloud based services must also understand the many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”.

  17. The issue of energy security in relations between the European Union and Azerbaijan

    Directory of Open Access Journals (Sweden)

    O V Shabelnikova

    2014-12-01

    Full Text Available The article focuses on cooperation between the European Union and the Republic of Azerbaijan on energy issues. The author analyzes the EU initiatives and projects for the Black Sea and Caspian Sea region as well as the questions of delivery diversification of the Azerbaijani gas to the European markets.

  18. Energy supply, its demand and security issues for developed and emerging economies

    International Nuclear Information System (INIS)

    Asif, M.; Muneer, T.

    2007-01-01

    Energy is inevitable for human life and a secure and accessible supply of energy is crucial for the sustainability of modern societies. Continuation of the use of fossil fuels is set to face multiple challenges: depletion of fossil fuel reserves, global warming and other environmental concerns, geopolitical and military conflicts and of late, continued and significant fuel price rise. These problems indicate an unsustainable situation. Renewable energy is the solution to the growing energy challenges. Renewable energy resources such as solar, wind, biomass, and wave and tidal energy, are abundant, inexhaustible and environmentally friendly. This article provides an overview of the current and projected energy scene. Five countries, that presently have a significant impact on global energy situation, have been studied in this work. These include China, India, Russia, UK and USA. Together the present energy budget of these countries is roughly half that of the globe. Four of the above five countries that are discussed in this work - China, India, UK and USA are all net importers of energy and are heavily dependent on imports of fuel to sustain their energy demands. Their respective local oil reserves will only last 9, 6, 7 and 4 years, respectively. China, the emerging economy in the world, is however making exemplary development in renewable energy - in 2004 renewable energy in China grew by 25% against 7-9% growth in electricity demand. While in the same year, wind energy in China saw a growth of 35%. China is also leading the global solar thermal market as it has already installed solar collectors over 65 million square meters, accounting for more than 40% of the world's total collector area. This article quantifies the period of exhaustion of the current major energy sources, i.e. coal, oil, gas and nuclear fissile material. Projected demand for energy is also presented and a feasibility of switch over to renewable energy is discussed. The article also presents

  19. Mitigating Docker Security Issues

    OpenAIRE

    Yasrab, Robail

    2018-01-01

    It is very easy to run applications in Docker. Docker offers an ecosystem that offers a platform for application packaging, distributing and managing within containers. However, Docker platform is yet not matured. Presently, Docker is less secured as compare to virtual machines (VM) and most of the other cloud technologies. The key of reason of Docker inadequate security protocols is containers sharing of Linux kernel, which can lead to risk of privileged escalations. This research is going t...

  20. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  1. Energy the security of supply in question. Combating global warming: what role for nuclear power. Warning issued by the International Energy Agency

    Energy Technology Data Exchange (ETDEWEB)

    Montbrial, T. de [Areva, Paris (France); Moore, P. [Greenspirit Strategies Ltd, Vancouver (Canada); Cambell, N. [Greenpeace (Canada)

    2007-07-01

    This issue of Alternatives newsletter put the question of energy supplies security. The unequal distribution of the world's energy resources raises the problem of energy independence and the security of supply. This question is particularly pertinent for Europe which, along with the Far East, possesses only a meager share of the planet's store of fossil fuels. Europe must learn how to live with its energy dependency, knowing that independence is an unrealistic objective in a world built on the interdependence of trade. The world's energy system is vulnerable to disruptions in supply and to geopolitical tensions. Given this context of instability, how can the security of supply and energy independence be increased? The challenge for western countries with few fossil fuel resources is to secure reliable supply while reducing energy dependency. One solution consists in diversifying power generation sources to lower dependency on oil and gas. The nuclear question is analyzed through the different point of views of Greenpeace and Greenspirit Strategies. Greenpeace refuses even the slightest involvement of nuclear power and considers that energy efficiency and renewable technologies are the only solution to both global warming and energy questions. On the other hand, Greenspirit Strategies sees nuclear power, combined with increased efforts to develop renewable energies, playing an essential role in the sustainable production of electricity. A last article devoted to the World Energy Outlook 2006 - the report published by the International Energy Agency - presents the hypotheses advanced by the Agency regarding future energy supply and its recommendations for counteracting a scenario for 2030 that is, to say the least, very alarming.

  2. Energy the security of supply in question. Combating global warming: what role for nuclear power. Warning issued by the International Energy Agency

    International Nuclear Information System (INIS)

    Montbrial, T. de; Moore, P.; Cambell, N.

    2007-01-01

    This issue of Alternatives newsletter put the question of energy supplies security. The unequal distribution of the world's energy resources raises the problem of energy independence and the security of supply. This question is particularly pertinent for Europe which, along with the Far East, possesses only a meager share of the planet's store of fossil fuels. Europe must learn how to live with its energy dependency, knowing that independence is an unrealistic objective in a world built on the interdependence of trade. The world's energy system is vulnerable to disruptions in supply and to geopolitical tensions. Given this context of instability, how can the security of supply and energy independence be increased? The challenge for western countries with few fossil fuel resources is to secure reliable supply while reducing energy dependency. One solution consists in diversifying power generation sources to lower dependency on oil and gas. The nuclear question is analyzed through the different point of views of Greenpeace and Greenspirit Strategies. Greenpeace refuses even the slightest involvement of nuclear power and considers that energy efficiency and renewable technologies are the only solution to both global warming and energy questions. On the other hand, Greenspirit Strategies sees nuclear power, combined with increased efforts to develop renewable energies, playing an essential role in the sustainable production of electricity. A last article devoted to the World Energy Outlook 2006 - the report published by the International Energy Agency - presents the hypotheses advanced by the Agency regarding future energy supply and its recommendations for counteracting a scenario for 2030 that is, to say the least, very alarming

  3. Energy systems security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Energy Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to electricity transmission grids and their protection, risk assessment of energy systems, analysis of interdependent energy networks. Methods to manage electricity transmission disturbances so as to avoid blackouts are discussed, and self-healing energy system and a nano-enabled power source are presented.

  4. Public Policy Issues in Transport. Taxes and standards for energy security and greenhouse gas objectives

    Energy Technology Data Exchange (ETDEWEB)

    Eskeland, Gunnar (Cicero, Oslo (Norway))

    2008-07-01

    The direct case for fuel economy standards on a stand alone basis dies in the textbook on the basis of first principles: the fuel tax is a better targeted instrument. In practice, the fuel economy standard, is killed by the 'rebound effect'. Vehicle users will, once they have more fuel efficient vehicles, respond to lower marginal costs by increased vehicle use. If an important part of negative externalities from transport are associated with vehicle kilometres (accidents, congestion, road wear) rather than fuel consumption, the rebound effect increases negative externalities from transport. The more direct way of addressing negative externalities from transport is to increase fuel taxes, and depending on their prior level, this is our first recommendation. But higher fuel taxes often raise political resistance. The fuel efficiency of existing cars is an important way by which people have adapted to present fuel taxes, determining their resistance to increases. A higher fuel efficiency standard is an instrument that faces little political resistance and which - over time - reduces the political resistance to increased fuel taxes. In efforts to reduce the fuel intensity of an economy, this interplay between an activity's fuel intensity, like gallons per vehicle mile, and the activity level, vehicle miles travelled or transported, nicely illustrates some important empirical questions and public policy issues: i) the first best policy proposition to reduce fuel related externalities is fuel taxes. Indeed, at the right level of fuel taxes, the externalities are zero: they are internalized. ii) the part of an economy's ability to shed fuel consumption lies in increased fuel efficiency in the individual activities, and this part can be stimulated with fuel efficiency standards. The other part, the activity level, should then be addressed with fuel tax increases. iv) We speculate that it may be difficult credibly to raise expected fuel taxes more than

  5. Cloud Computing Security Issue: Survey

    Science.gov (United States)

    Kamal, Shailza; Kaur, Rajpreet

    2011-12-01

    Cloud computing is the growing field in IT industry since 2007 proposed by IBM. Another company like Google, Amazon, and Microsoft provides further products to cloud computing. The cloud computing is the internet based computing that shared recourses, information on demand. It provides the services like SaaS, IaaS and PaaS. The services and recourses are shared by virtualization that run multiple operation applications on cloud computing. This discussion gives the survey on the challenges on security issues during cloud computing and describes some standards and protocols that presents how security can be managed.

  6. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  7. Incentive Issues in Information Security Management

    Science.gov (United States)

    Lee, Chul Ho

    2012-01-01

    This dissertation studies three incentive issues in information security management. The first essay studies contract issues between a firm that outsources security functions and a managed security service provider (MSSP) that provides security functions to the firm. Since MSSP and firms cannot observe each other's actions, both can suffer…

  8. Securities issues in reserves reporting

    International Nuclear Information System (INIS)

    Legg, M.B.

    1997-01-01

    Securities issues in oil and gas reserves reporting were discussed. Alberta requires specific information regarding important oil and gas properties, plants, facilities and installations. When preparing the reserves report, the following elements are important to consider: (1) the author of the report must be a registered professional engineer or registered professional geologist, (2) the report itself must be an engineering document, (3) the content of the report must be extensive, (4) it should be prepared in accordance with petroleum engineering and evaluation practices, and must include a summary of estimated net reserves

  9. Securing energy equity

    Energy Technology Data Exchange (ETDEWEB)

    Grimsby, Lars Kare, E-mail: lars.grimsby@umb.no [Department of International Environment and Development Studies, Noragric, Norwegian University of Life Sciences, P.O. Box 5003, 1432 Aas (Norway)

    2011-11-15

    Addressing energy poverty rather than energy equity conveniently evades the problem of the gap in energy consumption per capita in the developed and developing world. For energy security policies to adequately address energy poverty it requires a widening of scope from national to global. This is a comment to the forthcoming presentation of IEA's proposition for a new architecture for financing universal modern energy access to be presented at the conference 'Energy for all-Financing access for the poor' held in Oslo in October 2011. - Highlights: > Addressing energy poverty may elude the disparity in energy consumption between rich and poor. > A minimum threshold of energy for the poor does not itself address inequity in energy consumption. > Energy equity may be secured by widening scope from national to global, from the poorest to us all.

  10. Securing energy equity

    International Nuclear Information System (INIS)

    Grimsby, Lars Kare

    2011-01-01

    Addressing energy poverty rather than energy equity conveniently evades the problem of the gap in energy consumption per capita in the developed and developing world. For energy security policies to adequately address energy poverty it requires a widening of scope from national to global. This is a comment to the forthcoming presentation of IEA's proposition for a new architecture for financing universal modern energy access to be presented at the conference 'Energy for all-Financing access for the poor' held in Oslo in October 2011. - Highlights: → Addressing energy poverty may elude the disparity in energy consumption between rich and poor. → A minimum threshold of energy for the poor does not itself address inequity in energy consumption. → Energy equity may be secured by widening scope from national to global, from the poorest to us all.

  11. Study on the concentration of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2002-01-01

    'Energy Security' concept has played the central role in Japan's energy policy. However, the definition of the concept is not clear. If energy security will remain a principal policy target, its concept should be clearly defined as a precondition. This dissertation analyzes historical changes in energy security concept and considers their relationship with the development of national security concept in international relations studies. Following an introduction in the first chapter, the second chapter reveals that energy security concept has changed in accord with energy situation and policymakers' concern of the times. As a result, several different definitions of the concept now coexist. The third chapter deals with the relationship between energy security concept and national security concepts in international relations. Three major definitions of energy security concepts correspond to definitions of security concepts by three schools in security theory - realism, liberalism, and globalism. In the fourth chapter, energy security is conceptualized and its policy measures are systematized by addressing the issues appeared in its historical changes and referring to security theory in international relations studies. The fifth chapter discusses the contribution by nuclear energy to Japan's energy security, applying a theoretical framework presented in previous chapters. Characteristics of nuclear energy which enhance energy security are identified, and policy measures for improving those characteristics are proposed. (author)

  12. Survey of cyber security issues in smart grids

    Science.gov (United States)

    Chen, Thomas M.

    2010-04-01

    The future smart grid will enable cost savings and lower energy use by means of smart appliances and smart meters which support dynamic load management and real-time monitoring of energy use and distribution. The introduction of two-way communications and control into power grid introduces security and privacy concerns. This talk will survey the security and privacy issues in smart grids using the NIST reference model, and relate these issues to cyber security in the Internet.

  13. Conceptualizing energy security

    International Nuclear Information System (INIS)

    Winzer, Christian

    2012-01-01

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy security. They can be characterized according to the sources of risk, the scope of the impacts, and the severity filters in the form of the speed, size, sustention, spread, singularity and sureness of impacts. Using a stylized case study for three European countries, we illustrate how the selection of conceptual boundaries along these dimensions determines the outcome. This can be avoided by more clearly separating between security of supply and other policy objectives. This leads us to the definition of energy security as the continuity of energy supplies relative to demand. - Highlights: ► The widest energy security concept includes all risks that are caused by or have an impact on the energy supply chain. ► Authors narrow this down by choosing different risk sources, impact measures and subjective severity filters in their definitions. ► The selection of conceptual boundaries determines outcome of quantitative studies.

  14. Indicators for energy security

    International Nuclear Information System (INIS)

    Kruyt, Bert; Van Vuuren, D.P.; De Vries, H.J.M.; Groenenberg, H.

    2009-01-01

    The concept of energy security is widely used, yet there is no consensus on its precise interpretation. In this research, we have provided an overview of available indicators for long-term security of supply (SOS). We distinguished four dimensions of energy security that relate to the availability, accessibility, affordability and acceptability of energy and classified indicators for energy security according to this taxonomy. There is no one ideal indicator, as the notion of energy security is highly context dependent. Rather, applying multiple indicators leads to a broader understanding. Incorporating these indicators in model-based scenario analysis showed accelerated depletion of currently known fossil resources due to increasing global demand. Coupled with increasing spatial discrepancy between consumption and production, international trade in energy carriers is projected to have increased by 142% in 2050 compared to 2008. Oil production is projected to become increasingly concentrated in a few countries up to 2030, after which production from other regions diversifies the market. Under stringent climate policies, this diversification may not occur due to reduced demand for oil. Possible benefits of climate policy include increased fuel diversity and slower depletion of fossil resources. (author)

  15. Natural gas and energy security

    International Nuclear Information System (INIS)

    Saga, B.P.

    1996-01-01

    This paper relates to energy security by natural gas supply seen in an International Energy Agency perspective. Topics are: Security of supply, what is it; the role gas on the European energy scene; short term security of supply; long term security of supply; future structural and regulatory developments and possible implications for security of supply. 6 figs

  16. Reconsidering relations between nuclear energy and security concepts

    International Nuclear Information System (INIS)

    Irie, Kazutomo

    2004-01-01

    Relations between nuclear energy and security concepts can be clarified through investigation into the multivocal nature of security concepts. While military uses of nuclear energy significantly influence national security, peaceful uses of nuclear energy contribute energy security, which is an expanded concept of national security. Military and peaceful uses of nuclear energy have reciprocal actions, thus influencing national security and energy security, respectively. Nuclear security, which means security of nuclear systems themselves, recently attracts the attention of the international society. Nuclear security directly influences national security issues. On the other hand, along with nuclear safety, nuclear security becomes a prerequisite for energy security through peaceful uses of nuclear energy. In investigating into relations between nuclear energy and security concepts, the difficulty of translating the English word of 'nuclear security' into Japanese as well as other languages is found. (author)

  17. The World energy issue

    International Nuclear Information System (INIS)

    Nifenecker, Herve

    2011-01-01

    This Power Point document proposes figures and data about the current world energy consumption, the various energy sources, the share of primary energy consumption by different sectors, and the levels of energy reserves. It addresses the issue of global warming (evolution of temperature, regional anomalies, the challenge of limitation of temperature, the greenhouse gas emissions), the strategic role of electricity (energy mix, heat production with electricity), energy savings, electricity production (key data on solar, wind, solar and biomass energy, possibilities of carbon capture, nuclear energy, costs of these different energies)

  18. Security issues in mobile NFC devices

    CERN Document Server

    Roland, Michael

    2015-01-01

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

  19. Cyber security issues in online games

    Science.gov (United States)

    Zhao, Chen

    2018-04-01

    With the rapid development of the Internet, online gaming has become a way of entertainment for many young people in the modern era. However, in recent years, cyber security issues in online games have emerged in an endless stream, which have also caused great attention of many game operators. Common cyber security problems in the game include information disclosure and cyber-attacks. These problems will directly or indirectly cause economic losses to gamers. Many gaming companies are enhancing the stability and security of their network or gaming systems in order to enhance the gaming user experience. This article has carried out the research of the cyber security issues in online games by introducing the background and some common cyber security threats, and by proposing the latent solution. Finally, it speculates the future research direction of the cyber security issues of online games in the hope of providing feasible solution and useful information for game operators.

  20. Securing India's energy future

    International Nuclear Information System (INIS)

    Raghuraman, V.

    2009-01-01

    India's development aspirations are challenged by energy security and climate change considerations. The integrated energy policy clearly deliberates the need to intensify all energy options with emphasis on maximizing indigenous coal production, harnessing hydropower, increasing adoption of renewables, intensifying hydrocarbon exploration and production and anchoring nuclear power development to meet the long-term requirements. The report also emphasizes the need to secure overseas hydrocarbon and coal assets. Subsequently the National Action Plan on climate change has underscored the need to wean away from fossil fuels, the ambitious National Solar Mission is a case in point. Ultimately securing India's energy future lies in clean coal, safe nuclear and innovative solar. Coal is the key energy option in the foreseeable future. Initiatives are needed to take lead role in clean coal technologies, in-situ coal gasification, tapping coal bed methane, coal to liquids and coal to gas technologies. There is need to intensify oil exploration by laying the road-map to open acreage to unlock the hydrocarbon potential. Pursue alternate routes based on shale, methane from marginal fields. Effectively to use oil diplomacy to secure and diversify sources of supply including trans-national pipelines and engage with friendly countries to augment strategic resources. Technologies to be accessed and developed with international co-operation and financial assistance. Public-Private Partnerships, in collaborative R and D projects need to be accelerated. Nuclear share of electricity generation capacity to be increased 6 to 7% of 63000 MW by 2031-32 and further to 25% (300000 MW) capacity by 2050 is to be realized by operationalizing the country's thorium programme. Nuclear renaissance has opened up opportunities for the Indian industry to meet not only India's requirements but also participate in the global nuclear commerce; India has the potential to emerge as a manufacturing hub

  1. Energy security externalities and fuel cycle comparisons

    International Nuclear Information System (INIS)

    Bohi, D.; Toman, M.

    1994-01-01

    Externalities related to 'energy security' may be one way in which the full social costs of energy use diverge from the market prices of energy commodities. Such divergences need to be included in reckoning the full costs of different fuel cycles. In this paper we critically examine potential externalities related to energy security and issues related to the measurement of 2 these externalities, in the context of fuel cycle comparisons

  2. Energy security externalities and fuel cycle comparisons

    Energy Technology Data Exchange (ETDEWEB)

    Bohi, D; Toman, M

    1994-07-01

    Externalities related to 'energy security' may be one way in which the full social costs of energy use diverge from the market prices of energy commodities. Such divergences need to be included in reckoning the full costs of different fuel cycles. In this paper we critically examine potential externalities related to energy security and issues related to the measurement of 2 these externalities, in the context of fuel cycle comparisons.

  3. Concept for Energy Security Matrix

    International Nuclear Information System (INIS)

    Kisel, Einari; Hamburg, Arvi; Härm, Mihkel; Leppiman, Ando; Ots, Märt

    2016-01-01

    The following paper presents a discussion of short- and long-term energy security assessment methods and indicators. The aim of the current paper is to describe diversity of approaches to energy security, to structure energy security indicators used by different institutions and papers, and to discuss several indicators that also play important role in the design of energy policy of a state. Based on this analysis the paper presents a novel Energy Security Matrix that structures relevant energy security indicators from the aspects of Technical Resilience and Vulnerability, Economic Dependence and Political Affectability for electricity, heat and transport fuel sectors. Earlier publications by different authors have presented energy security assessment methodologies that use publicly available indicators from different databases. Current paper challenges viability of some of these indicators and introduces new indicators that would deliver stronger energy security policy assessments. Energy Security Matrix and its indicators are based on experiences that the authors have gathered as high-level energy policymakers in Estonia, where all different aspects of energy security can be observed. - Highlights: •Energy security should be analysed in technical, economic and political terms; •Energy Security Matrix provides a framework for energy security analyses; •Applicability of Matrix is limited due to the lack of statistical data and sensitivity of output.

  4. Securing abundance : The politics of energy security

    NARCIS (Netherlands)

    Kester, Johannes

    2016-01-01

    Energy Security is a concept that is known in the literature for its ‘slippery’ nature and subsequent wide range of definitions. Instead of another attempt at grasping the essence of this concept, Securing Abundance reformulates the problem and moves away from a definitional problem to a theoretical

  5. No energy security without climate security

    International Nuclear Information System (INIS)

    Hiller, M.

    2006-06-01

    WWF urges the G8 nations to embark on a serious global 'Climate and Energy Security Plan' akin in dimension to the Marshall plan after the Second World War. The plan would aim at dramatically augmenting energy efficiency measures and renewable energy sources within the next five years

  6. Energy security and sustainability in Northeast Asia

    International Nuclear Information System (INIS)

    Hippel, David von; Suzuki, Tatsujiro; Williams, James H.; Savage, Timothy; Hayes, Peter

    2011-01-01

    'Energy Security' has typically, to those involved in making energy policy, meant mostly securing access to oil and other fossil fuels. With increasingly global, diverse energy markets, however, and increasingly transnational problems resulting from energy transformation and use, old energy security rationales are less salient, and other issues, including climate change and other environmental, economic, and international considerations are becoming increasingly important. As a consequence, a more comprehensive operating definition of 'Energy Security' is needed, along with a workable framework for analysis of which future energy paths or scenarios are likely to yield greater Energy Security in a broader, more comprehensive sense. Work done as a part of the Nautilus Institute's 'Pacific Asia Regional Energy Security' (PARES) project developed a broader definition of Energy Security, and described an analytical framework designed to help to compare the energy security characteristics - both positive and negative - of different quantitative energy paths as developed using software tools such as the LEAP (Long-range Energy Alternatives Planning) system.

  7. Energy technology evaluation report: Energy security

    Science.gov (United States)

    Koopman, R.; Lamont, A.; Schock, R.

    1992-09-01

    Energy security was identified in the National Energy Strategy (NES) as a major issue for the Department of Energy (DOE). As part of a process designed by the DOE to identify technologies important to implementing the NES, an expert working group was convened to consider which technologies can best contribute to reducing the nation's economic vulnerability to future disruptions of world oil supplies, the working definition of energy security. Other working groups were established to deal with economic growth, environmental quality, and technical foundations. Energy Security working group members were chosen to represent as broad a spectrum of energy supply and end-use technologies as possible and were selected for their established reputations as experienced experts with an ability to be objective. The time available for this evaluation was very short. The group evaluated technologies using criteria taken from the NES which can be summarized for energy security as follows: diversifying sources of world oil supply so as to decrease the increasing monopoly status of the Persian Gulf region; reducing the importance of oil use in the US economy to diminish the impact of future disruptions in oil supply; and increasing the preparedness of the US to deal with oil supply disruptions by having alternatives available at a known price. The result of the first phase of the evaluation process was the identification of technology groups determined to be clearly important for reducing US vulnerability to oil supply disruptions. The important technologies were mostly within the high leverage areas of oil and gas supply and transportation demand but also included hydrogen utilization, biomass, diversion resistant nuclear power, and substitute industrial feedstocks.

  8. Ethics issues in security hospitals.

    Science.gov (United States)

    Weinstein, Henry C

    2002-01-01

    The term 'security hospital' is used for a variety of facilities including forensic hospitals and prison hospitals, which, because of their mission, the nature of their work, and the populations they serve-or because of the authority under which they operate-place the staff at considerable risk of ethical violations related to either clinical care or to forensic activities. The problem of divided loyalties is of special concern in security hospitals. Ethics principles particularly at risk are confidentiality and informed consent. Where there are cultural disparities between the staff and the patients, differences in background, socioeconomic class, education, and other types of diversity, cultural awareness is required and must be reflected in appropriate treatment and evaluation. To counteract the risks of ethical violations, a security hospital should create an ethical climate and develop means to anticipate, prevent, and deal with ethical violations. These might include detailed and specific policies and procedures, programs of orientation, education, consultation, and liaison as well as its own ethics committee. Copyright 2002 John Wiley & Sons, Ltd.

  9. Security Issues in Networks with Internet Access

    National Research Council Canada - National Science Library

    Landwehr, Carl E; Goldschlag, David M

    1997-01-01

    .... The principles are illustrated by describing the security issues a hypothetical company faces as the networks that support its operations evolve from strictly private, through a mix of Internet...

  10. Nuclear energy and security

    International Nuclear Information System (INIS)

    Blejwas, Thomas E.; Sanders, Thomas L.; Eagan, Robert J.; Baker, Arnold B.

    2000-01-01

    Nuclear power is an important and, the authors believe, essential component of a secure nuclear future. Although nuclear fuel cycles create materials that have some potential for use in nuclear weapons, with appropriate fuel cycles, nuclear power could reduce rather than increase real proliferation risk worldwide. Future fuel cycles could be designed to avoid plutonium production, generate minimal amounts of plutonium in proliferation-resistant amounts or configurations, and/or transparently and efficiently consume plutonium already created. Furthermore, a strong and viable US nuclear infrastructure, of which nuclear power is a large element, is essential if the US is to maintain a leadership or even participatory role in defining the global nuclear infrastructure and controlling the proliferation of nuclear weapons. By focusing on new fuel cycles and new reactor technologies, it is possible to advantageously burn and reduce nuclear materials that could be used for nuclear weapons rather than increase and/or dispose of these materials. Thus, the authors suggest that planners for a secure nuclear future use technology to design an ideal future. In this future, nuclear power creates large amounts of virtually atmospherically clean energy while significantly lowering the threat of proliferation through the thoughtful use, physical security, and agreed-upon transparency of nuclear materials. The authors must develop options for policy makers that bring them as close as practical to this ideal. Just as Atoms for Peace became the ideal for the first nuclear century, they see a potential nuclear future that contributes significantly to power for peace and prosperity

  11. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  12. DATA SECURITY ISSUES IN CLOUD COMPUTING: REVIEW

    Directory of Open Access Journals (Sweden)

    Hussam Alddin Shihab Ahmed

    2016-02-01

    Full Text Available Cloud computing is an internet based model that empower on demand ease of access and pay for the usage of each access to shared pool of networks. It is yet another innovation that fulfills a client's necessity for computing resources like systems, stockpiling, servers, administrations and applications. Securing the Data is considered one of the principle significant challenges and concerns for cloud computing. This persistent problem is getting more affective due to the changes in improving cloud computing technology. From the perspective of the Clients, cloud computing is a security hazard especially when it comes to assurance affirmation issues and data security, remain the most basically which backs off for appropriation of Cloud Computing administrations. This paper audits and breaks down the essential issue of cloud computing and depicts the information security and protection of privacy issues in cloud.

  13. Rethinking EU energy security considering past trends and future prospects

    NARCIS (Netherlands)

    Amineh, Mehdi P.; Crijns - Graus, Wina

    2014-01-01

    EU energy policy objectives are directed at three highly interdependent areas: energy supply security, competitiveness and decarbonization to prevent climate change. In this paper, we focus on the issue of energy supply security. Security of energy supply for the immediate and medium-term future is

  14. Energy and environmental issues

    International Nuclear Information System (INIS)

    Skea, Jim

    1993-01-01

    This paper provides an overview of the current energy-environmental issues. Firstly, the environmental problems associated with energy production and use are briefly described. Secondly, the paper reviews the availability of technological solutions to environmental problems, focussing particularly on atmospheric emission control. Finally, it moves on to look at recent policy developments in some parts of the world. Since the paper is written from the perspective of an industrialized country, emerging policy issues in Europe, Japan, and North America receive the greatest attention, with a particular focus on Europe where greenhouse gases and the proposed carbon tax have received a particularly high priority. The paper concludes with a discussion of some of the issues arising from the 1992 UNCED (UN Conference on Environment and Development) and implications for the diffusion of cleaner technologies from North to South. (author). 36 refs

  15. A study on energy security and nuclear energy role

    International Nuclear Information System (INIS)

    Ujita, Hiroshi

    2011-01-01

    Energy security was a major concern for OECD governments in the early 1970s. Since then, successive oil crises, volatility of hydrocarbon prices, as well as terrorist risks and natural disasters, have brought the issue back to the centre stage of policy agendas. Here, an energy security concept has been proposed, which is defined by time frame and space frame as well. Wide-meaning energy security is divided broadly into two categories. One is short-term (∼10 y) energy crisis, which is narrow-meaning energy security. Short-term energy crisis is further divided into contingent crisis, such as energy supply chain (sealane) interruption due to conflict, accident, terrorism, etc., and structural crisis, such as price fluctuations, supply shortage, energy demand increase in Asia, technology development stagnation, etc. The other is long-term (∼100 y) energy crisis and global energy problems, such as fossil fuel exhaustion and global warming. (author)

  16. Nuclear energy and the security of energy supply

    International Nuclear Information System (INIS)

    Bertel, E.

    2005-01-01

    Security of energy supply was a major concern for OECD governments in the early 1970. Since then, successive oil crises, volatility of hydrocarbon prices, as well as terrorist risks and natural disasters, have brought the issue back to the centre stage of policy agendas. In this paper, the author discusses the problem of energy supply security. Can security of supply be measured? What is the role of government and of nuclear energy? And what are measures for ensuring security of supply? (A.L.B.)

  17. Energy issues in Africa

    International Nuclear Information System (INIS)

    Farhandi, M.

    1991-01-01

    The topic of the energy sector-and the petroleum sector in particular-in sub-Saharan Africa might well be considered an insignificant issue compared with many of the energy concerns which now command international attention. However, the World Bank believes that it is important for all those in international energy not to forget about the crucial problems facing Africa. They should become informed and concerned about these problems, and, hopefully, work together to bring about a satisfactory solution for an ongoing development dilemma. Simply put, the cost of imported energy to the African economy is exorbitantly high, sapping the resources needed to produce economic growth and social progress. This paper reports that, to address this issue, the World Bank is about to undertake a major initiative-two ground-breaking studies in the field of energy for sub-Saharan Africa. Both of these proposed studies are designed to find ways to reduce the burden of the cost of energy imports, mainly petroleum products, to this continent. One study will examine the design (and, subsequently, the implementation) of a rationalization scheme for the supply and distribution of petroleum products throughout sub-Saharan Africa. The other will consider the feasibility of transporting Nigeria's natural gas to neighbors to the west, all of which presently are importers of energy

  18. Energy security in China and in India

    International Nuclear Information System (INIS)

    2014-04-01

    In the first part, this report addresses the issue of energy security in China. The authors first consider renewable energies by discussing the Chinese policy (incentive policies, delayed reforms, issue of a legal framework to promoter these energies), and by commenting the case of wind energy (a too strong emergence, promotion policies, wind energy industry, a disordered growth, quality vs quantity) and the case of solar energy (a recent but strong lift off, uncertainty about the international context and focus on the domestic market). The authors outline the necessity of a reform, the difficulties faced on the short term, and some suggested solutions. They more briefly address the cases of hydraulic energy and biomass. They address the case of fossil energies for which China is facing an increasing demand but also technical and institutional challenges which limit the development of this sector. Therefore, China uses foreign supplies: this a source of partnerships but also of conflicts. Opportunities for the French expertise are outlined. The specific case of coal is analysed: a pillar of energy security for China, a new industry, with necessary reforms, and opportunities for foreign companies. The second part of the report addresses the issue of energy security in India. The authors first comment the Indian energy mix. They outline that energy security is weakened by governance problems, and that imports are used to address domestic shortages

  19. Cloud Security: Issues and Research Directions

    Science.gov (United States)

    2014-11-18

    4. Cloud Computing Security: What Changes with Software - Defined Networking ? Maur´ıcio Tsugawa, Andr´ea Matsunaga, and Jos´e A. B. Fortes 5...machine’s memory from an untrusted or malicious hypervisor. In Chapter 4, Tsugawa et al. discuss the security issues introduced when Software - Defined ... Networking ( SDN ) is deployed within and across clouds. Chapters 5-9 are focused on the protection of data stored in the cloud. In Chapter 5, Wang et

  20. Analysis of selected energy security issues related to US crude oil and natural gas exploration, development, production, transportation and processing

    International Nuclear Information System (INIS)

    1990-10-01

    In July 1989, President Bush directed the Secretary of Energy to initiate the development of a comprehensive National Energy Strategy (NES) built upon a national consensus. The overall principle for the NES, as defined by the President and articulated by the Economic Policy Council (EPC), is the continuation of the successful policy of market reliance, consistent with the following goals: Balancing of energy, economic, and environmental concerns; and reduced dependence by the US and its friends and allies on potentially unreliable energy suppliers. The analyses presented in this report draw upon a large body of work previously conducted for DOE/Office of Fossil Energy, the US Department of Interior/Minerals Management Service (DOI/MMS), and the Gas Research Institute (GRI), referenced throughout the text of this report. This work includes assessments in the following areas: the potential of advanced oil and gas extraction technologies as improved through R ampersand D, along with the successful transfer of these technologies to the domestic petroleum industry; the economic and energy impacts of environmental regulations on domestic oil and gas exploration, production, and transportation; the potential of tax incentives to stimulate domestic oil and gas development and production; the potential environmental costs associated with various options for leasing for US oil and gas resources in the Outer Continental Shelf (OCS); and the economic impacts of environmental regulations affecting domestic crude oil refining

  1. Ecosystem services for energy security

    Energy Technology Data Exchange (ETDEWEB)

    Athanas, Andrea; McCormick, Nadine

    2010-09-15

    The world is at an energy crossroads. The changes underway will have implications for ecosystems and livelihoods. Energy security is the reliable supply of affordable energy, of which there are two dimensions; reliability and resilience. Changes in ecosystem services linked to degradation and climate change have the potential to impact both on the reliabiity of energy systems and on their resiliance. Investing in ecosystems can help safeguard energy systems, and mitigate unforeseen risks to energy security. The energy and conservation community should come together to build reliable and resilliant energy systems in ways which recognise and value supporting ecosystems.

  2. Nuclear energy and energy security

    International Nuclear Information System (INIS)

    Mamasakhlisi, J.

    2010-01-01

    Do Georgia needs nuclear energy? Nuclear energy is high technology and application of such technology needs definite level of industry, science and society development. Nuclear energy is not only source of electricity production - application of nuclear energy increases year-by-year for medical, science and industrial use. As an energy source Georgia has priority to extend hydro-power capacity by reasonable use of all available water resources. In parallel regime the application of energy efficiency and energy conservation measures should be considered but currently this is not prioritized by Government. Meanwhile this should be taken into consideration that attempts to reduce energy consumption by increasing energy efficiency would simply raise demand for energy in the economy as a whole. The Nuclear energy application needs routine calculation and investigation. For this reason Government Commission is already established. But it seems in advance that regional nuclear power plant for South-Caucasus region would be much more attractive for future

  3. Review on security issues in RFID systems

    Directory of Open Access Journals (Sweden)

    Mohamed El Beqqal

    2017-12-01

    Full Text Available Radio frequency Identification (RFID is currently considered as one of the most used technologies for an automatic identification of objects or people. Based on a combination of tags and readers, RFID technology has widely been applied in various areas including supply chain, production and traffic control systems. However, despite of its numerous advantages, the technology brings out many challenges and concerns still not being attracting more and more researchers especially the security and privacy issues. In this paper, we review some of the recent research works using RFID solutions and dealing with security and privacy issues, we define our specific parameters and requirements allowing us to classify for each work which part of the RFID system is being secured, the solutions and the techniques used besides the conformity to RFID standards. Finally, we present briefly a solution that consists of combining RFID with smartcard based biometric to enhance security especially in access control scenarios. Hence the result of our study aims to give a clear vision of available solutions and techniques used to prevent and secure the RFID system from specific threats and attacks.

  4. Main Issues in Big Data Security

    Directory of Open Access Journals (Sweden)

    Julio Moreno

    2016-09-01

    Full Text Available Data is currently one of the most important assets for companies in every field. The continuous growth in the importance and volume of data has created a new problem: it cannot be handled by traditional analysis techniques. This problem was, therefore, solved through the creation of a new paradigm: Big Data. However, Big Data originated new issues related not only to the volume or the variety of the data, but also to data security and privacy. In order to obtain a full perspective of the problem, we decided to carry out an investigation with the objective of highlighting the main issues regarding Big Data security, and also the solutions proposed by the scientific community to solve them. In this paper, we explain the results obtained after applying a systematic mapping study to security in the Big Data ecosystem. It is almost impossible to carry out detailed research into the entire topic of security, and the outcome of this research is, therefore, a big picture of the main problems related to security in a Big Data system, along with the principal solutions to them proposed by the research community.

  5. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  6. Evolution of gas markets and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Mitrova, Tatiana

    2007-07-01

    Questions of energy security and international gas trade became indissolubly connected during the last years. Paradoxically during the evolution of natural gas markets concerns about security issues in gas trade are only growing at the same time as transaction costs. Market participants have developed several mechanisms of adaptation (vertical integration, mutual penetration of capital and long-term contracts) which should be regarded not as a market failure but as an essential part of energy security guarantees at the moment. Further gas market evolution will demand more unified institutional framework to decrease threats to energy security and transaction costs. But this framework should be a result of mutual compromise of all market participants. (auth)

  7. Cloud Computing Security Latest Issues amp Countermeasures

    Directory of Open Access Journals (Sweden)

    Shelveen Pandey

    2015-08-01

    Full Text Available Abstract Cloud computing describes effective computing services provided by a third-party organization known as cloud service provider for organizations to perform different tasks over the internet for a fee. Cloud service providers computing resources are dynamically reallocated per demand and their infrastructure platform and software and other resources are shared by multiple corporate and private clients. With the steady increase in the number of cloud computing subscribers of these shared resources over the years security on the cloud is a growing concern. In this review paper the current cloud security issues and practices are described and a few innovative solutions are proposed that can help improve cloud computing security in the future.

  8. Smart Grids Cyber Security Issues and Challenges

    OpenAIRE

    Imen Aouini; Lamia Ben Azzouz

    2015-01-01

    The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of...

  9. Nuclear Cyber Security Issues and Policy Recommendations

    International Nuclear Information System (INIS)

    Lee, Cheol-Kwon; Lee, Dong-Young; Lee, Na-Young; Hwang, Young-Soo

    2015-01-01

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities

  10. Nuclear Cyber Security Issues and Policy Recommendations

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Cheol-Kwon; Lee, Dong-Young [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Lee, Na-Young; Hwang, Young-Soo [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The cyber-attack against computer systems causes the loss of function which brings about the big economic loss, and it becomes a national-wide issue. In recent days the cyber threat has occurred in the national critical infrastructure around the world. In the nuclear industry, while discussing responses to various threats against nuclear facilities since 2006, cyber-terrorism was also discussed. But at that time, cyber-attacks against control networks in nuclear facilities were not seriously considered because those networks were isolated from the Internet thoroughly and it was evaluated that cyber penetration would not be possible. However Stuxnet worm virus which attacked Iran's nuclear facilities confirmed that the cyber security problem could occur even in other nuclear facilities. The facilities were isolated from the Internet. After the cyber incident, we began to discuss the topic of NPP cyber security. It is very difficult to predict whether or when or how the cyber-attack will be occurred, which is a characteristic of cyber-attack. They could be always detected only after when an incident had occurred. This paper summarizes the report, 'Nuclear Cyber Security Issues and Policy Recommendations' by issue committee in the Korea Nuclear Society, which reviewed the cyber security framework for nuclear facilities in the Republic of Korea being established to prevent nuclear facilities from cyber-attacks and to respond systematically. As a result this paper proposes several comments to improve the security and furthermore safety of nuclear facilities Digital technology will be used more widely at the national critical infrastructure including nuclear facilities in the future, and moreover wireless technologies and mobile devices will be soon introduced to nuclear industry. It is therefore anticipated that the rapid advance in digital technology will accelerate the opportunity of hacking these facilities.

  11. On technical security issues in cloud computing

    DEFF Research Database (Denmark)

    Jensen, Meiko; Schwenk, Jörg; Gruschka, Nils

    2009-01-01

    , however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection sphere of the data owner. Most of the discussions on this topics are mainly driven by arguments related to organisational......The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and operational expenditure (OpEx). In order for this to become reality...... means. This paper focusses on technical security issues arising from the usage of Cloud services and especially by the underlying technologies used to build these cross-domain Internet-connected collaborations....

  12. Issues in energy finance

    Science.gov (United States)

    Khokher, Zeigham Islam

    As opposed to the well developed and understood equity markets, the energy markets are still in their infancy. The explosion of contracts, of both the primary and derivative types, are testament both to the existing size and the untapped growth potential of this exciting industry. However, because of its relative youth many basic issues in the energy markets remain unresolved. This thesis introduces some interesting questions and provides insights into these issues. Thematically, the chapters of this thesis are linked by an emphasis on valuation and risk management decisions. A contribution of this thesis is to show that subtle differences between the endogenous price process in our general equilibrium setting and the exogenous processes considered in earlier papers can generate significant differences in both financial and real option values. In addition to these valuation concerns there has been much debate about the corporate risk management function. Finance theory suggests that a value maximizing corporation should either be indifferent to hedging or, in the presence of certain imperfections, it should completely hedge all exposures. Both these extremes contradict empirical evidence. We show that existing corporate hedging behaviour is best explained in light of both physical market imperfections and directional predictions on future prices. While these speculative motives may arise from corporate hubris or genuine informational advantages, we argue that it would be difficult to implement private information in the absence of noise traders. Related to the risk management decision is the existence of futures risk premia. These premia have been thought to be cause by covariance with priced factors or due to the hedging demands of consumers and producers. This thesis argues that inventories serve as a signal of available quantity, which coupled with consumers fears regarding stockouts can induce a positive relationship between premia and inventories. In

  13. Indicators of energy security in industrialised countries

    International Nuclear Information System (INIS)

    Loeschel, Andreas; Moslener, Ulf; Ruebbelke, Dirk T.G.

    2010-01-01

    Energy security has become a popular catch phrase, both in the scientific arena as well as in the political discussion. Yet, in general the applied concepts of energy security are rather vague. This paper sheds some light on concepts and indicators of energy security. First, we conceptually discuss the issue of energy supply security and explain why it is not to handle by one science alone and what economics may contribute in order to structure the topic. After providing a brief survey of existing attempts to define or measure energy security we suggest an additional dimension along which indicators of energy security may be classified: ex-post and ex-ante indicators. Finally, we illustrate our concept on the basis of several simplified indicators. While ex-post indicators are mostly based on price developments, ex-ante indicators are to a greater extent aimed at illustrating potential problems. Our illustration suggests that it is worthwhile to take into account the market structure along with the political stability of exporting countries. (author)

  14. Nation State as Security Provider in Human Security Issue

    OpenAIRE

    Maya Padmi, Made Fitri

    2015-01-01

    Human Security notion is emphasizing on human as the central of security studies, challenging the position of state as the core of security. Some studies are tried to separate the state security and human security, however there are strong connection between these two notions. State has important role in establishing and maintaining the security of its own citizens. Through social contract and social security protection, state are oblige to set the security of its own people as their security...

  15. Energy Security and Renewable Energy in Least Developed Countries

    International Nuclear Information System (INIS)

    Wohlgemuth, N.

    2006-01-01

    The Programme of Action for the Least Developed Countries (UN, 2001) states: The levels of production and consumption of energy in the majority of Least Developed Countries (LDCs) are inadequate and unstable. This clearly indicates a situation of energy insecurity. Starting from an encompassing definition of energy security (a country's ability to expand and optimise its energy resource portfolio and achieve a level of services that will sustain economic growth and poverty reduction), it becomes quickly clear that energy security in LDCs is a complex topic with numerous interlinkages to other sustainable development objectives. This paper attempts to give an overview of issues related to energy security in LDCs by focusing on the role renewable energy can play in that context.(author)

  16. Safeguards and security issues at the MRS facility

    International Nuclear Information System (INIS)

    McGuinn, E.; Birch, M.; Jones, J.; Floyd, W.

    1993-01-01

    The U.S. Department of Energy's (DOE) Office of Civilian Radioactive Waste Management (OCRWM) is responsible for disposing of the nation's high level radioactive waste in a way that ensures the protection of the public from any unacceptable radiological risks and the maintenance of the national security. To achieve these objectives, OCRWM plans to institute a Nuclear Regulatory Commission (NRC)-approved security program at its facilities including the Monitored Retrievable Storage (MRS) facility. This program will safeguard nuclear information and provide not only for the physical protection of facilities but also for the nuclear material being handled and stored. Several key regulatory issues were identified during the development of the safeguards and security (S ampersand S) program for the MRS. These issues relate to developing a realistic definition of the security threat at the MRS and establishing a single set of regulatory requirements. Resolution of these issues is important to implement a realistic S ampersand S program who scope is commensurate with the potential risk at the MRS and complies with all appropriate regulatory requirements. OCRWM is working toward a timely resolution of these issues and on the formulation of an S ampersand S program for implementation at the MRS. As an initial step, DOE has proposed an S ampersand S strategy for the MRS based on a set of assumed resolutions to the key regulatory issues. With this approach, the facility designers will be able to evaluate possible S ampersand S concepts for integration into the MRS early in the design process

  17. Clean and Secure Energy from Coal

    Energy Technology Data Exchange (ETDEWEB)

    Smith, Philip [Univ. of Utah, Salt Lake City, UT (United States); Davies, Lincoln [Univ. of Utah, Salt Lake City, UT (United States); Kelly, Kerry [Univ. of Utah, Salt Lake City, UT (United States); Lighty, JoAnn [Univ. of Utah, Salt Lake City, UT (United States); Reitze, Arnold [Univ. of Utah, Salt Lake City, UT (United States); Silcox, Geoffrey [Univ. of Utah, Salt Lake City, UT (United States); Uchitel, Kirsten [Univ. of Utah, Salt Lake City, UT (United States); Wendt, Jost [Univ. of Utah, Salt Lake City, UT (United States); Whitty, Kevin [Univ. of Utah, Salt Lake City, UT (United States)

    2014-08-31

    The University of Utah, through their Institute for Clean and Secure Energy (ICSE), performed research to utilize the vast energy stored in our domestic coal resources and to do so in a manner that will capture CO2 from combustion from stationary power generation. The research was organized around the theme of validation and uncertainty quantification (V/UQ) through tightly coupled simulation and experimental designs and through the integration of legal, environment, economics and policy issues.

  18. Water security-National and global issues

    Science.gov (United States)

    Tindall, James A.; Campbell, Andrew A.

    2010-01-01

    Potable or clean freshwater availability is crucial to life and economic, environmental, and social systems. The amount of freshwater is finite and makes up approximately 2.5 percent of all water on the Earth. Freshwater supplies are small and randomly distributed, so water resources can become points of conflict. Freshwater availability depends upon precipitation patterns, changing climate, and whether the source of consumed water comes directly from desalination, precipitation, or surface and (or) groundwater. At local to national levels, difficulties in securing potable water sources increase with growing populations and economies. Available water improves living standards and drives urbanization, which increases average water consumption per capita. Commonly, disruptions in sustainable supplies and distribution of potable water and conflicts over water resources become major security issues for Government officials. Disruptions are often influenced by land use, human population, use patterns, technological advances, environmental impacts, management processes and decisions, transnational boundaries, and so forth.

  19. COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS

    OpenAIRE

    Sumant Ku Mohapatra; Biswa Ranjan Swain; Pravanjan Das

    2015-01-01

    This paper presents a brief study of recent advances in wireless network security issues. The paper makes a number of contributions to the wireless networking field. First, it studies the 4G mail threats and risk and their design decisions. Second, the security of 4G architecture with next generation network security and 8- security dimensions of 4G network. Third, security issues and possible threats on 4G are discussed. Finally, we proposed four layer security model which manage...

  20. Study of Security Attributes of Smart Grid Systems- Current Cyber Security Issues

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Scott A. McBride

    2009-04-01

    This document provides information for a report to congress on Smart Grid security as required by Section 1309 of Title XIII of the Energy Independence and Security Act of 2007. The security of any future Smart Grid is dependent on successfully addressing the cyber security issues associated with the nation’s current power grid. Smart Grid will utilize numerous legacy systems and technologies that are currently installed. Therefore, known vulnerabilities in these legacy systems must be remediated and associated risks mitigated in order to increase the security and success of the Smart Grid. The implementation of Smart Grid will include the deployment of many new technologies and multiple communication infrastructures. This report describes the main technologies that support Smart Grid and summarizes the status of implementation into the existing U.S. electrical infrastructure.

  1. Emerging nuclear security issues for transit countries

    International Nuclear Information System (INIS)

    Gabulov, I.A.

    2003-01-01

    Full text: Tragic events of September eleventh have made nuclear terrorism dangers more evident. In the light of increased terrorism preventing the spread of nuclear and nuclear related items as well as radioactive materials that can be used for production so-called 'dirty bomb'is an urgent global claim. Nuclear Security issues cover multiple aspects of the security and first of all the threat from nuclear terrorism, detection and protection of illicit trafficking of nuclear materials and other radioactive sources, legal shipment of such type materials as well as nuclear related dual use items. In the face of emerging threats the prevention of proliferation by the development of effective national system of nuclear export controls is hugely important for transit countries like Azerbaijan with underdeveloped export controls and strategic locations along trade and smuggling routes between nuclear suppliers States and countries attempting to develop nuclear weapons or any nuclear explosive devices. Thus, in the face of increasing international threat from nuclear terrorism the role and place of Azerbaijan Republic in the struggle against terrorism increases. In this context it is very important to establish effective national capabilities for detection and prevention of illicit trafficking of radioactive and nuclear materials as well as nuclear related dual use items across Azerbaijan's borders. One of the ways for enhancing and strengthening existing activities in this field is carrying out joint actions between scientists and enforcement officials in order to improve knowledge of the front-line customs and border guard inspectors concerning multiple aspects of Nuclear Security

  2. Energy security and the IEA ExCo on combustion

    Energy Technology Data Exchange (ETDEWEB)

    Hutchinson, P. [Hutchinson Consultant (United Kingdom)

    2009-07-01

    Energy security is an issue for those nations which consume more energy than is available from indigenous sources. A failure to secure adequate energy supplies at an acceptable price prejudices both national and economic security. Energy security is therefore a significant policy issue. A discussion of energy security and the International Energy Agency ExCo on combustion was offered in this presentation. The purpose of the discussion was to determine if a task or set of tasks on combustion research related to energy security should be launched; the structure of such a task; topics of interest; who would wish to participate; who would lead the collaboration; and the next steps. The presentation discussed the proper understanding and analysis of energy security and the interactions between international politics; defence; economics and economic development; present and future technologies; national infrastructure; resource distribution; and environmental science and politics. The presentation also discussed whether there was a shortage of energy, world reserves of crude oil, coal, and hydrocarbons. Oil supply disruptions and nominal and real world oil prices were also discussed. Options for addressing energy security were presented, with particular reference to increasing the energy intensity of the economy; using a wide range of different fuels such as coal; developing indigenous supplies such as renewables; and developing a reliable long life energy source. It was concluded that imports of energy can be reduced when energy security improves. tabs., figs.

  3. SECURITY AND PRIVACY ISSUES IN CLOUD COMPUTING

    Directory of Open Access Journals (Sweden)

    Amina AIT OUAHMAN

    2014-10-01

    Full Text Available Today, cloud computing is defined and talked about across the ICT industry under different contexts and with different definitions attached to it. It is a new paradigm in the evolution of Information Technology, as it is one of the biggest revolutions in this field to have taken place in recent times. According to the National Institute for Standards and Technology (NIST, “cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services that can be rapidly provisioned and released with minimal management effort or service provider interaction” [1]. The importance of Cloud Computing is increasing and it is receiving a growing attention in the scientific and industrial communities. A study by Gartner [2] considered Cloud Computing as the first among the top 10 most important technologies and with a better prospect in successive years by companies and organizations. Clouds bring out tremendous benefits for both individuals and enterprises. Clouds support economic savings, outsourcing mechanisms, resource sharing, any-where any-time accessibility, on-demand scalability, and service flexibility. Clouds minimize the need for user involvement by masking technical details such as software upgrades, licenses, and maintenance from its customers. Clouds could also offer better security advantages over individual server deployments. Since a cloud aggregates resources, cloud providers charter expert security personnel while typical companies could be limited with a network administrator who might not be well versed in cyber security issues. The new concepts introduced by the clouds, such as computation outsourcing, resource sharing, and external data warehousing, increase the security and privacy concerns and create new security challenges. Moreover, the large scale of the clouds, the proliferation of mobile access devices (e

  4. Nuclear Power, Energy Economics and Energy Security

    International Nuclear Information System (INIS)

    2013-01-01

    Economic development requires reliable, affordable electricity that is provided in sufficient quantities to satisfy the minimum energy requirements at a local, regional or national level. As simple as this recipe for economic development appears, technological, infrastructural, financial and developmental considerations must be analysed and balanced to produce a national energy strategy. Complicating that task is the historic fact that energy at the desired price and in the desired quantities can be neither taken for granted nor guaranteed. Energy economics and energy security determine the options available to nations working to establish a sustainable energy strategy for the future.

  5. Energy security in the 21. century

    Energy Technology Data Exchange (ETDEWEB)

    Randall, S.J. [Calgary Univ., AB (Canada)

    2002-07-01

    The traditional and current issues regarding the security of energy supplies is reviewed with particular emphasis on the oil sector and the implications of the terrorist attack on New York and Washington on September 11, 2001. In November 2001, the Committee on Sustainable Energy of the United Nations Economic Commission for Europe (UNECE) issued a press release about energy-related environmental problems and the need to factor in the danger of terrorist attacks on energy installations. The presentation examines the current levels of energy demand, expected areas of growth, and changing patterns of energy supply for the United States. The impact that growth in the industrial states of China will have in the global scheme of the petroleum industry is also discussed. Levels of political stability and security in many parts of the world are reviewed with particular reference to the Near and Middle East, Africa, Asia and Latin America. It is noted that liberalization and globalization are favouring the agglomeration of capital and labour into larger and larger multinational energy companies, which raises the concern about excessive market power. In its 2001 analysis of energy outlook, the International Energy Agency indicated that the reserves of oil, natural gas, coal and uranium are more than adequate to meet projected demand growth until at least 2020, by which time new technologies such as hydrogen-based fuel cells, clean coal burning and carbon sequestration will hold out the prospect of abundant, clean energy supplies. 15 refs., 6 figs.

  6. Energy security in the 21. century

    International Nuclear Information System (INIS)

    Randall, S.J.

    2002-01-01

    The traditional and current issues regarding the security of energy supplies is reviewed with particular emphasis on the oil sector and the implications of the terrorist attack on New York and Washington on September 11, 2001. In November 2001, the Committee on Sustainable Energy of the United Nations Economic Commission for Europe (UNECE) issued a press release about energy-related environmental problems and the need to factor in the danger of terrorist attacks on energy installations. The presentation examines the current levels of energy demand, expected areas of growth, and changing patterns of energy supply for the United States. The impact that growth in the industrial states of China will have in the global scheme of the petroleum industry is also discussed. Levels of political stability and security in many parts of the world are reviewed with particular reference to the Near and Middle East, Africa, Asia and Latin America. It is noted that liberalization and globalization are favouring the agglomeration of capital and labour into larger and larger multinational energy companies, which raises the concern about excessive market power. In its 2001 analysis of energy outlook, the International Energy Agency indicated that the reserves of oil, natural gas, coal and uranium are more than adequate to meet projected demand growth until at least 2020, by which time new technologies such as hydrogen-based fuel cells, clean coal burning and carbon sequestration will hold out the prospect of abundant, clean energy supplies. 15 refs., 6 figs

  7. Energy security and national policy

    International Nuclear Information System (INIS)

    Martin, W.F.

    1987-01-01

    To achieve an energy secure future, energy cannot be viewed as an isolated concern. It is part and parcel of a nation's economic, social, and political context. In the past important implications for the economy and national security have been ignored. Crash programs to deal with oil shortages in the seventies, crashed. In the eighties, oil surplus has been enjoyed. The energy situation could be quite different in the nineties. Statistics on energy supply and consumption of oil, coal, natural gas and electricity from nuclear power show that much progress has been made worldwide. However, about half of the world's oil will come from the Persian Gulf by 1995. Continued low oil prices could raise US imports to 60% of consumption by 1995. Persian Gulf tensions serve as reminders of the link between energy policy and national security policy. Energy policy must be based on market forces and concerns for national security. Strategic oil reserves will expand along with the availability of domestic oil and gas resources. Increased attention to conservation, diversification of energy resources, and use of alternative fuels can help reduce imports. Continued high-risk long term research and development is needed. Improved technology can reduce environmental impacts. Global markets need global cooperation. Energy has emerged as an important aspect of East-West relations. Europeans need to diversify their sources of energy. The soviets have proposed expanded collaboration in magnetic fusion science. A series of initiatives are proposed that together will ensure that economies will not become overly dependent on a single source of energy

  8. Energy security, energy modelling and uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Markandya, Anil [Basque Centre for Climate Change (Spain); University of Bath (United Kingdom); Pemberton, Malcolm [University College London (United Kingdom)

    2010-04-15

    The paper develops a framework to analyze energy security in an expected utility framework, where there is a risk of disruption of imported energy. The analysis shows the importance of an energy tax as a tool in maximizing expected utility, and how the level of that tax varies according to the key parameters of the system: risk aversion, probability of disruption, demand elasticity and cost of disruption. (author)

  9. Energy security, energy modelling and uncertainty

    International Nuclear Information System (INIS)

    Markandya, Anil; Pemberton, Malcolm

    2010-01-01

    The paper develops a framework to analyze energy security in an expected utility framework, where there is a risk of disruption of imported energy. The analysis shows the importance of an energy tax as a tool in maximizing expected utility, and how the level of that tax varies according to the key parameters of the system: risk aversion, probability of disruption, demand elasticity and cost of disruption. (author)

  10. Creating energy security indexes with decision matrices and quantitative criteria

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Larry; Shupe, Darren

    2010-09-15

    Energy security is becoming an important policy issue in a growing number of jurisdictions because of volatile energy markets and production challenges faced by many producers. As a result, policymakers and politicians are looking for tools or methods that can create an energy security index with results that are justifiable, understandable, and reproducible. This paper describes a method which employs a decision matrix to produce an energy security index using quantitative criteria and metrics. The method allows a range of indexes to be produced, thereby offering further insight into the state of a jurisdiction's energy security.

  11. The economics of energy security

    International Nuclear Information System (INIS)

    Bohi, D.R.; Toman, M.A.; Walls, M.A.

    1996-01-01

    The results of research on energy security that has been conducted over the past 20 years are brought together and expanded. Chapter 2 lays out basic conceptual arguments regarding the economic externalities and the military premium, as well as the general problem of identifying a market failure. Chapter 3 provides a brief history of the oil price shocks of the 1970s and reviews the empirical evidence on the energy security externalities laid out in Chapter 2. Chapter 4 builds on the material in Chapter 3 to critique published estimates of the overall premium associated with oil imports or oil consumption. Chapter 5 examines how the oil market has changed in the twenty years since the first oil shock of the 1970s and assesses the effect of these changes on price behavior and market efficiency. Chapters 6 and 7 focus on two sectors in which the energy security debate is being carried out through concrete policy measures: the choice of electricity generation technology and the market for transportation fuels. In Chapter 8, we summarize our assessments of potential energy security externalities and examine their implications for a variety of policy measures at the national and subnational levels. 7 figs., 11 tabs., 200 refs

  12. Secure Automated Microgrid Energy System

    Science.gov (United States)

    2016-12-01

    O&M Operations and Maintenance PSO Power System Optimization PV Photovoltaic RAID Redundant Array of Independent Disks RBAC Role...elements of the initial study and operational power system model (feeder size , protective devices, generation sources, controllable loads, transformers...EW-201340) Secure Automated Microgrid Energy System December 2016 This document has been cleared for public release; Distribution Statement A

  13. Measuring Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Brochure provides and overview of the analysis and results. Readers interested in an in-depth discussion of methodology are referred to the MOSES Working Paper.

  14. Economics of Food Security: Selected Issues

    Directory of Open Access Journals (Sweden)

    Silvia L. Saravia-Matus

    2012-05-01

    Full Text Available The present article reviews selected key challenges regarding food security from both an academic and policy-oriented angle. In the analysis of the main constraints to achieve food access and availability in low and high-income societies, a detailed distinction is made between technological and institutional aspects. In the case of low-income economies, the emphasis is placed on the socio-economic situation and performance of small-scale farmers while in high-income economies the focus is shifted towards issues of price volatility, market stability and food waste. In both scenarios, productivity and efficiency in the use of resources are also considered. The objective of this assessment is to identify the type of policy support which would be most suitable to fulfil the increasing food demand. Innovation programmes and policies which inte- grate institutional coordination and technical support are put forward as strategic tools in the achievement of food security goals at regional and global level.

  15. The analysis of security cost for different energy sources

    International Nuclear Information System (INIS)

    Jun, Eunju; Kim, Wonjoon; Chang, Soon Heung

    2009-01-01

    Global concerns for the security of energy have steadily been on the increase and are expected to become a major issue over the next few decades. Urgent policy response is thus essential. However, little attempt has been made at defining both energy security and energy metrics. In this study, we provide such metrics and apply them to four major energy sources in the Korean electricity market: coal, oil, liquefied natural gas, and nuclear. In our approach, we measure the cost of energy security in terms of supply disruption and price volatility, and we consider the degree of concentration in energy supply and demand using the Hirschman-Herfindahl index (HHI). Due to its balanced fuel supply and demand, relatively stable price, and high abundance, we find nuclear energy to be the most competitive energy source in terms of energy security in the Korean electricity market. LNG, on the other hand, was found to have the highest cost in term of energy security due to its high concentration in supply and demand, and its high price volatility. In addition, in terms of cost, we find that economic security dominates supply security, and as such, it is the main factor in the total security cost. Within the confines of concern for global energy security, our study both broadens our understanding of energy security and enables a strategic approach in the portfolio management of energy consumption.

  16. The concept of energy security: Beyond the four As

    International Nuclear Information System (INIS)

    Cherp, Aleh; Jewell, Jessica

    2014-01-01

    Energy security studies have expanded from their classic beginnings following the 1970s oil crises to encompass various energy sectors and increasingly diverse issues. This viewpoint contributes to the re-examination of the meaning of energy security that has accompanied this expansion. Our starting point is that energy security is an instance of security in general and thus any concept of it should address three questions: “Security for whom?”, “Security for which values?” and “Security from what threats?” We examine an influential approach – the ‘four As of energy security’ (availability, accessibility, affordability, and acceptability) and related literature of energy security – to show it does not address these questions. We subsequently summarize recent insights which propose a different concept of energy security as ‘low vulnerability of vital energy systems’. This approach opens the road for detailed exploration of vulnerabilities as a combination of exposure to risks and resilience and of the links between vital energy systems and critical social functions. The examination of energy security framed by this concept involves several scientific disciplines and provides a useful platform for scholarly analysis and policy learning. - Highlights: • Energy security should be conceptualized as an instance of security in general. • 4As of energy security and related approaches do not address security questions. • We define energy security as low vulnerability of vital energy systems (VES). • VES support critical social functions and can be drawn sectorally or geographically. • Vulnerability is a combination of exposure to risks and resilience capacities

  17. Environmental issues: I - Energy utilization

    International Nuclear Information System (INIS)

    Dincer, I.

    2001-01-01

    In this article, energy utilization and its major environmental impacts are discussed from the standpoint of sustainable development, including anticipated patterns of future energy use and consequent environmental issues and policies. Overall, the paper also examines several issues related to energy utilization, environment, sustainable development from both current and future perspectives, and energy use and its environmental impacts in the transportation sector. Finally, the conclusions and recommendations are presented in the form to be beneficial to energy scientists, engineers and energy policy makers. (author)

  18. 6 CFR 27.204 - Minimum concentration by security issue.

    Science.gov (United States)

    2010-01-01

    ... Section 27.204 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.204 Minimum concentration by security issue. (a) Release Chemicals—(1) Release-Toxic Chemicals. If a release-toxic chemical of interest...

  19. Speaker's presentations. Energy supply security

    International Nuclear Information System (INIS)

    Pierret, Ch.

    2000-01-01

    This document is a collection of most of the papers used by the speakers of the European Seminar on Energy Supply Security organised in Paris (at the French Ministry of Economy, Finance and Industry) on 24 November 2000 by the General Direction of Energy and Raw Materials, in co-operation with the European Commission and the French Planning Office. About 250 attendees were present, including a lot of high level Civil Servants from the 15 European State members, and their questions have allowed to create a rich debate. It took place five days before the publication, on 29 November 2000, by the European Commission, of the Green Paper 'Towards a European Strategy for the Security of Energy Supply'. This French initiative, which took place within the framework of the European Presidency of the European Union, during the second half-year 2000. will bring a first impetus to the brainstorming launched by the Commission. (author)

  20. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  1. A broadened typology on energy and security

    International Nuclear Information System (INIS)

    Johansson, Bengt

    2013-01-01

    A broadened typology describing the interconnection between energy and security is developed in this paper, with the aim of improving understanding of the relationship between energy and security by applying different research and policy perspectives. One approach involves studying energy as an object exposed to security threats, using concepts such as security of supply or security of demand. Another approach involves studying the role of the energy system as the subject in generating or enhancing insecurity. The latter approach includes studying the conflict-generating potential inherent in the economic value of energy, the risk of accidents and antagonistic attacks to energy infrastructure and the security risks related to the negative environmental impact of the energy system. In order to make a comprehensive analysis of the security consequences of proposed energy policies or strategies, all these aspects should be taken into account to varying degrees. The typology proposed here could be a valuable tool for ensuring that all security aspects have been considered. - Highlights: • The paper presents a broadened typology of energy and security, useful for policy analysis. • The energy system can be an object for security threats and as a subject generating or contributing to insecurity. • Energy as an object for security threats includes the concepts of security of supply and security of demand. • The economic value of energy can contribute to insecurity. • Technological and environmental risks of specific energy systems also provide potential threats to human security

  2. The security of energy supplies in Europe

    International Nuclear Information System (INIS)

    Vuillemin, Francois

    2002-01-01

    As an attempt occurred against a French oil tanker in the Persian Gulf (in 2002), and showed that security of oil supplies is not only related to oil shock or to political environment such as the Cold War, this article discusses issues of security for European energy supplies. It first addresses the situation and the evolution of energy needs and resources in the World and in Europe: predictions of evolution of consumption and production, major role of fossil fuels in the European consumption. It discusses the outage risks: the supply security can be analysed with respect to consumption per sector, per usage or per energy product, and Europe must face three major risks (no more hydrocarbon resources at a reasonable cost, economic risk due to market volatility, geopolitical risk). The next part discusses the perspective of a European strategy. It identifies several elements of choice for Europe in terms of energy demand management, of opening up to competition of electricity and gas markets. It discusses European ambitions in terms of supply security: need of a community framework, actual propositions of a directive for oil and gas

  3. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  4. Security of supply in the liberalized energy market

    International Nuclear Information System (INIS)

    Boffa, Federico

    2007-01-01

    The incentive schemes in the liberalized energy markets do not ensure short-term security of supply. The paper analyzes the regulatory measures suitable to tackle the issue, and evaluates their effects on market power [it

  5. Energy and non-traditional security (NTS) in Asia

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  6. China's energy security and strategic choices

    International Nuclear Information System (INIS)

    Pellistrandi, J.

    2010-01-01

    Considering the present day international political and economical situation, China's energy security covers five important aspects: energy supplies security, energy prices security, environment security with respect to energy consumption, energy transport security, R and D security in the domain of energy resources exploration, exploitation and utilisation. Considering the above-mentioned aspects, China's strategic choices should include five major goals: counting on its own energy resources and giving priority to energy saving, participating to the international competition and implementing a national strategic reserves system, readjusting the energy consumption structure and promoting environment protection by developing nuclear energy, harmonizing China's relations with some countries and avoiding political and military conflicts, increasing investment in energy R and D, in particular in clean coal, nuclear, automotive, renewable energy and energy saving technologies. (J.S.)

  7. Big data, little security: Addressing security issues in your platform

    Science.gov (United States)

    Macklin, Thomas; Mathews, Joseph

    2017-05-01

    This paper describes some patterns for information security problems that consistently emerge among traditional enterprise networks and applications, both with respect to cyber threats and data sensitivity. We draw upon cases from qualitative studies and interviews of system developers, network operators, and certifiers of military applications. Specifically, the problems discussed involve sensitivity of data aggregates, training efficacy, and security decision support in the human machine interface. While proven techniques can address many enterprise security challenges, we provide additional recommendations on how to further improve overall security posture, and suggest additional research thrusts to address areas where known gaps remain.

  8. Sensitive Security Information and Transportation Security: Issues and Congressional Options

    National Research Council Canada - National Science Library

    Sollenberger, Mitchel A

    2004-01-01

    .... TSA's application of the SSI regulations has, however, resulted in some controversies over airport security procedures, employee accountability, passenger screening, and airport secrecy agreements...

  9. The Security of Energy Supply and the Contribution of Nuclear Energy

    International Nuclear Information System (INIS)

    2011-01-01

    What contribution can nuclear energy make to improve the security of energy supply? This study, which examines a selection of OECD member countries, qualitatively and quantitatively validates the often intuitive assumption that, as a largely domestic source of electricity with stable costs and no greenhouse gas emissions during production, nuclear energy can make a positive contribution. Following an analysis of the meaning and context of security of supply, the study uses transparent and policy-relevant indicators to show that, together with improvements in energy efficiency, nuclear energy has indeed contributed significantly to enhanced energy supply security in OECD countries over the past 40 years. Content: Foreword; Executive Summary; 1. The Security of Energy Supply and the Contribution of Nuclear Energy - Concepts and Issues: - Energy supply security: An introduction, - Why security of energy supply remains a policy issue in OECD countries, - The external dimension: import dependence, resource exhaustion and carbon policy, - The internal dimension: economic, financial and technical considerations for energy supply security - Orientations for government policies to enhance the security of energy supply, - Conclusions; 2. Indicators and Models for Measuring Security of Energy Supply Risks: - Introduction, - Different approaches towards designing the Supply/Demand Index, - A detailed review of selected security of supply indicators, - Comprehensive models for assessing the security of energy supply, - The Supply/Demand Index, - Concluding observations; 3. Evolution of the Security of Energy Supply in OECD Countries: - Time-dependent quantification of the security of energy supply, - Changes in security of supply in selected OECD countries, - Electricity generation and the security of energy supply, - The contribution of nuclear energy and energy intensity to the security of energy supply, - The geographical distribution of SSDI values, - Conclusions; 4. Public

  10. Security Issues in E-Business Platforms

    OpenAIRE

    Defta Costinela – Luminita; Iacob Nicoleta - Magdalena

    2011-01-01

    E-business consists mostly in the implementation of the business processes by using the information technology and internet services. Since all business processes must be connected to the internet and available for users, the choice of the information solutions on which e-business is built is crucial for the security. Now more than ever, businesses need to be concerned about the security of their networks. In this paper we will highlight the security threats related to the e-business platform...

  11. Border Security: Immigration Issues in the 108th Congress

    National Research Council Canada - National Science Library

    Seghetti, Lisa M

    2004-01-01

    .... Prior to the terrorist attacks, the priorities for border security policy were beginning to shift from immigration-related issues to issues related to facilitating legitimate cross-border commerce...

  12. Energy shortages in Europe? strategic meetings on energy security

    International Nuclear Information System (INIS)

    Derdevet, M.

    2005-01-01

    On the RTE's initiative, the Economic and Social Council welcome the first 'Strategic Meetings on Energy Security' event on July 11, 2005. With its 'Energy Shortages in Europe?' subtitle, the convention was in line with the topical issue of oil price increases. Opening the convention, Hubert Bouchet, the vice-president of the Research and Technology Productive Activities section of the Economic and Social Council (CES) stated that with its 400 million citizens, Europe uses over 2 500 tWh of electricity a year, and that its demand for primary energy is growing, making it the largest importer of energy in the world and the top second user after the United States. The trend should continue at least until 2030. H Bouchet also stress that though the worlds is using increasing amounts of energy, over 1.5 billion people do not have access to modern energy sources. Therefore, there are huge needs. There were four round-tables introducing rich debates with the room. The first one was about the issue of the 'energy market: the end of overcapacity', and the second one, dedicated so secure supplies, was titled: 'An ill adapted regulatory framework and European context'. In the afternoon, exchanges covered 'Strategies to prepare the energy offer for new stakes' and 'Major strategies for France and Europe'. (author)

  13. Safeguards and security issues for the disposition of fissile materials

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.; Mangan, D.L.; Tolk, K.M.; Rutherford, D.; Fearey, B.; Moore, L.

    1995-01-01

    The Department of Energy's Office of Fissile Material Disposition (FMD) is analyzing long-term storage and disposition options for surplus weapons-usable fissile materials, preparing a programmatic environmental impact statement (PEIS), preparing for a record of decision (ROD) regarding this material and conducting other activities. The primary security objectives of this program are to reduce major security risks and strengthen arms reduction and nonproliferation (NP). To help achieve these objectives, a safeguards and security (S ampersand S) team consisting of participants from Sandia, Los Alamos, and Lawrence Livermore National Laboratories was established. The S ampersand S activity for this program is a cross-cutting task which addresses all of the FMD program options. It includes both domestic and international safeguards and includes areas such as physical protection, nuclear materials accountability and material containment and surveillance. This paper will discuss the activities of the Fissile Materials Disposition Program (FMDP) S ampersand S team as well as some specific S ampersand S issues associated with various FMDP options/facilities. Some of the items to be discussed include the threat, S ampersand S requirements, S ampersand S criteria for assessing risk, S ampersand S issues concerning fissile material processing/facilities, and international and domestic safeguards

  14. Security issues in a parking facility.

    Science.gov (United States)

    Gutman, Abraham; Lew, I Paul

    2009-01-01

    Active security supported by passive security measures which are part of the physical design of a parking facility are essential to preventing crimes from happening wherever and whenever possible, the authors maintain. In the article, they focus on design elements which can be most effective in discouraging potential perpetrators.

  15. US oil dependency and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-01-01

    The three papers of this document were written in the framework of a seminar organized the 30 may 2002 by the IFRI in the framework of its program Energy and Climatic Change. The first presentation deals with the american oil policy since 1980 (relation between the oil dependence and the energy security, the Reagan oil policy, the new oil policy facing the increase of the dependence). The second one deals with the US energy security (oil security, domestic energy security, policy implications). The last presentation is devoted to the US oil dependence in a global context and the problems and policies of international energy security. (A.L.B.)

  16. It Security Issues Within the Video Game Industry

    OpenAIRE

    STEPHEN MOHR; SYED (SHAWON) RAHMAN,

    2011-01-01

    IT security issues are an important aspect for each and every organization within the video game industry. Within the video game industry alone, you might not normally think of security risks being an issue. But as we can and have seen in recent news, no company is immune to security risks no matter how big or how small. While each of these organizations will never be exactly the same as the next, there are common security issues that can and do affect each and every video game company. In or...

  17. Measuring the security of energy exports demand in OPEC economies

    International Nuclear Information System (INIS)

    Dike, Jude Chukwudi

    2013-01-01

    One of the objectives of OPEC is the security of demand for the crude oil exports of its members. Achieving this objective is imperative with the projected decline in OECD countries' crude oil demand among other crude oil demand shocks. This paper focuses on determining the external crude oil demand security risks of OPEC member states. In assessing these risks, this study introduces two indexes. The first index, Risky Energy Exports Demand (REED), indicates the level of energy export demand security risks for OPEC members. It combines measures of export dependence, economic dependence, monopsony risk and transportation risk. The second index, Contribution to OPEC Risk Exposure (CORE), indicates the individual contribution of the OPEC members to OPEC's risk exposure. This study utilises the disaggregated index approach in measuring energy demand security risks for crude oil and natural gas and involves a country level analysis. With the disaggregated approach, the study shows that OPEC's energy export demand security risks differ across countries and energy types. - Highlights: • REED and CORE indexes are suitable measures for energy exports demand security risk. • The indexes show that energy demand security risk is different for each OPEC country. • The countries contribution to OPEC's energy demand security risk is also different. • The outcome is necessary for OPEC's common energy and climate change policies. • The outcome makes a case for oil demand security as a topical issue in the literature

  18. Legal, privacy, security, access and regulatory issues in cloud computing

    CSIR Research Space (South Africa)

    Dlodlo, N

    2011-04-01

    Full Text Available a gap on reporting are on are legal , privacy, security, access and regulatory issues. This paper raises an awareness of legal, privacy, security, access and regulatory issues that are associated with the advent of cloud computing. An in...

  19. The Conceptualization of Energy Security: the International Experience

    Directory of Open Access Journals (Sweden)

    Muzychenko Mykola V.

    2017-08-01

    Full Text Available The article reviews and analyzes existing interpretations of the term of «energy security», which are used by international organizations, individual countries, and foreign scientists. As result of a generalization of the numerous existing conceptual-methodical and substantive approaches to the definition of energy security, its main components and possible ways of its ensuring, it has been found that the concept of energy security includes many multifactor components that are interconnected by numerous functional linkages, including economic, political, social, and ecological aspects. The issues related to geology, geography, and time factor have impact on interpretation of energy security. But in general, energy security can be seen in a one-aspect dimension that is largely based on the security of energy supplies (availability of energy resources and in a multi-aspect dimension which, in addition to the security of energy supplies, also takes into consideration a number of other important interrelated aspects of energy security, particularly in the areas of accessibility of energy resources, energy efficiency, and environmental safety.

  20. Survey of Security and Privacy Issues of Internet of Things

    OpenAIRE

    Borgohain, Tuhin; Kumar, Uday; Sanyal, Sugata

    2015-01-01

    This paper is a general survey of all the security issues existing in the Internet of Things (IoT) along with an analysis of the privacy issues that an end-user may face as a consequence of the spread of IoT. The majority of the survey is focused on the security loopholes arising out of the information exchange technologies used in Internet of Things. No countermeasure to the security drawbacks has been analyzed in the paper.

  1. CRITICAL REVIEW OF OPENSTACK SECURITY: ISSUES AND WEAKNESSES

    OpenAIRE

    Hala Albaroodi; Selvakumar Manickam; Parminder Singh

    2014-01-01

    The purpose of this study is to examine the state of both cloud computing security in general and OpenStack in particular. Conducting a reassessment of cloud computing security can provide a greater understanding of how cloud computing functions and what types of security issues arise therein. This study is divided into two parts; in the first part, the background of cloud computing and its different deployment models are discussed. This section also describes various security challenges that...

  2. Global Security Contingency Fund: Summary and Issue Overview

    Science.gov (United States)

    2014-04-04

    Diplomacy and Development Review (QDDR), Washington, D.C., December 2010, p. 203; Gordon Adams and Rebecca Williams, A New Way Forward: Rebalancing ...Williams, A New Way Forward: Rebalancing Security Assistance Programs and (continued...) Global Security Contingency Fund: Summary and Issue Overview...a large security assistance portfolio . But others may point to the State Department’s creation of new programs under the Security Assistance

  3. Internet of Cloud: Security and Privacy issues

    OpenAIRE

    Cook, Allan; Robinson, Michael; Ferrag, Mohamed Amine; Maglaras, Leandros A.; He, Ying; Jones, Kevin; Janicke, Helge

    2017-01-01

    The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2) to present security and privacy problems that these systems face. We thoroughly investigate current security and privacy preservation solutions th...

  4. Security and privacy issues of personal health.

    Science.gov (United States)

    Blobel, Bernd; Pharow, Peter

    2007-01-01

    While health systems in developed countries and increasingly also in developing countries are moving from organisation-centred to person-centred health service delivery, the supporting communication and information technology is faced with new risks regarding security and privacy of stakeholders involved. The comprehensively distributed environment puts special burden on guaranteeing communication security services, but even more on guaranteeing application security services dealing with privilege management, access control and audit regarding social implication and connected sensitivity of personal information recorded, processed, communicated and stored in an even internationally distributed environment.

  5. National Security Education Program: Background and Issues

    National Research Council Canada - National Science Library

    Kuenzi, Jeffrey J; Riddle, Wayne C

    2005-01-01

    ... knowledgeable about the languages and cultures of foreign nations, especially those which are of national security concern and have not traditionally been the focus of American interest and study...

  6. Fossil energy and food security

    International Nuclear Information System (INIS)

    Folke, G.

    2001-01-01

    To fulfil the basic goal of delivering food for the tables of the citizens, modern Western agriculture is extremely dependent on supporting material flows, infrastructure, and fossil energy. According to several observers, fossil fuel production is about to peak, i.e., oil extraction is no longer capable of keeping pace with the increasing demand. This situation may trigger an unprecedented increase in fossil energy prices, which may make the current highly energy dependent food production-distribution system highly vulnerable. The paper starts with a survey of this vulnerability. Also, the supply of phosphorus, a key factor in agriculture, may be at stake under such circumstances. The paper analyses this situation and discusses settlement structures integrated with agriculture that might increase food security by reducing energy demands. In the proposed ideal societal structure, agriculture is integrated with settlements and most of the food needed by the population is produced locally, and the nutrients for food production are recycled from households and animals by means of biological processes demanding considerably less mechanical investment and fossil support energy than the conventional type of agriculture. The vulnerability of this structure would be considerably lower, than that of the current system. (author)

  7. Secure coprocessing applications and research issues

    Energy Technology Data Exchange (ETDEWEB)

    Smith, S.W.

    1996-08-01

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  8. CSIR ScienceScope: An Energy-secure South Africa

    CSIR Research Space (South Africa)

    CSIR

    2009-06-01

    Full Text Available issues, especially as buildings use more than 25% of national energy consumption. "An Energy-secure South Africa" the theme of this ScienceScope, features a multidisciplinary projects of the R&D work done on alternative energy solutions, clean and cleaner...

  9. Security Requirements – Analysis of the Issue

    Directory of Open Access Journals (Sweden)

    Jhon Vincent

    2013-12-01

    Full Text Available Needs about security are matters little taken into account when managing requirements engineering , and when considered in the life cycle of the system , they tend to become a general list of functions, as password of protection , firewalls , virus detection tools , and other similar. But in fact, they cannot be considered as requirements of security, because they are implementation mechanisms to try to meet unspecified requirements, as an authenticated access. As a result, the security requirements for the system are ignored, which are required to protect essential services and assets, besides, when are specified, is not considered the prospect of future attacks. This paper describes the need for a systematic approach to managing security requirements engineering, in order to help avoid the problem of generic lists and take into account the future perspective. Several related approaches are described and also are provided references additional material that can help requirements engineers to ensure that their products be taken into account, effectively , the security requirements.

  10. Maritime energy and security: Synergistic maximization or necessary tradeoffs?

    International Nuclear Information System (INIS)

    Nyman, Elizabeth

    2017-01-01

    Offshore energy is big business. The traditional source of maritime energy, offshore petroleum and gas, has been on the rise since a reliable method of extraction was discovered in the mid-20th century. Lately, it has been joined by offshore wind and tidal power as alternative “green” sources of maritime energy. Yet all of this has implications for maritime environmental regimes as well, as maritime energy extraction/generation can have a negative effect on the ocean environment. This paper considers two major questions surrounding maritime energy and environmental concerns. First, how and why do these two concerns, maritime energy and environmental protection, play against each other? Second, how can states both secure their energy and environmental securities in the maritime domain? Maximizing maritime energy output necessitates some environmental costs and vice versa, but these costs vary with the type of offshore energy technology used and with the extent to which states are willing to expend effort to protect both environmental and energy security. - Highlights: • Security is a complicated concept with several facets including energy and environmental issues. • Offshore energy contributes to energy supply but can have environmental and monitoring costs. • Understanding the contribution of offshore energy to security depends on which security facet is deemed most important.

  11. Privacy and security issues in a digital world

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, W.; Petkovic, M.; Jonker, W.

    2007-01-01

    This chapter reviews the most important security and privacy issues of the modern digital world, emphasizing the issues brought by the concept of ambient intelligence. Furthermore, the chapter explains the organization of the book, describing which issues and related technologies are addressed by

  12. Privacy and Security Issues in a Digital World

    NARCIS (Netherlands)

    Petkovic, M.; Jonker, Willem

    2007-01-01

    This chapter reviews the most important security and privacy issues of the modern digital world, emphasizing the issues brought by the concept of ambient intelligence. Furthermore, the chapter explains the organization of the book, describing which issues and related technologies are addressed by

  13. Contribution of Renewables to Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-07-01

    The environmental benefits of renewable energy are well known. But the contribution that they can make to energy security is less widely recognised. This report aims to redress the balance, showing how in electricity generation, heat supply, and transport, renewables can enhance energy security and suggesting policies that can optimise this contribution.

  14. How is health a security issue? Politics, responses and issues.

    Science.gov (United States)

    Lo Yuk-ping, Catherine; Thomas, Nicholas

    2010-11-01

    In the closing decade of the 20th century the myriad challenges posed by infectious disease in a globalized environment began to be re-conceptualized as threats to national and human security. The most widely applied model for identifying and responding to such threats is securitization theory, as proposed by the Copenhagen School. Although its analytical framework is generally accepted, its utility remains contested; especially in non-European and non-state settings. The papers in this special edition have several aims: (1) to analyse ways by which Asian states and international organizations have identified health challenges as security threats, (2) to draw upon the securitization model as a way of understanding the full extent to which these states and international organizations have responded to the health threat, and (3) to identify areas where the theory might be strengthened so as to provide greater analytical clarity in areas of health security. This paper acts as a broad introduction to a set of papers on 'Unhealthy governance' and explores some of the key findings from the subsequent papers.

  15. Secure Energy Supply 2009. Welcome address

    International Nuclear Information System (INIS)

    Slugen, V.

    2009-01-01

    In this invitation lecture professor Slugen (President of Slovak Nuclear Society and President of European Nuclear Society) invited the participants of the International Conference: Secure Energy Supply 2009.

  16. Brainjacking: Implant Security Issues in Invasive Neuromodulation.

    Science.gov (United States)

    Pycroft, Laurie; Boccard, Sandra G; Owen, Sarah L F; Stein, John F; Fitzgerald, James J; Green, Alexander L; Aziz, Tipu Z

    2016-08-01

    The security of medical devices is critical to good patient care, especially when the devices are implanted. In light of recent developments in information security, there is reason to be concerned that medical implants are vulnerable to attack. The ability of attackers to exert malicious control over brain implants ("brainjacking") has unique challenges that we address in this review, with particular focus on deep brain stimulation implants. To illustrate the potential severity of this risk, we identify several mechanisms through which attackers could manipulate patients if unauthorized access to an implant can be achieved. These include blind attacks in which the attacker requires no patient-specific knowledge and targeted attacks that require patient-specific information. Blind attacks include cessation of stimulation, draining implant batteries, inducing tissue damage, and information theft. Targeted attacks include impairment of motor function, alteration of impulse control, modification of emotions or affect, induction of pain, and modulation of the reward system. We also discuss the limitations inherent in designing implants and the trade-offs that must be made to balance device security with battery life and practicality. We conclude that researchers, clinicians, manufacturers, and regulatory bodies should cooperate to minimize the risk posed by brainjacking. Copyright © 2016 Elsevier Inc. All rights reserved.

  17. Option valuation for energy issues

    International Nuclear Information System (INIS)

    Ostertag, K.; Llerena, P.; Richard, A.

    2004-01-01

    In many industrial and economic situations, decision processes, both individual and collective, have to simultaneously face uncertainty and irreversibility of some kind. This is particularly valid for energy choices if they are linked to technological alternatives. The purpose of this book is to highlight specific aspects of these situations. This is done from the particular perspective of option valuation. The contributions to this book grew out of an international workshop on ''Option valuation in energy and environmental issues'' held at the Fraunhofer ISI in February 2003. This workshop brought together reseachers from energy economics, but also researchers working on option valuation in other empirical fields or with a more theoretical perspective. This is reflected in the organisation of the book, which starts with some theory-oriented contributions and subsequently presents more applied contributions in the field of energy economics with an extension to water infrastructure in the annex. (orig.)

  18. Security of supply and regulation of energy networks

    International Nuclear Information System (INIS)

    Jamasb, Tooraj; Pollitt, Michael

    2008-01-01

    In recent years, the security of energy supplies has re-emerged as a central issue in the energy policy arena in the UK and elsewhere. This re-emergence takes place against a backdrop of increased liberalisation of the energy markets, so that security of supply needs to be revisited within this context. Security of supply is multifaceted, but is often discussed in terms of physical availability of energy sources and their commodity price risk. This paper discusses the relationship between security of supply and network regulation - that is, how the energy networks, and appropriate regulation of them, can contribute to security of supply in liberalised energy sectors. Energy networks are predominantly natural monopolies and as a result are generally subject to regulatory oversight. We discuss a range of issues and trends that pose challenges and opportunities to network regulation and which call for new and innovative measures. The paper identifies a number of areas where network regulation can play a significant role in increasing the security of supply of future energy systems. (author)

  19. Energy security strategy and nuclear power

    International Nuclear Information System (INIS)

    Toichi, Tsutomu; Shibata, Masaharu; Uchiyama, Yoji; Suzuki, Tatsujiro; Yamazaki, Kazuo

    2006-01-01

    This special edition of 'Energy security strategy and nuclear power' is abstracts of the 27 th Policy Recommendations 'The Establishment of an International Energy Security System' by the Japan Forum on International Relations, Inc on May 18 th , 2006. It consists of five papers: Energy security trend in the world and Japan strategy by Tsutomu Toichi, Establishment of energy strategy supporting Japan as the focus on energy security by Masaharu Shibata, World pays attention to Japan nuclear power policy and nuclear fuel cycle by Yoji Uchiyama, Part of nuclear power in the energy security - the basic approach and future problems by Tatsujiro Suzuki, and Drawing up the energy strategy focused on the national interests - a demand for the next government by Kazuo Yamazaki. (S.Y.)

  20. Oil and international security: old and new issues

    International Nuclear Information System (INIS)

    Noel, P.

    1998-09-01

    This paper questions the effectiveness of the link between international oil and (inter)national security. First, it explains an acknowledge the rise and decline of the traditional case of this link: the threat that so called ''oil dependence'' inflicts upon the national economy, hence the problem it raises for government. The reason for that decline is looked for in the emergence of multiple forms of competition in oil and energy markets, making the ''oil weapon'' less credible and its use less desirable and less possible. In oil like in any other commodity, the normal situation is the competition between suppliers for access to markets. For all basic economics tells us and experience has confirmed, analyses and policies (at least in France) are still strongly influenced by the ''oil security'' thinking shaped in the eve of the 1970 crises. Yet, those fallacies may be the strongest obstacle to the acknowledgment of the real oil security issues we face. The main one is the possible political destabilization of the Middle East due to oil competition between its members in an increasingly competitive world market. The consequences on regional antagonisms of the come back of Iraqi oil to the market on one hand, the internal stability of Iran and Saudi Arabia in a situation of lasting low oil revenues on the other hand, are reviewed as the main possible factors of regional destabilization in a context of strong competition in the world oil market. A large scale political burst with major oil producers concerned would certainly hurt developed and developing economy. That leads us to this paradoxical situation: the very cause of the decline of the traditional oil dependence issue is, due to Middle East situation, the main cause of possible destabilization of world oil market today. (author)

  1. The Superpowers: Nuclear Weapons and National Security. National Issues Forums.

    Science.gov (United States)

    Mitchell, Greg; Melville, Keith

    Designed to stimulate thinking about United States-Soviet relationships in terms of nuclear weapons and national security, this document presents ideas and issues that represent differing viewpoints and positions. Chapter 1, "Rethinking the U.S.-Soviet Relationship," considers attempts to achieve true national security, and chapter 2,…

  2. Energy - Resources, technologies and power issues

    International Nuclear Information System (INIS)

    Mazzucchi, Nicolas

    2017-01-01

    For a better understanding of complex relationships between States, enterprises and international bodies, the author proposes a detailed analysis of power issues which structure the energy sector at the world level. He first considers the energy policy of a country as a result of an arbitration between three main concerns (access to energy, energy security, and struggle against climate change) which are differently addressed depending on consumption and production profiles of the country, and on its geographic and political characteristics. The author then proposes a synthetic overview of this landscape by analysing the history of exploitation of different energy sources (oil, coal, gas, uranium) and by proposing a regional analysis of resources. In the next part, he addresses various aspects of energy transports (bottlenecks of sea transport, trans-national grids, geopolitical restructuring of pipelines in front of the development of new LNG terminals). Then, for different regions, he describes the various modes of energy consumption, and challenges related to the transformation of this consumption due to the emergence of renewable energies. He analyses and discusses international mechanisms which underlie energy markets, and power issues which govern them. He shows that nuclear and renewable energies in fact strengthen the dependence on strategic materials and on technological companies. A chapter proposes an analysis of relationships between three prevailing actors in the elaboration of energy policies (enterprises, State and civil society) with their reciprocal influences, moments of collaboration, and information exchange or withholding. The last chapter addresses the study of power rivalries in the elaboration of policies for the struggle against climate change, and proposes a critical review of international organisations which square them

  3. Nuclear energy technology transfer: the security barriers

    International Nuclear Information System (INIS)

    Rinne, R.L.

    1975-08-01

    The problems presented by security considerations to the transfer of nuclear energy technology are examined. In the case of fusion, the national security barrier associated with the laser and E-beam approaches is discussed; for fission, the international security requirements, due to the possibility of the theft or diversion of special nuclear materials or sabotage of nuclear facilities, are highlighted. The paper outlines the nuclear fuel cycle and terrorist threat, examples of security barriers, and the current approaches to transferring technology. (auth)

  4. The Role of Target Leverage in Security Issues and Repurchases

    OpenAIRE

    Armen Hovakimian

    2004-01-01

    The paper examines whether security issues and repurchases adjust the capital structure toward the target. The time-series patterns of debt ratios imply that only debt reductions are initiated to offset the accumulated deviation from target leverage. The importance of target leverage in earlier debt-equity choice studies is driven by the subsample of equity issues accompanied by debt reductions. Unlike debt issues and reductions, equity issues and repurchases have no significant lasting effec...

  5. Nuclear safety and energy supply security: conflict or goal?

    International Nuclear Information System (INIS)

    Kutas, S.

    2006-01-01

    Energy generation and safety problems at the nuclear power plant have been analysed. Nuclear power plants are operated on the commercial basis in many countries today. Safety and security in energy generation and distribution is a complex problem. Energy supply reliability, security energy price and other issues should be co-ordinated and solved at the same time. Decentralisation and deregulation means new challenges for regulatory bodies and assurance of security. International co-operation in this field is very important. Western European Nuclear Regulators' Association (WENRA) consolidates efforts of regulatory bodies of European countries in order to harmonize approaches of nuclear safety. Nuclear Safety, and security of energy supply is the task and goal at the same time. (author)

  6. Energy security: between markets and sovereign politics

    Directory of Open Access Journals (Sweden)

    Dudau Radu

    2016-09-01

    Full Text Available Energy security is a constant presence in the energy-related political discourse all over the world. States strive to secure steady inflows of needed energy supplies, as well as the price affordability of those supplies. However, what are deemed to be the best means to meet such goals depends on one’s theoretical vantage point. On the one hand, economically-minded theorists maintain that energy security is only a matter of market rules and interactions. Thus, they call upon energy markets to deliver both steady supplies and competitive prices. On the other hand, politically-minded scholars emphasize the political and hard-power nature of international energy trades, especially in a global context market by the emergence of state-centered, authoritarian regimes that use large national energy companies as foreign policy instruments. These two positions delineate competing approaches to how energy security risks ought to be managed. The former approaches energy security risks by means similar to portfolio management, requiring diversification of investments in order to insulate them from market shocks. The latter approaches energy security as a matter of foreign policy, by which states envisage interest coordination and favorable alignments within countervailing alliances against the agent of energy security risk. The present paper goes beyond the uncontentious point that these two dimensions are complementary. It argues that, depending on the international context, a more market-driven or a more-politically driven behavior may be adequate.

  7. Major issues in the training of security personnel

    International Nuclear Information System (INIS)

    Knauf, W.M.; Robertson, L.P.

    1982-01-01

    The effectiveness of the response component of a physical protection system depends greatly upon the training received by the security personnel. The issues and problems in the area of training which were of greatest concern to the attendees of the 1980 and 1981 INMM sponsored Technical Workshops on Guard Training are discussed. The attendees were training supervisors of managers of security personnel and represented a variety of organizations and companies including DOE facilities, NRC licensees, the military, private security contractors, and governmental agencies. Major categories of concern include: professionalism in security, legal constraints and obligations, physical and psychological testing and standards, governmental requirements, morale and motivation, and tactical training techniques

  8. The cloud security ecosystem technical, legal, business and management issues

    CERN Document Server

    Ko, Ryan

    2015-01-01

    Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the most recent developments in business, legal, and international environments. The book holistically discusses key research and policy advances in cloud security - putting technical and management issues together with an in-depth treaties on a multi-disciplinary and international subject. The book features contributions from key tho

  9. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2011-12-01

    Full Text Available Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs. Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  10. Security issues in healthcare applications using wireless medical sensor networks: a survey.

    Science.gov (United States)

    Kumar, Pardeep; Lee, Hoon-Jae

    2012-01-01

    Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs). Current WMSN healthcare research trends focus on patient reliable communication, patient mobility, and energy-efficient routing, as a few examples. However, deploying new technologies in healthcare applications without considering security makes patient privacy vulnerable. Moreover, the physiological data of an individual are highly sensitive. Therefore, security is a paramount requirement of healthcare applications, especially in the case of patient privacy, if the patient has an embarrassing disease. This paper discusses the security and privacy issues in healthcare application using WMSNs. We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security. Our aim is to instigate discussion on these critical issues since the success of healthcare application depends directly on patient security and privacy, for ethic as well as legal reasons. In addition, we discuss the issues with existing security mechanisms, and sketch out the important security requirements for such applications. In addition, the paper reviews existing schemes that have been recently proposed to provide security solutions in wireless healthcare scenarios. Finally, the paper ends up with a summary of open security research issues that need to be explored for future healthcare applications using WMSNs.

  11. The Campus Executive's Role in Security and Liability Issues.

    Science.gov (United States)

    Bromley, Max; Territo, Leonard

    1986-01-01

    Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)

  12. Energy Security and Sub-Saharan Africa

    Directory of Open Access Journals (Sweden)

    Emily Meierding

    2013-02-01

    Full Text Available Published by Palgrave MacmillanOver the last decade the topic of energy security has reappeared on global policy agendas. Most analyses of international energy geopolitics examine the interests and behaviour of powerful energy-importing countries like the US and China. This chapter begins by examining foreign powers’ expanded exploitation of oil and uranium resources in Sub-Saharan Africa. It goes on to examine how energy importers’ efforts to enhance their energy security through Africa are impacting energy security within Africa. It assesses Sub-Saharan states’ attempts to increase consumption of local oil and uranium reserves. Observing the constraints on these efforts, it then outlines some alternative strategies that have been employed to enhance African energy security. It concludes that, while local community-based development projects have improved the well-being of many households, they are not a sufficient guarantor of energy security. Inadequate petroleum access, in particular, remains a development challenge. Foreign powers’ efforts to increase their oil security are undermining the energy security of Sub-Saharan African citizens.

  13. China's energy security: Perception and reality

    International Nuclear Information System (INIS)

    Leung, Guy C.K.

    2011-01-01

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: → Oil is the form of energy that has produced most of China's energy insecurity. → Transport sector, rather than industry, is the largest driver of China's oil demand. → The contribution of oil pipelines to China's energy security is smaller than many assumed. → Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. → Energy security is a means; it is not a goal.

  14. Issues in vibration energy harvesting

    Science.gov (United States)

    Zhang, Hui; Corr, Lawrence R.; Ma, Tianwei

    2018-05-01

    In this study, fundamental issues related to bandwidth and nonlinear resonance in vibrational energy harvesting devices are investigated. The results show that using bandwidth as a criterion to measure device performance can be misleading. For a linear device, an enlarged bandwidth is achieved at the cost of sacrificing device performance near resonance, and thus widening the bandwidth may offer benefits only when the natural frequency of the linear device cannot match the dominant excitation frequency. For a nonlinear device, since the principle of superposition does not apply, the ''broadband" performance improvements achieved for single-frequency excitations may not be achievable for multi-frequency excitations. It is also shown that a large-amplitude response based on the traditional ''nonlinear resonance" does not always result in the optimal performance for a nonlinear device because of the negative work done by the excitation, which indicates energy is returned back to the excitation. Such undesired negative work is eliminated at global resonance, a generalized resonant condition for both linear and nonlinear systems. While the linear resonance is a special case of global resonance for a single-frequency excitation, the maximum potential of nonlinear energy harvesting can be reached for multi-frequency excitations by using global resonance to simultaneously harvest energy distributed over multiple frequencies.

  15. G-8 leaders tackle global energy security

    International Nuclear Information System (INIS)

    Quevenco, R.

    2006-01-01

    Leaders of the Group of 8 countries backed the IAEA's work at their annual summit held 15-17 July 2006 in St. Petersburg, Russia. A concluding summary statement endorsed IAEA programmes and initiatives in areas of nuclear safety, security, and safeguards. The G8 nations adopted a St. Petersburg Plan of Action to increase transparency, predictability and stability of the global energy markets, improve the investment climate in the energy sector, promote energy efficiency and energy saving, diversify energy mix, ensure physical safety of critical energy infrastructure, reduce energy poverty and address climate change and sustainable development. In a statement on global energy security, the G8 said countries who have or are considering plans for nuclear energy believe it will contribute to global energy security while reducing air pollution and addressing climate change. The G8 said it acknowledged the efforts made in development by the Generation IV International Forum (GIF) and the IAEA's International Project on Innovative Nuclear Reactors and Fuel Cycles (INPRO). GIF and INPRO both bring together countries to develop next generation nuclear energy systems, including small reactors, very high temperature reactors and supercritical water-cooled reactors. The G8 reaffirmed its full commitment to all three pillars of the NPT and called on all States to comply with their NPT obligations, including IAEA safeguards as well as developing effective measures aimed at preventing trafficking in nuclear equipment, technology and materials. The G8 is seeking universal adherence to IAEA comprehensive safeguards agreements and is actively engaged in efforts to make comprehensive safeguards agreements together with an Additional Protocol the universally accepted verification standard. The G8 noted that an expansion of the peaceful use of nuclear energy must be carried forward in a manner consistent with nuclear non-proliferation commitments and standards. It discussed concrete

  16. Public Energy Education: Issues for Discussion. Draft.

    Science.gov (United States)

    Public Energy Education Task Force.

    This paper was intended to stimulate discussion of energy education issues at a conference on energy issues. The discussion ranges through numerous topics at issue in energy education including public energy awareness, definition of public education, the distinction between public education and public relations, and the presentation of a model…

  17. A multilayered analysis of energy security research and the energy supply process

    International Nuclear Information System (INIS)

    Kiriyama, Eriko; Kajikawa, Yuya

    2014-01-01

    Highlights: • The analysis reveals that energy security research is highly multidisciplinary. • Diversification is important for ensuring security in the energy supply process. • A multilayered overview of the energy supply process is important for energy risk management. • Consumer lifestyle innovation will be a part of energy security in the future. - Abstract: After the Fukushima nuclear disaster, a reassessment of the energy system is needed in order to include such aspects as human security and resilience. More open and careful discussions are needed concerning the various risks and uncertainties of future energy options, both in Japan and globally. In this paper, we aim to offer a fundamental basis for discourse on energy security by analyzing the status and trends in academic publications on that issue. Our bibliometrics analysis indicates that research has shifted from promoting strategies for ensuring the self-sufficiency of the primary energy to diversification of the secondary energy supply chain by introducing energy networks consisting of an infrastructure established through international coordination. In the literature, the concept of energy security is ambiguous and allows for multiple interpretations. Our results illustrate the existence of highly multidisciplinary topics within energy security, which can be categorized into four perspectives: geopolitical, economic, policy related, and technological

  18. Climate: an issue of security or of strategic control?

    International Nuclear Information System (INIS)

    Mascre, D.

    2010-01-01

    For the United States, climate has become a national security issue. In September 2009 the CIA created a Centre for Climate Change to monitor space and the biosphere, and to verify the levels of pollution of every country worldwide. This initiative is more than just a new mission; it marks a change of policy which acknowledges the new security-related troika of climate, economy and strategic control. (author)

  19. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  20. ESCAPE. Energy Security and ClimAte Policy Evaluation

    International Nuclear Information System (INIS)

    Kessels, J.R.; Bakker, S.J.A.

    2005-05-01

    Climate change and energy supply security policy are currently not integrated in most countries, despite possible synergies. The ESCAPE approach suggests that linking climate change policy with security of energy supply could improve climate change policy at both a national and international level. The report explores the interaction between policies of energy security and climate change and the options of inclusion of energy security issues into national and international post-2012 climate negotiations. It emphasises the importance of the US in this regard and takes a close look at US energy policy documents. It appears that current US energy policy is not directed towards reducing its reliance on imported fossil fuel, even though the government has a strong preference for this. This study shows that measures to reduce import dependency are mostly synergetic with climate policy and gives some options that can be implemented. On an international level, linkages of energy security into post-2012 climate policy may be possible in sectoral bottom-up approaches or technology frameworks. As well, inclusion of a security of supply criterion in international emission trading instruments may provide potential benefits

  1. MAC layer security issues in wireless mesh networks

    Science.gov (United States)

    Reddy, K. Ganesh; Thilagam, P. Santhi

    2016-03-01

    Wireless Mesh Networks (WMNs) have emerged as a promising technology for a broad range of applications due to their self-organizing, self-configuring and self-healing capability, in addition to their low cost and easy maintenance. Securing WMNs is more challenging and complex issue due to their inherent characteristics such as shared wireless medium, multi-hop and inter-network communication, highly dynamic network topology and decentralized architecture. These vulnerable features expose the WMNs to several types of attacks in MAC layer. The existing MAC layer standards and implementations are inadequate to secure these features and fail to provide comprehensive security solutions to protect both backbone and client mesh. Hence, there is a need for developing efficient, scalable and integrated security solutions for WMNs. In this paper, we classify the MAC layer attacks and analyze the existing countermeasures. Based on attacks classification and countermeasures analysis, we derive the research directions to enhance the MAC layer security for WMNs.

  2. Disarmament and security issues in the Asia-Pacific region

    International Nuclear Information System (INIS)

    1992-01-01

    The main issues of the conference were focused on current political trends related to outstanding disputes between the state in Asia-Pacific region. Second cluster od issues which merits careful examination was concerned with the relevance of various arms control and disarmament measures. The tools of arms control and disarmament are proving to be more versatile, flexible instruments for security-building than was the case during the cold-war period. The third item of interest for many states in the Asia-Pacific region is the question of promoting new forums for regional dialogues on security matters

  3. Energy security - how far possible in reality?

    International Nuclear Information System (INIS)

    Das, Pradip Kumar; Bera, R.; Chaki, Dibabasu

    2014-01-01

    In the context of depletion of fossil fuels and continuous increase of global warming, future energy security is under a big question. Generation of energy in conventional method and utilization of energy always produces huge amount of pollution. That is why alternative sources of energy i.e. renewable power is highly solicited. But different factors like man, market, politics, population etc. play very important role in this chain. The authors are advocating that energy security problem is a techno-economic socio-political problem. (author)

  4. Evaluating energy security in the Asia-Pacific region: A novel methodological approach

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2010-01-01

    This paper establishes an 'energy security assessment instrument' based on a new and expanded conceptualisation of energy security. The instrument is a systematic interrogative tool for evaluating energy security of individual states or regions. It consists of eleven broad energy security dimensions associated with the current global energy system. These energy security dimensions take into account numerous quantitative and qualitative attributes of each country's energy security and policy, and include both traditional energy security concerns and many new factors, such as environmental, socio-cultural and technological. Another dimension, largely absent from previous analyses, is the existence of, and the issues addressed in, energy security policy in each country. This instrument serves as an assessment system with which to evaluate energy security in the Asia-Pacific region. The existing studies on energy security in the Asia-Pacific region suffer from serious limitations. No study to date examines regional energy security policies by adopting a more comprehensive energy security definition as a starting point. Most studies also focus on a single country or issue. Even if they examine energy security in major regional economies, they lack critical comparative analysis. The instrument is valuable as it may be utilised to draw a comprehensive map of regional energy security situation, which can also include comparative analysis of energy security characteristics across the Asia-Pacific region. Ultimately, it may be utilised to set up a framework for improved regional energy cooperation with the aim of providing regional leaders with a blueprint for improving regional energy security and policy.

  5. Energy security and climate change : a Canadian primer

    International Nuclear Information System (INIS)

    Gonick, C.

    2007-01-01

    This book addresses the reality of climate change and peak oil, and emphasizes the need to make the transition from carbon energies to renewable energies. The book is a compilation of 18 leading authorities' work on energy use and its impact on the environment. Various solutions and sustainable alternatives to carbon energy are proposed. The book links fossil fuels, including oil sands, as a major cause of climate change. The book also addresses other topical issues, such as the nuclear revival, the U.S. energy act and electricity, carbon trading, and energy security in Canada. The authors emphasize the need to act in a proactive way to ensure a sustainable future. refs.

  6. Energy Security in a Time of Plenty

    National Research Council Canada - National Science Library

    Clawson, Patrick

    1997-01-01

    Energy supply trends are good for Western security. Dependence on the volatile Persian Gulf may increase only slightly, as additional supplies come from stable pro-Western areas, such as Norway and Latin America...

  7. Secure messaging via the cloud and mobile devices: data security issues emerge with new technologies.

    Science.gov (United States)

    Prestigiacomo, Jennifer

    2011-05-01

    The secure messaging space is alive with new innovations that are moving the industry forward. Key in this space is the push toward moving secure messaging to the cloud and pushing it out to mobile devices. Among the examples are solutions that allow physicians to receive encrypted email on mobile devices, as well as ones that allow doctors to securely text-message each other to coordinate care. However, the security issues around these emerging technologies in this very active space must be further explored.

  8. Energy security and climate policy. Assessing interactions

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-03-28

    World energy demand is surging. Oil, coal and natural gas still meet most global energy needs, creating serious implications for the environment. One result is that CO2 emissions, the principal cause of global warming, are rising. This new study underlines the close link between efforts to ensure energy security and those to mitigate climate change. Decisions on one side affect the other. To optimise the efficiency of their energy policy, OECD countries must consider energy security and climate change mitigation priorities jointly. The book presents a framework to assess interactions between energy security and climate change policies, combining qualitative and quantitative analyses. The quantitative analysis is based on the development of energy security indicators, tracking the evolution of policy concerns linked to energy resource concentration. The 'indicators' are applied to a reference scenario and CO2 policy cases for five case-study countries: The Czech Republic, France, Italy, the Netherlands, and the United Kingdom. Simultaneously resolving energy security and environmental concerns is a key challenge for policy makers today. This study helps chart the course.

  9. Exogenous shocks and governing energy security

    OpenAIRE

    Diriöz, Ali Oğuz

    2017-01-01

    Cataloged from PDF version of article. Thesis (Ph.D.): Bilkent University, Department of International Relations, İhsan Doğramacı Bilkent University, 2017. Includes bibliographical references (leaves 219-248). The research examines how governments maintain energy security when faced with exogenous shocks. The main focus of inquiry examines the relative influence of markets vs. geopolitics in the area of energy security using the comparative case studies of Turkey, France, and Netherl...

  10. Evaluation of nuclear energy in the context of energy security

    International Nuclear Information System (INIS)

    Irie, Kazutomo; Kanda, Keiji

    2002-01-01

    This paper analyzes the view expressed by the Japanese government on the role of nuclear energy for energy security through scrutiny of Japan's policy documents. The analysis revealed that the contribution by nuclear energy to Japan's energy security has been defined in two ways. Nuclear energy improves short-term energy security with its characteristics such as political stability in exporting countries of uranium, easiness of stockpiling of nuclear fuels, stability in power generation cost, and reproduction of plutonium and other fissile material for use by reprocessing of spent fuel. Nuclear energy also contributes to medium- and long-term energy security through its characteristics that fissile material can be reproduced (multiplied in the case of breeder reactor) from spent fuels. Further contribution can be expected by nuclear fusion. Japan's energy security can be strengthened not only by expanding the share of nuclear energy in total energy supply, but also by improving nuclear energy's characteristics which are related to energy security. Policy measures to be considered for such improvement will include (a) policy dialogue with exporting countries of uranium, (b) government assistance to development of uranium mines, (c) nuclear fuel stockpiling, (d) reprocessing and recycling of spent fuels, (e) development of fast breeder reactor, and (f) research of nuclear fusion. (author)

  11. Reviews on Security Issues and Challenges in Cloud Computing

    Science.gov (United States)

    An, Y. Z.; Zaaba, Z. F.; Samsudin, N. F.

    2016-11-01

    Cloud computing is an Internet-based computing service provided by the third party allowing share of resources and data among devices. It is widely used in many organizations nowadays and becoming more popular because it changes the way of how the Information Technology (IT) of an organization is organized and managed. It provides lots of benefits such as simplicity and lower costs, almost unlimited storage, least maintenance, easy utilization, backup and recovery, continuous availability, quality of service, automated software integration, scalability, flexibility and reliability, easy access to information, elasticity, quick deployment and lower barrier to entry. While there is increasing use of cloud computing service in this new era, the security issues of the cloud computing become a challenges. Cloud computing must be safe and secure enough to ensure the privacy of the users. This paper firstly lists out the architecture of the cloud computing, then discuss the most common security issues of using cloud and some solutions to the security issues since security is one of the most critical aspect in cloud computing due to the sensitivity of user's data.

  12. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  13. Energy exchange increases supply security

    International Nuclear Information System (INIS)

    Van Baarle, D.

    2004-01-01

    Since October 5, 2004, Endex is an official futures market for energy. All the energy businesses and large-scale consumers in the Netherlands can trade electricity, and in the future also gas, anonymously [nl

  14. Energy Security, Innovation & Sustainability Initiative

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-04-30

    More than a dozen energy experts convened in Houston, Texas, on February 13, 2009, for the first in a series of four regionally-based energy summits being held by the Council on Competitiveness. The Southern Energy Summit was hosted by Marathon Oil Corporation, and participants explored the public policy, business and technological challenges to increasing the diversity and sustainability of U.S. energy supplies. There was strong consensus that no single form of energy can satisfy the projected doubling, if not tripling, of demand by the year 2050 while also meeting pressing environmental challenges, including climate change. Innovative technology such as carbon capture and storage, new mitigation techniques and alternative forms of energy must all be brought to bear. However, unlike breakthroughs in information technology, advancing broad-based energy innovation requires an enormous scale that must be factored into any equation that represents an energy solution. Further, the time frame for developing alternative forms of energy is much longer than many believe and is not understood by the general public, whose support for sustainability is critical. Some panelists estimated that it will take more than 50 years to achieve the vision of an energy system that is locally tailored and has tremendous diversity in generation. A long-term commitment to energy sustainability may also require some game-changing strategies that calm volatile energy markets and avoid political cycles. Taking a page from U.S. economic history, one panelist suggested the creation of an independent Federal Energy Reserve Board not unlike the Federal Reserve. The board would be independent and influence national decisions on energy supply, technology, infrastructure and the nation's carbon footprint to better calm the volatile energy market. Public-private efforts are critical. Energy sustainability will require partnerships with the federal government, such as the U.S. Department of Energy

  15. Effective surveillance for homeland security balancing technology and social issues

    CERN Document Server

    Flammini, Francesco; Franceschetti, Giorgio

    2013-01-01

    Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats. Focusing on current technological challenges involving multi-disciplinary problem analysis and systems engineering approaches, it provides an overview of the most relevant aspects of surveillance systems in the framework of homeland security. Addressing both advanced surveillance technologies and the related socio-ethical issues, the book consists of 21 chapters written by international experts from the various sectors of homeland security. Part I, Surveillance and Society, focuses on the societal dimension of surveillance-stressing the importance of societal acceptability as a precondition to any surveillance system. Part II, Physical and Cyber Surveillance, presents advanced technologies for surveillance. It considers developing technologie...

  16. Cyber security issues imposed on nuclear power plants

    International Nuclear Information System (INIS)

    Kim, Do-Yeon

    2014-01-01

    Highlights: • Provide history of cyber attacks targeting at nuclear facilities. • Provide cyber security issues imposed on nuclear power plants. • Provide possible countermeasures for protecting nuclear power plants. - Abstract: With the introduction of new technology based on the increasing digitalization of control systems, the potential of cyber attacks has escalated into a serious threat for nuclear facilities, resulting in the advent of the Stuxnet. In this regard, the nuclear industry needs to consider several cyber security issues imposed on nuclear power plants, including regulatory guidelines and standards for cyber security, the possibility of Stuxnet-inherited malware attacks in the future, and countermeasures for protecting nuclear power plants against possible cyber attacks

  17. Security Issues Model on Cloud Computing: A Case of Malaysia

    OpenAIRE

    Komeil Raisian; Jamaiah Yahaya

    2015-01-01

    By developing the cloud computing, viewpoint of many people regarding the infrastructure architectures, software distribution and improvement model changed significantly. Cloud computing associates with the pioneering deployment architecture, which could be done through grid calculating, effectiveness calculating and autonomic calculating. The fast transition towards that, has increased the worries regarding a critical issue for the effective transition of cloud computing. From the security v...

  18. Security issues of new innovative payments and their regulatory challenges

    NARCIS (Netherlands)

    Kasiyanto, Safari; Gabriella, Gimigliano

    2016-01-01

    Kasiyanto discusses how the security issues of M-payments and Bitcoin as new forms of innovative payments challenge the existing EU regulatory frameworks, and whether the proposed regulatory frameworks suffice to address such challenges. The regulatory frameworks Kasiyanto discusses mainly focus on

  19. Arctic Energy Resources: Security and Environmental Implications

    Directory of Open Access Journals (Sweden)

    Peter Johnston

    2012-08-01

    Full Text Available n recent years, there has been considerable interest in the Arctic as a source for resources, as a potential zone for commercial shipping, and as a region that might experience conflict due to its strategic importance. With regards to energy resources, some studies suggest that the region contains upwards of 13 percent of global undiscovered oil, 30 percent of undiscovered gas, and multiples more of gas hydrates. The decreasing amount and duration of Arctic ice cover suggests that extraction of these resources will be increasingly commercially viable. Arctic and non-arctic states wish to benefit from the region's resources and the potential circum-polar navigation possibilities. This has led to concerns about the environmental risks of these operations as well as the fear that competition between states for resources might result in conflict. Unresolved offshore boundaries between the Arctic states exacerbate these fears. Yet, the risk of conflict seems overstated considering the bilateral and multilateral steps undertaken by the Arctic states to resolve contentious issues. This article will examine the potential impact of Arctic energy resources on global security as well as the regional environment and examine the actions of concerned states to promote their interests in the region.

  20. Development of Nuclear Energy Security Code

    International Nuclear Information System (INIS)

    Shimamura, Takehisa; Suzuki, Atsuyuki; Okubo, Hiroo; Kikuchi, Masahiro.

    1990-01-01

    In establishing of the nuclear fuel cycle in Japan that have a vulnerability in own energy structure, an effectiveness of energy security should be taken into account as well as an economy based on the balance of supply and demand of nuclear fuels. NMCC develops the 'Nuclear Energy Security Code' which was able to evaluate the effectiveness of energy security. Evaluation method adopted in this code is 'Import Premium' which was proposed in 'World Oil', EMF Report 6. The viewpoints of evaluation are as follows: 1. How much uranium fuel quantity can be reduced by using plutonium fuel? 2. How much a sudden rise of fuel cost can be absorbed by establishing the plutonium cycle beforehand the energy crisis? (author)

  1. Measuring energy security. A conceptual note

    Energy Technology Data Exchange (ETDEWEB)

    Frondel, Manuel; Schmidt, Christoph M.

    2008-11-06

    Along with the oil price, concerns about the security of energy supply have soared once again in recent years.Yet, more than 30 years after the OPEC oil embargo in 1973, energy security still remains a diffuse concept. This paper conceives a statistical indicator that aims at characterizing the energy supply risk of nations that are heavily dependent on energy imports. Our indicator condenses the bulk of empirical information on the imports of fossil fuels originating from a multitude of export countries as well as data on the indigenous contribution to the domestic energy supply into a single parameter. Applying the proposed concept to empirical energy data on Germany and the U.S. (1980-2004), we find that there is a large gap in the energy supply risks between both countries, with Germany suffering much more from a tensed energy supply situation today than the U.S. (orig.)

  2. Security and privacy issues with health care information technology.

    Science.gov (United States)

    Meingast, Marci; Roosta, Tanya; Sastry, Shankar

    2006-01-01

    The face of health care is changing as new technologies are being incorporated into the existing infrastructure. Electronic patient records and sensor networks for in-home patient monitoring are at the current forefront of new technologies. Paper-based patient records are being put in electronic format enabling patients to access their records via the Internet. Remote patient monitoring is becoming more feasible as specialized sensors can be placed inside homes. The combination of these technologies will improve the quality of health care by making it more personalized and reducing costs and medical errors. While there are benefits to technologies, associated privacy and security issues need to be analyzed to make these systems socially acceptable. In this paper we explore the privacy and security implications of these next-generation health care technologies. We describe existing methods for handling issues as well as discussing which issues need further consideration.

  3. Second Strategic Energy Review. Securing our Energy Future

    International Nuclear Information System (INIS)

    2008-11-01

    Europe has agreed a forward-looking political agenda to achieve its core energy objectives of sustainability, competitiveness and security of supply. This agenda means substantial change in Europe's energy system over the next years, with public authorities, energy regulators, infrastructure operators, the energy industry and citizens all actively involved. It means choices and investments during a time of much change in global energy markets and international relations. The European Commission has therefore proposed a wide-ranging energy package which gives a new boost to energy security in Europe, i.e. putting forward a new strategy to build up energy solidarity among Member States and a new policy on energy networks to stimulate investment in more efficient, low-carbon energy networks; proposing a Energy Security and Solidarity Action Plan to secure sustainable energy supplies in the EU and looking at the challenges that Europe will face between 2020 and 2050; adopting a package of energy efficiency proposals aims to make energy savings in key areas, such as reinforcing energy efficiency legislation on buildings and energy-using products. All relevant and related documents with regard to the Second Strategic Energy Review can be found through this site

  4. Understanding food security issues in remote Western Australian Indigenous communities.

    Science.gov (United States)

    Pollard, Christina M; Nyaradi, Anett; Lester, Matthew; Sauer, Kay

    2014-08-01

    Food insecurity in remote Western Australian (WA) Indigenous communities. This study explored remote community store managers' views on issues related to improving food security in order to inform health policy. A census of all remote WA Indigenous community store managers was conducted in 2010. Telephone interviews sought managers' perceptions of community food insecurity, problems with their store, and potential policy options for improving the supply, accessibility, affordability and consumption of nutritious foods. Descriptive analyses were conducted using SPSS for Windows version 17.0. Managers stated that freight costs and irregular deliveries contributed to high prices and a limited range of foods. Poor store infrastructure, compromised cold chain logistics, and commonly occurring power outages affected food quality. Half of the managers said there was hunger in their community because people did not have enough money to buy food. The role of nutritionists beyond a clinical and educational role was not understood. Food security interventions in remote communities need to take into consideration issues such as freight costs, transport and low demand for nutritious foods. Store managers provide important local knowledge regarding the development and implementation of food security interventions. SO WHAT? Agencies acting to address the issue of food insecurity in remote WA Indigenous communities should heed the advice of community store managers that high food prices, poor quality and limited availability are mainly due to transport inefficiencies and freight costs. Improving healthy food affordability in communities where high unemployment and low household income abound is fundamental to improving food security, yet presents a significant challenge.

  5. International Conference SES 2006. Secure Energy Supply

    International Nuclear Information System (INIS)

    2006-01-01

    The International Conference SES 2006 (Secure Energy Supply, Bezpecna dodavka energie) was realised in Bratislava, during September 26 - 29, 2006 in the hotel Crowne Plaza and deals with most important problems of world and Slovak energetics. In work of Conference took part 108 slovak and 33 foreign participant from 11 countries of the world. Negotiations were realised in five sessions. First two days were devoted to lectures and second two days were visits of selected slovak energetic equipment. On the Conference has resounded matter of fact, that secure energy supply is extremely important subject for economy, but also for population

  6. Energy supply security and foreign policy

    International Nuclear Information System (INIS)

    2006-05-01

    The title memo has been sent to the Dutch Lower House. This memo reflects the response of the cabinet to the advice on Energetic Foreign Policy of the Dutch Advisory Council on International Affairs (AIV) and the Dutch Energy Council (AER). Moreover, the development of foreign policy with respect to energy supply security is depicted. [mk] [nl

  7. THE COSTS OF ENERGY SUPPLY SECURITY

    Energy Technology Data Exchange (ETDEWEB)

    Rogner, H.H.; Langlois, L.M.; McDonald, A.; Weisser, D.; Howells, M.

    2007-07-01

    In general, increasing a country's energy supply security does not come for free. It costs money to build up a strategic reserve, to increase supply diversity or even to accelerate energy efficiency improvements. Nor are all investments in increasing energy supply security cost effective, even if the shocks they are designed to insure against can be predicted with 100% accuracy. The first half of the paper surveys different definitions and strategies associated with the concept of energy supply security, and compares current initiatives to establish an 'assured supply of nuclear fuel' to the International Energy Agency's (IEA's) system of strategic national oil reserves. The second half of the paper presents results from several case studies of the costs and effectiveness of selected energy supply security policies. One case study examines alternative strategies for Lithuania following the scheduled closure of the Ignalina-2 nuclear reactor in 2009. The second case study examines, for countries with different energy resources and demand structures, the effectiveness of a policy to increase supply diversity by expanding renewable energy supplies. (auth)

  8. International Conference SES 2009: Secure Energy Supply

    International Nuclear Information System (INIS)

    2009-01-01

    The Conference included the following sessions: Opening addresses; (I) Energy policy; (II) Environment, Renewable sources and NPPs; (III) Secure energy supply - New nuclear units. Verbal 21 presentations have been inputted into INIS, all in the form of the full authors' presentations.

  9. Regional disarmament and security issues. Report of working group II

    International Nuclear Information System (INIS)

    Ravenhill, J.

    1994-01-01

    Substantial progress has been made in building cooperation in the Asia-pacific region in remarkably short period of time. Problems of regional disarmament are analysed by linking the economic and security issues. International cooperation regimes, whether in the military sphere, such as the Non-proliferation treaty, or in the trade sphere such as the General Agreement on Tariffs and Trade, inevitably impose restrictions on the autonomy of member States. The integrity of the regime depends on countries' acceptance of the obligations it imposes. The task ahead is to convince all countries in the region that cooperation in the security sphere will be of even greater long-term benefit

  10. 12 CFR 559.12 - How may a subsidiary of a savings association issue securities?

    Science.gov (United States)

    2010-01-01

    ... issue securities? 559.12 Section 559.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF... may a subsidiary of a savings association issue securities? (a) A subsidiary may issue, either...”) may issue. The subsidiary must not state or imply that the securities it issues are covered by federal...

  11. Ensuring energy security in ASEAN countries: Current trends and major challenges

    Science.gov (United States)

    Senderov, Sergey; Vorobev, Sergey

    2018-01-01

    The paper discusses the issues of formation of future challenges to energy security of the ASEAN countries in the period up to 2035. The article gives examples of strategic threats to the energy security of Russia. The opportunities to meet future demand for primary energy for individual countries of ASEAN and the whole region are discussed.

  12. Computer Security Issues in Online Banking: An Assessment from the Context of Usable Security

    Science.gov (United States)

    Mahmadi, FN; Zaaba, ZF; Osman, A.

    2016-11-01

    Today's online banking is a convenient mode of finance management. Despite the ease of doing online banking, there are people that still sceptical in utilizing it due to perception and its security. This paper highlights the subject of online banking security in Malaysia, especially from the perspective of the end-users. The study is done by assessing human computer interaction, usability and security. An online survey utilising 137 participants was previously conducted to gain preliminary insights on security issues of online banking in Malaysia. Following from those results, 37 participants were interviewed to gauge deeper understanding about end-users perception on online banking within the context of usable security. The results suggested that most of the end-users are continuingly experiencing significant difficulties especially in relation to the technical terminologies, security features and other technical issues. Although the security features are provided to provide a shield or protection, users are still incapable to cope with the technical aspects of such implementation.

  13. Alternate Energy for National Security.

    Science.gov (United States)

    Rath, Bhakta

    2010-02-01

    Recent price fluctuations at the gas pump have brought our attention to the phenomenal increase of global energy consumption in recent years. It is now evident that we have almost reached a peak in global oil production. Several projections indicate that total world consumption of oil will rise by nearly 60 per cent between 1999 and 2020. In 1999 consumption was equivalent to 86 million barrels of oil per day, which has reached a peak of production extracted from most known oil reserves. These projections, if accurate, will present an unprecedented crisis to the global economy and industry. As an example, in the US, nearly 40 per cent of energy usage is provided by petroleum, of which nearly a third is used in transportation. The US Department of Defense (DOD) is the single largest buyer of fuel, amounting to, on the average, 13 million gallons per day. Additionally, these fuels have to meet different requirements that prevent use of ethanol additives and biodiesel. An aggressive search for alternate energy sources, both renewable and nonrenewable, is vital. The presentation will review national and DOD perspectives on the exploration of alternate energy with a focus on energy derivable from the ocean. )

  14. Current energy situation affecting national economy, security, and psyche

    International Nuclear Information System (INIS)

    Blundell, H.; Culbreath, H.L.

    1979-01-01

    Nuclear energy should be perceived by Americans as the energy option that can fill the gap left by petroleum shortages. Opposition to nuclear power symbolizes a drive to slow economic growth and return to a decentralized society, but it overlooks the implications that not going nuclear will have for the economy and national security. The General Accounting Office plotted the consequences for three scenarios and concluded that only nuclear power can provide enough domestic energy to meet projected electrical needs. The impact of higher energy prices that will follow energy-supply shortages will result in social change and in a decline in national security. The issues of import dependence, proliferation, economic competition, and morality are not valid reasons to forego nuclear development because the connections are not valid

  15. Liberalization of electricity markets and energy security

    International Nuclear Information System (INIS)

    Yajima, Masayuki

    2004-01-01

    Liberalization of electricity markets begun in England in 1990 and became the trends of the times. Its effects on the energy security and atomic power generation are discussed. On the effects on energy security, change of construction of fuel of power generation, decrease of fuel feed by high efficiency of power generation, decrease of fuel stock by pressure of cost-cutting, increase of import rate of electricity, increase of power consumption with decrease of power cost, flexibility of supply contract, diversification of service, international cooperation on energy security and mutual dependence relation by international investment are discussed. On the effects of liberalization on the electricity markets, characteristics of nuclear power generation, risk of investment, effects of introduction of competition on development of the existing and new nuclear power generation, relation between development of nuclear power generation and market failure and what the government should do for development of nuclear power generation are discussed. (S.Y.)

  16. China's energy security: The perspective of energy users

    International Nuclear Information System (INIS)

    Bambawale, Malavika Jain; Sovacool, Benjamin K.

    2011-01-01

    The article explores the energy security concerns faced by China from the point of view of energy users working in government, university, civil society and business sectors. The authors first derive a set of seven hypotheses related to Chinese energy security drawn from a review of the recent academic literature. We then explain each of these seven hypotheses, relating to (1) security of energy supply, (2) geopolitics, (3) climate change, (4) decentralization, (5) energy efficiency, (6) research and innovation of new energy technologies, and (7) self sufficiency and trade. Lastly, the article tests these hypotheses through a survey distributed in English and Mandarin completed by 312 Chinese participants. The conclusion presents insights for policymakers and energy scholars.

  17. Black Sea Energy Security - Present and Future

    Directory of Open Access Journals (Sweden)

    Florinel Iftode

    2011-05-01

    Full Text Available We chose this theme to highlight the need for continuous and sustained human society to secure energy resources needed to survive, needs reflected in an increasingly in recent years in the strategies adopted at both states, as at the level of international organizations. Achieving security and stability in the wider Black Sea area has been among the priorities of each country's interests in this region. In this context, state and non-state actors were being called to come up with new solutions to achieve those interests. Certainly not in all cases the negotiations were completed or not yet found a generally accepted formula for others to apply, but most of them show off their values. The main environmental threats to security environment in the Black Sea region are represented by ethnic conflicts and territorial secessionism. A significant contribution to the security environment of the Black Sea region has the phenomenon of globalization, which in this region is manifested by a steady increase in traffic and volume of shipping passage of communication, which largely affects the security in the region. Globalization and the need for energy resources in the Black Sea was an important area not only as energy transport route, but as a potential supplier of material energy (oil and natural gas. Black Sea Basin can be stabilized and secured only by the will and input from all States and interested international organizations in pragmatic and effective institutional frameworks, meant to promote and protect the common interests of countries decided to participate in actions aimed at ensuring a stable environment security.

  18. The Arctic: between climatic change, economic development and security issues

    International Nuclear Information System (INIS)

    Degeorges, Damien

    2016-01-01

    The Arctic is a perfect illustration of how climate change is impacting international relations, in particular because it triggers new economic and safety issues. Since every major economic power has interests in the region, it has now become the stage of many rivalries, including between China and the United-States. Whether it is because its extreme climate conditions or the growing international pressure, the Arctic sets a new challenge for investors: securing a sustainable economic growth in the region

  19. Malaysia: Political, Security, Economic, and Trade Issues Considered

    Science.gov (United States)

    2007-02-13

    general election. Key observers have also pointed to decisions by Parti-Islam sa- Malaysia (PAS), Parti Keadilan Rakyat , and the Democratic Action Party...Sultan fulfills this function. Each state has a state legislature. The lower house of Malaysia’s Parliament, the Dewan Rakyat , has 193 members elected...Order Code RL33878 Malaysia : Political, Security, Economic, and Trade Issues Considered February 13, 2007 Bruce Vaughn, Coordinator Specialist in

  20. Protecting Commercial Space Systems: A Critical National Security Issue

    Science.gov (United States)

    1999-04-01

    systems. Part two will describe, at the operational level , this author’s theory for space protection and recommend a course of action to work...minimal loss of life. These factors force us to conclude this is a critical national security issue just as many in high- level government positions...Command and Staff College Operational Forces Coursebook (Academic Year 1999), 35. 3 The USCG is not a Title 10 Service, thus Posse Comitatus is not a

  1. Security issues of cloud computing environment in possible military applications

    OpenAIRE

    Samčović, Andreja B.

    2013-01-01

    The evolution of cloud computing over the past few years is potentially one of major advances in the history of computing and telecommunications. Although there are many benefits of adopting cloud computing, there are also some significant barriers to adoption, security issues being the most important of them. This paper introduces the concept of cloud computing; looks at relevant technologies in cloud computing; takes into account cloud deployment models and some military applications. Addit...

  2. Energy issues and policies in Brazil

    International Nuclear Information System (INIS)

    Goldemberg, J.

    1981-10-01

    Initiative taken in Brazil to achieve 'energy autonomy' in vien of the petroleum crisis is analyzed. The dynamics of the movement away from oil and the desire to base the development of the country on locally available resources such as hydroelectricity and biomass derived fuels are emphasized. Energy resources, energy comsumption, issues and policies, energy projections and social issues are discussed, as well as the relevance and applicability to other countries of policies followed in Brazil. (I.C.R.) [pt

  3. French people and energy issues

    International Nuclear Information System (INIS)

    Chesnais, L.

    2006-01-01

    An opinion poll made in France in 2006 shows that: - French people backs nuclear energy with a slight margin (45% versus 42%), - French people agrees with the electricity production policy led by the government, - about 4 people out of 10 expect a sharp increase in prices concerning car fuels, natural gas and heating fuels in a near future, on the other hand fewer people than in previous years are expecting a price rise for electricity. In this article some figures concerning the consumption of energy in France are given: - 230.000 jobs are directly or indirectly involved in the energy sector, this sector represents 5% of all investment, - a total bill of 24 milliard euros for the energy imports, and - energy spending represents 7.6% of the household budget. (A.C.)

  4. South Asia energy security: Challenges and opportunities

    International Nuclear Information System (INIS)

    Kumar Singh, Bhupendra

    2013-01-01

    South Asia has witnessed a growing imbalance between energy demand and its supply from indigenous sources resulting in increased import dependence. Energy endowments differ among the South Asian countries. However, access to the significant energy resources in the neighboring countries is denied, which increases the cost of energy supply and reduces energy security of the individual countries and of the region as a whole. The countries in the region could benefit significantly only by strengthening the mechanism of energy trade through improved connectivity. Therefore, greater cooperation within South Asia could be one of the most effective ways to deal with this Regional Energy deficit and ensure Energy Security of the Region. - Highlights: • No South Asian country is going to be able to meet its energy needs domestically. • Fostering cross border energy trade and promotion of investments opportunities are key solutions. • India’s neighbors have huge potential in hydroelectricity. • Co-operation among nations to tap the energy resource can be a win–win situation for all. • However it faces certain challenges

  5. Intrinsic information Security: Embedding security issues in the design process of telematics systems

    NARCIS (Netherlands)

    Tettero, Olaf; Tettero, O.

    This book presents a systematic approach to embed information security issues in the design process of telematics systems. The approach supports both designers and user organisations. We elaborate on the activities that designers should perform to design telematics systems in which information

  6. Human Security and Energy Security: A Sustainable Energy System as a Public Good

    NARCIS (Netherlands)

    Karlsson-Vinkhuyzen, S.I.S.E.; Jollands, N.

    2013-01-01

    This chapter is dedicated to the concept of human security and its link to energy and energy governance, particularly global energy governance. Through this focus emerges the need to look at the links between the concept of public goods and energy. Our starting argument is that conventional notions

  7. Can low-carbon societies deliver on energy security?

    International Nuclear Information System (INIS)

    Jewell, Jessica

    2015-01-01

    The impact of low-carbon policies on energy security depends on both the timing and intensity of these policies, and the definition of energy security: security of what?; security for whom?; and security from which threats? The priorities of the EU’s 2030 climate/energy package and energy security show little if any alignment. Global climate stabilization policies benefit the energy security of India, China, and the EU, but may have negative impacts on export revenues of the U.S. and other energy exporters.

  8. Sectoral energy demand data: Sources and Issues

    International Nuclear Information System (INIS)

    Ounali, A.

    1991-01-01

    This chapter of the publication is dealing with Sectoral Energy Demand Data giving details about the Sources and Issues. Some comments are presented on rural energy surveys. Guidelines for the Definition and Desegregation of Sectoral Energy Consumption is given and Data Necessary for Sectoral Energy Demand Analysis is discussed

  9. Ergonomics issues in national identity card for homeland security.

    Science.gov (United States)

    Yeow, Paul H P; Yuen, Y Y; Loo, W H

    2013-09-01

    Ever since the 9/11 terrorist attack, many countries are considering the use of smart national identity card (SNIC) which has the ability to identify terrorists due to its biometric verification function. However, there are many ergonomics issues in the use of SNIC, e.g. card credibility. This research presents a case study survey of Malaysian users. Although most citizens (>96%) own MyKad (Malaysia SNIC), many do not carry it around and use its applications. This defeats one of its main purposes, i.e. combating terrorism. Thus, the research investigates ergonomics issues affecting the citizens' Intention to Use (ITU) MyKad for homeland security by using an extended technology acceptance model. Five hundred questionnaires were collected and analysed using structural equation modelling. Results show that perceived credibility and performance expectancy are the key issues. The findings provide many countries with insights into methods of addressing ergonomics issues and increasing adoption of SNIC for homeland security. Copyright © 2012 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  10. Power issues at school; Energie macht Schule

    Energy Technology Data Exchange (ETDEWEB)

    Heup, Juergen

    2011-09-15

    Energy and power are not only current issues in politics and society but also subjects for the classroom. In these time of short budgets, energy consultants are able to offer free teaching materials. However, this is a controversial issue as they may take the opportunity to advertise themselves.

  11. Nuclear power: energy security and supply assurances

    International Nuclear Information System (INIS)

    Rogner, H.H.; McDonald, A.

    2008-01-01

    Expectations are high for nuclear power. This paper first summarizes recent global and regional projections for the medium-term, including the 2007 updates of IAEA projections plus International Energy Agency and World Energy Technology Outlook projections to 2030 and 2050. One driving force for nuclear power is concern about energy supply security. Two potential obstacles are concerns about increased nuclear weapon proliferation risks, and concerns by some countries about potential politically motivated nuclear fuel supply interruptions. Concerning supply security, the paper reviews different definitions, strategies and costs. Supply security is not free; nor does nuclear power categorically increase energy supply security in all situations. Concerning proliferation and nuclear fuel cut-off risks, the IAEA and others are exploring possible 'assurance of supply' mechanisms with 2 motivations. First, the possibility of a political fuel supply interruption is a non-market disincentive discouraging investment in nuclear power. Fuel supply assurance mechanisms could reduce this disincentive. Second, the risk of interruption creates an incentive for a country to insure against that risk by developing a national enrichment capability. Assurance mechanisms could reduce this incentive, thereby reducing the possible spread of new national enrichment capabilities and any associated weapon proliferation risks. (orig.)

  12. The IEA Model of Short-term Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2011-07-01

    Ensuring energy security has been at the centre of the IEA mission since its inception, following the oil crises of the early 1970s. While the security of oil supplies remains important, contemporary energy security policies must address all energy sources and cover a comprehensive range of natural, economic and political risks that affect energy sources, infrastructures and services. In response to this challenge, the IEA is currently developing a Model Of Short-term Energy Security (MOSES) to evaluate the energy security risks and resilience capacities of its member countries. The current version of MOSES covers short-term security of supply for primary energy sources and secondary fuels among IEA countries. It also lays the foundation for analysis of vulnerabilities of electricity and end-use energy sectors. MOSES contains a novel approach to analysing energy security, which can be used to identify energy security priorities, as a starting point for national energy security assessments and to track the evolution of a country's energy security profile. By grouping together countries with similar 'energy security profiles', MOSES depicts the energy security landscape of IEA countries. By extending the MOSES methodology to electricity security and energy services in the future, the IEA aims to develop a comprehensive policy-relevant perspective on global energy security. This Working Paper is intended for readers who wish to explore the MOSES methodology in depth; there is also a brochure which provides an overview of the analysis and results.

  13. An aggregated energy security performance indicator

    International Nuclear Information System (INIS)

    Martchamadol, Jutamanee; Kumar, S.

    2013-01-01

    Highlights: ► AESPI shows a country’s (or province’s) energy security status. ► AESPI considers social, economic and environmental aspects using 25 indicators. ► AESPI shows the impact of the trend of energy policies/measures. ► AESPI could be a tool for monitoring and evaluating the impact of energy policies. -- Abstract: An “Aggregated Energy Security Performance Indicator (AESPI)” has been developed by considering 25 individual indicators representing social, economy and environmental dimensions. The principle used, data required and the methodology for the development of AESPI have been detailed. AESPI requires time series data for its development and its value ranges from 0 to 10. The characteristics of AESPI have been compared with the existing indicators in terms of methodology, data requirements, analysis possible and the applications. The advantages of AESPI is that it not only assists in knowing the past energy security status of a country, but also helps in assessing the future status considering the energy policies and plans of the country, thus enabling the monitoring of the impacts of the policies.

  14. Moving ERP Systems to the Cloud - Data Security Issues

    Directory of Open Access Journals (Sweden)

    Pablo Saa

    2017-08-01

    Full Text Available This paper brings to light data security issues and concerns for organizations by moving their Enterprise Resource Planning (ERP systems to the cloud. Cloud computing has become the new trend of how organizations conduct business and has enabled them to innovate and compete in a dynamic environment through new and innovative business models. The growing popularity and success of the cloud has led to the emergence of cloud-based Software-as-a-Service (SaaS ERP systems, a new alternative approach to traditional on-premise ERP systems. Cloud-based ERP has a myriad of benefits for organizations. However, infrastructure engineers need to address data security issues before moving their enterprise applications to the cloud. Cloud-based ERP raises specific concerns about the confidentiality and integrity of the data stored in the cloud. Such concerns that affect the adoption of cloud-based ERP are based on the size of the organization. Small to medium enterprises (SMEs gain the maximum benefits from cloud-based ERP as many of the concerns around data security are not relevant to them. On the contrary, larger organizations are more cautious in moving their mission critical enterprise applications to the cloud. A hybrid solution where organizations can choose to keep their sensitive applications on-premise while leveraging the benefits of the cloud is proposed in this paper as an effective solution that is gaining momentum and popularity for large organizations.

  15. Security, privacy, and confidentiality issues on the Internet

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to `sign' a message whereby the private key of an individual can be used to `hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a `digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers. PMID:12554559

  16. Security, privacy, and confidentiality issues on the Internet.

    Science.gov (United States)

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standard for encrypting Web-based information interchanges is Secure Sockets Layer (SSL), more recently known as Transport Layer Security or TLS. There is a public key infrastructure process to 'sign' a message whereby the private key of an individual can be used to 'hash' the message. This can then be verified against the sender's public key. This ensures the data's authenticity and origin without conferring privacy, and is called a 'digital signature'. The best protection against viruses is not opening e-mails from unknown sources or those containing unusual message headers.

  17. Dissecting the Security and Protection Issues in Pervasive Computing

    Directory of Open Access Journals (Sweden)

    Qaisar Javaid

    2018-04-01

    Full Text Available Human beings reflect nomadic behaviour as they keep on travelling place to place whole day for personal or organizational purposes. The inception of modern networking technologies and the advent of wide range of applications in terms of services and resources have facilitated the users in many ways. The advancements in numerous areas such as embedded systems, WN (Wireless Networks, mobile and context-aware computing, anticipated pervasive computing dominated the human communication at large. Pervasive computing refers to the environment where information is accessible anywhere and anytime while existing system is invisible to the user. On the other hand, the invisibility of pervasive computing is also a problem in its adoption as users are unaware when and what devices collect their personal data and how it is being used. It has caused new security chaos as the more information about user is collected the more privacy and security concerns it raises, thus, the pervasive computing applications became key concern for user. This paper is aimed at analyzing the security and protection issues that arise while traveling from place to place connected with wireless mobile networks. The paper reviews many existing systems that offer possible security to pervasive users. An easy, precise and relative analysis and evaluation of surveyed pervasive systems are presented and some future directions are highlighted.

  18. Japan, new agenda for energy security

    International Nuclear Information System (INIS)

    Chrisstoffels, J.H.

    2007-07-01

    The author argues that the Japanese government will actively seek to strengthen security of supply. Japan has almost no domestic energy reserves. It is Asia's leading energy importer, but it faces increasing competition for resources from China and India. This has led to growing concern among Japanese policy makers. In the spring of 2007 a new Basic Energy Law was drafted that offers a strategic change of direction, away from a policy emphasis on free (energy) trade promotion and liberalisation of domestic energy markets. Japan will boost energy diplomacy towards energy producing countries and increase financial guarantees to Japanese oil and gas development companies. At the same time, Japan will raise efforts to lower its dependency on foreign oil and gas. To this end, it has set ambitious targets for further nuclear power development and the promotion of bio-trade. The author points at a multitude of complexities that may impede the success of these policies, Still, EU policy makers should be aware that Japan's energy policy has changed, driven by the conviction that markets alone cannot be relied upon to guarantee a secure supply of energy. [nl

  19. Gender security between human development and human security. Recent issues in the political international agenda

    Directory of Open Access Journals (Sweden)

    Paola Degani

    2014-06-01

    Full Text Available Issues regarding security, for a long time have been proposed, both in the scientific literature, that in the writings of popular character, without taking into due consideration the specificity of the effects that certain threats can cause the different subjectivity or on specific groups rather than on other . In particular, very rarely takes into account the fact that, in relation to the condition of women, we can talk, referring to certain areas or aspects of the problem, think of the problem of violence, of a real security crisis. The safety cultures sedimentation processes of socialization through everyday practices, can be considered an integral part of the internal structures of states. The issues relating to the in / security for women are on the agenda institutional, only a few years, do not fall within the traditional framework of interventions aimed at regulating sector profiles of women, in line with a vision of the subject recipient of this policy individual as "neutral." These are issues that today are also of inter-governmental organizations, in particular the United Nations, a central political role with respect to the adoption of policies related to the affirmation, respect and the effectiveness of human rights and at the same time enrich and innovate in order substantial guidelines and decision-making processes in the field of security.

  20. Long-term optimal energy mix planning towards high energy security and low GHG emission

    International Nuclear Information System (INIS)

    Thangavelu, Sundar Raj; Khambadkone, Ashwin M.; Karimi, Iftekhar A.

    2015-01-01

    Highlights: • We develop long-term energy planning considering the future uncertain inputs. • We analyze the effect of uncertain inputs on the energy cost and energy security. • Conventional energy mix prone to cause high energy cost and energy security issues. • Stochastic and optimal energy mix show benefits over conventional energy planning. • Nuclear option consideration reduces the energy cost and carbon emissions. - Abstract: Conventional energy planning focused on energy cost, GHG emission and renewable contribution based on future energy demand, fuel price, etc. Uncertainty in the projected variables such as energy demand, volatile fuel price and evolution of renewable technologies will influence the cost of energy when projected over a period of 15–30 years. Inaccurate projected variables could affect energy security and lead to the risk of high energy cost, high emission and low energy security. The energy security is an ability of generation capacity to meet the future energy demand. In order to minimize the risks, a generic methodology is presented to determine an optimal energy mix for a period of around 15 years. The proposed optimal energy mix is a right combination of energy sources that minimize the risk caused due to future uncertainties related to the energy sources. The proposed methodology uses stochastic optimization to address future uncertainties over a planning horizon and minimize the variations in the desired performance criteria such as energy security and costs. The developed methodology is validated using a case study for a South East Asian region with diverse fuel sources consists of wind, solar, geothermal, coal, biomass and natural gas, etc. The derived optimal energy mix decision outperformed the conventional energy planning by remaining stable and feasible against 79% of future energy demand scenarios at the expense of 0–10% increase in the energy cost. Including the nuclear option in the energy mix resulted 26

  1. On the Perception of National Security Issues at Regional Level

    Directory of Open Access Journals (Sweden)

    Ponedelkov Aleksandr Vasilyevich

    2015-12-01

    Full Text Available The article explores the issue on the perception of the concept “national security” areas, models and methods of its maintenance by the population. The author uses materials of the sociological survey conducted by the Laboratory of problems of increasing the efficiency of state and municipal management of the South-Russian Institute of Management – branch of the Russian Presidential Academy of National Economy and Public Administration. The survey was carried out with the participation of leading experts in various aspects of national security, representing 27 Russian higher educational institutions and research centers in Moscow, Astrakhan, Barnaul, Belgorod, Dushanbe, Krasnodar, Nizhny Novgorod, Omsk, Pyatigorsk, Rostov-on-Don, Saint Petersburg, Syktyvkar, Sochi, Ufa. It is noted that as a priority political governance model that implements the basic concept of national security, respondents identified a democratic model. Most respondents believe that a unified security model in the Russian regions is ineffective, and such model should be developed taking into account the specificity of each subject. The study showed that the public’s attention to the issue of national security is not sustainable, as determined by situational factors. It is proved that the motives of anxiety formed in the Russian public mind are not sustainable, and situational. Respondents see the economic cooperation more effective incentive to maintain national interests than by force. Estimation of the population of the priority issues of security shows that most respondents appreciate the organization of work to ensure the safety and anti-terrorism security in the sphere of national relations. The findings give grounds to assert that the focus of public attention to the problem of national security does not yet occupy the leading positions. To a greater extent, respondents focused on the issues of public safety, reducing threats and risks in their daily lives

  2. Resource industries and security issues in northern Alberta

    Energy Technology Data Exchange (ETDEWEB)

    Flanagan, T. [Calgary Univ., AB (Canada). Dept. of Political Science

    2009-06-15

    Public concern over global warming has led to many political attacks on the oil industry, particularly Alberta's tar sand industry. This document focused on security issues in northern Alberta and reviewed past incidences of security threats. The likelihood of sabotage to wells, pipelines, buildings, and other industry facilities was assessed. Five potential sources of opposition were identified, notably individual saboteurs, eco-terrorists, mainstream environmentalists, First Nations, and the Metis people. All except the Metis have at various times used some combination of litigation, blockades, boycotts, sabotage, and violence against economic development projects. This report stated that although such incidents will likely continue in the future, it is unlikely that extra-legal obstruction will become widespread unless these various groups cooperate with each other. Since these groups have different social characteristics and conflicting political interests, it is unlikely that such cooperation will occur. 34 refs.

  3. Basic Science for a Secure Energy Future

    Science.gov (United States)

    Horton, Linda

    2010-03-01

    Anticipating a doubling in the world's energy use by the year 2050 coupled with an increasing focus on clean energy technologies, there is a national imperative for new energy technologies and improved energy efficiency. The Department of Energy's Office of Basic Energy Sciences (BES) supports fundamental research that provides the foundations for new energy technologies and supports DOE missions in energy, environment, and national security. The research crosses the full spectrum of materials and chemical sciences, as well as aspects of biosciences and geosciences, with a focus on understanding, predicting, and ultimately controlling matter and energy at electronic, atomic, and molecular levels. In addition, BES is the home for national user facilities for x-ray, neutron, nanoscale sciences, and electron beam characterization that serve over 10,000 users annually. To provide a strategic focus for these programs, BES has held a series of ``Basic Research Needs'' workshops on a number of energy topics over the past 6 years. These workshops have defined a number of research priorities in areas related to renewable, fossil, and nuclear energy -- as well as cross-cutting scientific grand challenges. These directions have helped to define the research for the recently established Energy Frontier Research Centers (EFRCs) and are foundational for the newly announced Energy Innovation Hubs. This overview will review the current BES research portfolio, including the EFRCs and user facilities, will highlight past research that has had an impact on energy technologies, and will discuss future directions as defined through the BES workshops and research opportunities.

  4. Chemical Facility Security: Regulation and Issues for Congress

    National Research Council Canada - National Science Library

    Shea, Dana A; Tatelman, Todd B

    2007-01-01

    The Department of Homeland Security (DHS) has proposed security regulations for chemical facilities, implementing the statutory authority granted in the Homeland Security Appropriations Act, 2007 (P.L...

  5. China's conception of energy security : sources and international impacts

    International Nuclear Information System (INIS)

    Constantin, C.

    2005-01-01

    The unique challenges and opportunities associated with China's rapid economic growth were discussed with reference to the potential risk of political disruption or destabilizing international markets. The author notes that two common mistakes are typically made when assessing the evolution of China's energy policy. The first is that China's future path is assimilated with that of developed countries, thereby dismissing evidence that might point toward a different relationship with energy. Second, analysts tend to focus on the external expression of China's energy needs, its oil imports, while overlooking other energy-related issues such as insufficient electricity supplies or environmental degradation. The author argues that Chinese leadership is redefining its understanding of what constitutes energy security for the country. This report assesses the international impacts of such a redefinition along with the international aspects of a business-as-usual scenario in which China pursues its traditional model of energy security. It was emphasized that two different views of energy security lead to different sets of challenges and opportunities for western governments and businesses. 101 refs., 2 figs

  6. Securing a Home Energy Managing Platform

    DEFF Research Database (Denmark)

    Mikkelsen, Søren Aagaard; Jacobsen, Rune Hylsberg

    2016-01-01

    Energy management in households gets increasingly more attention in the struggle to integrate more sustainable energy sources. Especially in the electrical system, smart grid towards a better utilisation of the energy production and distribution infrastructure. The Home Energy Management System...... (HEMS) is a critical infrastructure component in this endeavour. Its main goal is to enable energy services utilising smart devices in the households based on the interest of the residential consumers and external actors. With the role of being both an essential link in the communication infrastructure...... for balancing the electrical grid and a surveillance unit in private homes, security and privacy become essential to address. In this chapter, we identify and address potential threats Home Energy Management Platform (HEMP) developers should consider in the progress of designing architecture, selecting hardware...

  7. Moving ERP Systems to the Cloud - Data Security Issues

    OpenAIRE

    Pablo Saa; Andrés Cueva Costales; Oswaldo Moscoso-Zea; Sergio Lujan-Mora

    2017-01-01

    This paper brings to light data security issues and concerns for organizations by moving their Enterprise Resource Planning (ERP) systems to the cloud. Cloud computing has become the new trend of how organizations conduct business and has enabled them to innovate and compete in a dynamic environment through new and innovative business models. The growing popularity and success of the cloud has led to the emergence of cloud-based Software-as-a-Service (SaaS) ERP systems, a new alternative appr...

  8. A Research on Issues Related to RFID Security and Privacy

    Science.gov (United States)

    Kim, Jongki; Yang, Chao; Jeon, Jinhwan

    Radio Frequency Identification (RFID) is a technology for automated identification of objects and people. RFID systems have been gaining more popularity in areas especially in supply chain management and automated identification systems. However, there are many existing and potential problems in the RFID systems which could threat the technology's future. To successfully adopt RFID technology in various applications, we need to develop the solutions to protect the RFID system's data information. This study investigates important issues related to privacy and security of RFID based on the recent literature and suggests solutions to cope with the problem.

  9. Venezuela and Energy Security of Latin America

    Directory of Open Access Journals (Sweden)

    Elena Igorevna Vesnovskaya

    2015-12-01

    Full Text Available The article is devoted to the specificity of Venezuela's energy policy and the features of the evolution of its approaches to solving problems of energy security. Special attention is paid to the projects of Caracas in the energy sector which are aimed at the creating of common energy zone in Latin America. The author has revealed the interaction of internal political processes in Venezuela as the country's leader in the region, with its integration policy, and also identified trends in the further development of energy policy and strategy of Latin American countries. The research of energy resources of Latin America determined that the main factor that works in favor of convergence states within the South American "geopolitical ring" is to ensure energy security. Venezuela is among the richest resources of Latin America. In the research it was determined that Petrosur, Petrocaribe and Petroandina provide the basis for a range of bilateral agreements to promote cooperation, creation ventures based on the state oil companies of these states.

  10. Current status of international training center for nuclear security and security issues in Korea

    International Nuclear Information System (INIS)

    Lee, Jong-UK; Sin, Byung Woo

    2013-01-01

    During the 2010 Nuclear Security Summit (NSS) President Lee declared that Korea will establish an international training center (ITC) for nuclear security near the Korea Institute of Nuclear Nonproliferation and Control (KINAC). It will be open to the world in 2014. The government's long term goal is to make the center a hub for education and training in the nuclear field in Asia. The ITC will accomplish this by establishing facilities for practical and realistic exercises through the use of a test bed and various other experiments. The center will also provide comprehensive educational programs for nuclear newcomers. Its main programs include: a well designed educational program, customized training courses, and on-the-job training. This paper will discuss the current status of the ITC and describe practical plans for solving current security issues in Korea. (authors)

  11. Energy security from the Russian perspective. Think pipes not rockets

    Energy Technology Data Exchange (ETDEWEB)

    Gudowski, Waclaw

    2008-07-01

    The presentation reviews the understanding of energy security, the Russian role in the energy source market and discusses how to increase the energy security. Environmental aspects such as climate change, CO2 reduction and the environmental costs of fossil fuel consumption with respect to the energy security are emphasized (tk)

  12. A Review of Bring Your Own Device on Security Issues

    Directory of Open Access Journals (Sweden)

    Morufu Olalere

    2015-04-01

    Full Text Available Mobile computing has supplanted internet computing because of the proliferation of cloud-based applications and mobile devices (such as smartphones, palmtops, and tablets. As a result of this, workers bring their mobile devices to the workplace and use them for enterprise work. The policy of allowing the employees to work with their own personal mobile devices is called Bring Your Own Devices (BYOD. In this article, we discuss BYOD’s background, prevalence, benefits, challenges, and possible security attacks. We then review contributions of academic researchers on BYOD. The Universiti Putra Malaysia online databases (such as IEEE Xplore digital library, Elsevier, Springer, ACM digital library were used to search for peer-reviewed academic publications and other relevant publications on BYOD. The Google Scholar search engine was also used. Our thorough review shows that security issues comprise the most significant challenge confronting BYOD policy and that very little has been done to tackle this security challenge. It is our hope that this review will provide a theoretical background for future research and enable researchers to identify researchable areas of BYOD.

  13. IFRI's notebooks. Energy, development and security

    International Nuclear Information System (INIS)

    Finon, D.; Jacquet, P.

    1999-01-01

    Today, the concept of energy security has been greatly modified by the worldwide trade, the markets deregulation, the technical progress and the nuclear contestation. This notebook is the synthesis of a colloquium jointly organized in December 16, 1997 by the IFRI and the Institute of Economy and Energy Policy (IEPE) with the sustain of the French delegation of strategic affairs of the defense ministry. It analyzes the evolution of energy markets at the year 2030 prospects and stresses on the role of Middle-East and on the stakes of the economical development and energy policy of China. Finally, it treats of the goals and modalities of the French and European energy policies. (J.S.)

  14. The Role of the British Crown on Security Issues

    Directory of Open Access Journals (Sweden)

    Behar Selimi

    2016-07-01

    Full Text Available United Kingdom is a limited parliamentary monarchy, in which state sovereignty is exercised jointly by two basic political institutions: Royal Crown and Parliament. The credit for a successful political co-governance of these institutions, which are simultaneously bearers of popular sovereignty, are usually addressed to the Queen's lack of executive power to exercise power alone and hence all the restraint in the race for primate of governance. It goes even further considering that the Queen is quite weak and has only ceremonial functions, which do not disturb the Parliament. However, a careful researcher may notice that the Queen continues to affect the British Government in general and in particular on defence issues. Declassification of communication between Prince Charles and the Government in 2013, pointed out a continuing impact of the Queen and her son on many political issues, including those of defence and security. Since Britain has no codified constitution in a single document, it is not easy to determine the real power and competences of the Queen. It is even more difficult, because customary law and precedent prevail. Therefore, the real definition of the role of the Queen in general in the British Government, can be done by studying the culture, structure and constitutional practice. On their basis I will try to determine the real impact of the Queen in matters of defence and security, whether through her prerogatives in relation to the Government and Parliament, or through moral and informal influence in relation to the Prime Minister and particular ministers.

  15. The uniqueness of the energy security, justice, and governance problem

    International Nuclear Information System (INIS)

    Goldthau, Andreas; Sovacool, Benjamin K.

    2012-01-01

    This article argues that among all policy fields exhibiting externalities of a global scale, energy stands out on four dimensions: vertical complexity, horizontal complexity, higher entailed costs, and stronger path dependency. These structural attributes are at odds with contemporary key challenges of energy security, energy justice, and low carbon energy transition. With regard to the latter, energy governance challenges occur related to unclear levels of authority and weak resilience. This has implications for energy scholarship, specifically relating to the political economy of energy transitions, discussions about common pool resources, systems analysis, and other neighboring disciplines. - Highlights: ► Among all policy fields exhibiting global externalities, energy stands out. ► It is characterized by greater complexity, higher costs, and stronger path dependency. ► This is at odds with key challenges relating to security, justice, and transition. ► Problems are particularly related to unclear levels of authority and weak resilience. ► Energy scholarship needs to focus further on these issues.

  16. UK energy issues 1987-1992

    Energy Technology Data Exchange (ETDEWEB)

    Stern, P J

    1987-01-01

    This paper describes and analyses the energy issues and options which the British Government will either choose, or be required, to address over the next five years. After considering the domestic and international environment, the paper looks at the future for: electricity generation, and the coal industry in the light of the decision to privatise the Electricity Supply Industry; the oil and gas sector; research and development; demand and conservation including fuel poverty; energy pricing; international energy issues; and attitudes to energy policy making. 80 refs.

  17. Homeland security: safeguarding America's future with energy efficiency and renewable energy technologies

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2002-08-01

    The State Energy Advisory Board (STEAB) presents this 10th annual report following the one-year anniversary of the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon. This event has had profound impacts on all segments of American society, not the least of which is this country’s energy sector. Long before September 11, a number of energy issues grabbed the nation’s attention, including opening the Arctic National Wildlife Refuge to oil and natural gas exploration, the power crisis in California, nationwide natural gas and gasoline price increases, and the administration’s May 2001 National Energy Policy. However, the events of September 11 refocused attention on the prominent role energy plays in the country’s homeland security. For the most part, the energy aspects of homeland security have focused on the physical security of critical energy emergency planning and energy infrastructure, such as power plants, refineries, and power and fuel transmission systems. While STEAB recognizes the importance of protecting our existing energy infrastructure, this should not be the sole focus of homeland security as it relates to energy.

  18. Addressing security issues related to virtual institute distributed activities

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2008-03-01

    One issue confounding the development and experimentation of distributed modeling and simulation environments is the inability of the project team to identify and collaborate with resources, both human and technical, from outside the United States. This limitation is especially significant within the human behavior representation area where areas such as cultural effects research and joint command team behavior modeling require the participation of various cultural and national representatives. To address this limitation, as well as other human behavior representation research issues, NATO Research and Technology Organization initiated a project to develop a NATO virtual institute that enables more effective and more collaborative research into human behavior representation. However, in building and operating a virtual institute one of the chief concerns must be the cyber security of the institute. Because the institute "exists" in cyberspace, all of its activities are susceptible to cyberattacks, subterfuge, denial of service and all of the vulnerabilities that networked computers must face. In our opinion, for the concept of virtual institutes to be successful and useful, their operations and services must be protected from the threats in the cyber environment. A key to developing the required protection is the development and promulgation of standards for cyber security. In this paper, we discuss the types of cyber standards that are required, how new internet technologies can be exploited and can benefit the promulgation, development, maintenance, and robustness of the standards. This paper is organized as follows. Section One introduces the concept of the virtual institutes, the expected benefits, and the motivation for our research and for research in this area. Section Two presents background material and a discussion of topics related to VIs, uman behavior and cultural modeling, and network-centric warfare. Section Three contains a discussion of the

  19. Renewable energy costs, potentials, barriers: Conceptual issues

    International Nuclear Information System (INIS)

    Verbruggen, Aviel; Fischedick, Manfred; Moomaw, William; Weir, Tony; Nadai, Alain; Nilsson, Lars J.; Nyboer, John; Sathaye, Jayant

    2010-01-01

    Renewable energy can become the major energy supply option in low-carbon energy economies. Disruptive transformations in all energy systems are necessary for tapping widely available renewable energy resources. Organizing the energy transition from non-sustainable to renewable energy is often described as the major challenge of the first half of the 21st century. Technological innovation, the economy (costs and prices) and policies have to be aligned to achieve full renewable energy potentials, and barriers impeding that growth need to be removed. These issues are also covered by IPCC's special report on renewable energy and climate change to be completed in 2010. This article focuses on the interrelations among the drivers. It clarifies definitions of costs and prices, and of barriers. After reviewing how the third and fourth assessment reports of IPCC cover mitigation potentials and commenting on definitions of renewable energy potentials in the literature, we propose a consistent set of potentials of renewable energy supplies.

  20. Energy access and security strategies in Small Island Developing States

    International Nuclear Information System (INIS)

    Wolf, Franziska; Surroop, Dinesh; Singh, Anirudh; Leal, Walter

    2016-01-01

    Small Islands Developing States (SIDS) are isolated and surrounded by ocean. The generation and use of energy resources are two very important aspects for the development of SIDS. Unfortunately, most of SIDS do not use their potential in respect of energy resources, and they as a result have to depend on the import of fossil fuels in order to meet their energy needs. This increases the overall vulnerability of SIDS as they have to depend on the rising or fluctuating fossil fuels prices. Some SIDS, especially in the geographically dispersed Pacific region, do not have proper access to energy whereas other SIDS struggle more with energy security issue. At the same time, SIDS are most vulnerable to the impacts and effects of climate change, as they are among the ones to be most severely affected in case of natural calamities and sea-level rise. Drawing on experiences from Fiji and Mauritius, this paper explains core elements related to energy access and security in SIDS, contextualizes and discusses barriers and list some of the strategies that may be used to ensure access to and a continuous supply of energy in SIDS. A situational analysis of two SIDS outlines their current energy situation and compares their energy policies to globally accepted criteria for SIDS policies as well as with each other. It is claimed that the diverging energy performances of Fiji and Mauritius cannot be explained by policies differences. The reasons for the varying energy performances may therefore lie in the administrative and institutional mechanisms used by the two countries in implementing their energy policies. Finally, to enable SIDS to reduce their overall vulnerability and become truly sustainable islands, it is recommended to undertake careful assessments of the particular local contexts under which island energy regimes operate. - Highlights: • Core elements related to energy access/security in SIDS, barriers and strategies. • Situational analysis of two SIDS: Fiji and

  1. PV in Japan - improving energy security?

    International Nuclear Information System (INIS)

    Anon

    2002-01-01

    Currently, almost 80% of Japan's primary energy is imported and about 50% of this comes from politically unstable countries. The Japanese are now working hard to improve energy security in a clean and sustainable fashion. Since the wind patterns are not favourable for wind power, the emphasis is on photovoltaics (PVs), and many companies that once manufactured integrated circuits are now working on solar cells where their knowledge and experience of mass production, quality control, sales and marketing stand them in good stead. It is expected that the Japanese will be world leaders in the making and export of solar equipment, as well as one of the world's greatest users

  2. Securing energy assets and infrastructure 2007

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-06-15

    This report describes in detail the energy industry's challenges and solutions for protecting critical assets including oil and gas infrastructure, transmission grids, power plants, storage, pipelines, and all aspects of strategic industry assets. It includes a special section on cyber-terrorism and protecting control systems. Contents: Section I - Introduction; U.S Energy Trends; Vulnerabilities; Protection Measures. Section II - Sector-wise Vulnerabilities Assessments and Security Measures: Coal, Oil and Petroleum, Natural Gas, Electric Power, Cybersecurity and Control Systems, Key Recommendations; Section III - Critical Infrastructure Protection Efforts: Government Initiatives, Agencies, and Checklists.

  3. Clean fuel technology for world energy security

    Energy Technology Data Exchange (ETDEWEB)

    Sunjay, Sunjay

    2010-09-15

    Clean fuel technology is the integral part of geoengineering and green engineering with a view to global warming mitigation. Optimal utilization of natural resources coal and integration of coal & associated fuels with hydrocarbon exploration and development activities is pertinent task before geoscientist with evergreen energy vision with a view to energy security & sustainable development. Value added technologies Coal gasification,underground coal gasification & surface coal gasification converts solid coal into a gas that can be used for power generation, chemical production, as well as the option of being converted into liquid fuels.

  4. US oil policy and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-05-01

    Although the energy dependence reached its historical maximum and will continue to increase for the next 20 years, the USA keep their oil policy. For the economist this policy is reasonable because of the poor room for the US imports reduction costs. To explain these conclusions the author discusses on the following topics: the links between the oil dependence and the energy security, the oil policy after Reagan, the oil policy evolution - or no evolution - facing the increasing dependency and the Cheney report. (A.L.B.)

  5. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  6. Reflections on energy issues in China

    International Nuclear Information System (INIS)

    Jiang Zemin

    2008-01-01

    Energy, which has a bearing on both economic and national security, is of importance and a major constraining factor to the economic and social development of China. The article analyses the current world energy status and development trend from the perspectives of resources, production and consumption and in the context of its implications on the environment and economic and social development, and explores opportunities and challenges for China's energy development. With a focus on the strategy of energy development in China, the author proposes a new energy development approach with Chinese characteristics whose main elements are: energy-saving, high-efficiency, diversified development, environment protection, technology guidance and international cooperation. In other words, China is striving to build a reliable energy production, circulation and consumption system that is efficient, technologically advanced, low polluting and ecologically friendly. A long-term development strategy with priority on energy conservation, efficient utillization of primary energy and advanced electricity system is expounded in the paper. The author also describes the prospect of energy technology development and stresses the implementation of energy strategy by further improving energy policy and related mechanisms, strengthening macro-management and the essential role of the market in resource allocation so as to ensure the economic and social development of China through reliable energy supply. (authors)

  7. Security of Europe's energy supply. Russia's role

    International Nuclear Information System (INIS)

    Goffaux, P.

    1994-01-01

    A conference on ''Europe's Energy supplies by Russia'', has been organised march 17th 1994 by the Energy and Raw Materials Geopolitics Centre and the Moscow Energy Club, with participation of the World Energy Council. The round-table on petrol outlined the Eastern Europe dependency and the skepticism of western petroleum companies concerning Russian's deposits. The round table on gas outlined the importance of Russian's gas deposits and the development of its european exportations. The round table on nuclear power stated the heavy costs of security improvements, and argued for the taking off, after year 2000, of a new generation of reactors jointly designed by western and russian engineers. (D.L.). 4 figs., 1 tab

  8. Security of energy supply. Facts and possibilities for action

    International Nuclear Information System (INIS)

    Hake, Juergen-Friedrich; Rath-Nagel, Stefan

    2015-01-01

    The energy infrastructure of a country has a decisive influence on the standard of living there, the competitiveness of its economy and its inner political stability. In the debate about the energy transition in Germany attention is primarily being focused on the future energy mix and how it might change, but in particular on the technical challenges involved as well as the costs of the transition as a whole. Given the growing instability that will arise in the electricity networks in the process of transition, as well as the problems that could occur with the supply of natural gas as a result of the Ukraine crisis, the issue of security of energy supply in Germany (as well as Europe) needs to be addressed anew: Is the energy supply at risk? What sources are available at home and abroad, and what leeway is there for changing the procurement mix?

  9. Energy, a crucial environmental subject. Special issue

    International Nuclear Information System (INIS)

    2001-01-01

    In this issue of the magazine ArenA special attention is paid the use of energy in the Netherlands, the related problems and solutions, and the agenda for the Section Energy of the Dutch Association of Environmental Professionals (VVM) resulting from the technological, administrative and economical problems and solutions

  10. Renewable energy 1998: Issues and trends

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-03-01

    This report presents the following five papers: Renewable electricity purchases: History and recent developments; Transmission pricing issues for electricity generation from renewable resources; Analysis of geothermal heat pump manufacturers survey data; A view of the forest products industry from a wood energy perspective; and Wind energy developments: Incentives in selected countries. A glossary is included. 19 figs., 27 tabs.

  11. 17 CFR 250.52 - Exemption of issue and sale of certain securities.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Exemption of issue and sale of... sale of any security, of which it is the issuer if: (1) The issue and sale of the security are solely.... 79f(a)) and related rules with respect to the issue and sale of any security of which it is the issuer...

  12. Does science have the answer to most issues of food security?

    Directory of Open Access Journals (Sweden)

    Marta Musolino

    2016-11-01

    Full Text Available Today, the attention to food security has grown with the awareness of resources’ scarcity, earth excessive exploitation, population growth and climate change, all factors that are associated with an impelling food emergency. A plethora of theoretical perspectives adopted in analysing food security issue reflects in diverse normative approaches. Some focus on the rapport between population demand and food supply, seeking to reduce the former or increase the latter in order to achieve food security. Applying the technological progress of scientific research will have its positive outcomes: production will increase, keeping prices low; the limited resources will be used more efficiently, decreasing the consumption of water, energy and land; the environment will benefit from a more sustainable production. However, scientific solutions, such as population control, that do not restore individuals’ entitlement to food will be ineffective in preventing food insecurity. Therefore, food security it is not achievable by the sole means of science. A greater quantity of food does not guarantee a more equal distribution of resources. Increasing food production without altering its uneven distribution will only augment this inequality, making who has access to food more secure but not helping who is currently affected by the food insecurity issues. Science can play its role, but development towards the solutions to food insecurity must be led by politics.

  13. FORWARD: DESERTIFICATION IN THE MEDITERRANEAN REGION: A SECURITY ISSUE

    Science.gov (United States)

    The Workshop focused on two basic concepts: security and desertification and their linkages. Since the end of the Cold War, traditional security concepts based on national sovereignty and territorial security have increasingly been brought under review. Currently, a broader defin...

  14. Energy policy and alternative energy in Malaysia: Issues and challenges for sustainable growth

    International Nuclear Information System (INIS)

    Oh, Tick Hui; Pang, Shen Yee; Chua, Shing Chyi

    2010-01-01

    Energy is essential to the way we live. Whether it is in the form of oil, gasoline or electricity, a country's prosperity and welfare depends on having access to reliable and secure supplies of energy at affordable prices. However, it is also one of the benefits taken for granted by many people, knowing little about the impact of electricity on their lives. Having dependent mainly on oil and gas for half a century, Malaysia has started to realize the importance to adopt renewable energy in the energy mix and continuously reviewed its energy policy to ensure sustainable energy supply and security. This paper examines and discusses the intricacy of the existing and new energy policies, issues and challenges in Malaysia. The overall approach in addressing the energy issues and challenges will continue to focus on adequacy, quality, security and sustainability of both non-renewable and renewable energy supply in the country's development and the promotion and implementation of its energy efficiency programs. The recently launched National Green Technology Policy is also discussed. (author)

  15. Energy security for India: Biofuels, energy efficiency and food productivity

    International Nuclear Information System (INIS)

    Gunatilake, Herath; Roland-Holst, David; Sugiyarto, Guntur

    2014-01-01

    The emergence of biofuel as a renewable energy source offers opportunities for significant climate change mitigation and greater energy independence to many countries. At the same time, biofuel represents the possibility of substitution between energy and food. For developing countries like India, which imports over 75% of its crude oil, fossil fuels pose two risks—global warming pollution and long-term risk that oil prices will undermine real living standards. This paper examines India's options for managing energy price risk in three ways: biofuel development, energy efficiency promotion, and food productivity improvements. Our salient results suggest that biodiesel shows promise as a transport fuel substitute that can be produced in ways that fully utilize marginal agricultural resources and hence promote rural livelihoods. First-generation bioethanol, by contrast, appears to have a limited ability to offset the impacts of oil price hikes. Combining the biodiesel expansion policy with energy efficiency improvements and food productivity increases proved to be a more effective strategy to enhance both energy and food security, help mitigate climate change, and cushion the economy against oil price shocks. - Highlights: • We investigate the role of biofuels in India applying a CGE model. • Biodiesel enhances energy security and improve rural livelihoods. • Sugarcane ethanol does not show positive impact on the economy. • Biodiesel and energy efficiency improvements together provide better results. • Food productivity further enhances biodiesel, and energy efficiency impacts

  16. Global Energy Issues and Alternate Fueling

    Science.gov (United States)

    Hendricks, Robert C.

    2007-01-01

    This viewgraph presentation describes world energy issues and alternate fueling effects on aircraft design. The contents include: 1) US Uses about 100 Quad/year (1 Q = 10(exp 15) Btu) World Energy Use: about 433 Q/yr; 2) US Renewable Energy about 6%; 3) Nuclear Could Grow: Has Legacy Problems; 4) Energy Sources Primarily NonRenewable Hydrocarbon; 5) Notes; 6) Alternate Fuels Effect Aircraft Design; 7) Conventional-Biomass Issue - Food or Fuel; 8) Alternate fuels must be environmentally benign; 9) World Carbon (CO2) Emissions Problem; 10) Jim Hansen s Global Warming Warnings; 11) Gas Hydrates (Clathrates), Solar & Biomass Locations; 12) Global Energy Sector Response; 13) Alternative Renewables; 14) Stratospheric Sulfur Injection Global Cooling Switch; 15) Potential Global Energy Sector Response; and 16) New Sealing and Fluid Flow Challenges.

  17. European Energy Policy and Its Effects on Gas Security

    Science.gov (United States)

    Radu, Victorita Stefana Anda

    The goal of this study is to examine the effects of the energy policies of the European Union (EU) on its gas security in the period 2006 to 2016. While energy security is often given a broad meaning, this paper focuses on its external dimension: the EU?s relations with external gas suppliers. It is grounded on four pillars drawing from the compounded institutionalist and liberal theoretical frameworks: regulatory state, rational-choice, external governance, and regime effectiveness. The research question was investigated through a qualitative methodology with two main components: a legislative analysis and four case studies representing the main gas supply options--Russia, North African exporting countries, Norway, and liquefied natural gas (LNG). They highlighted that the EU framed the need for gas security mainly in the context of political risks associated with Russian gas supply, but it almost never took into account other equally important risks. Moreover, the research revealed two main issues. First, that the deeper and the more numerous EU?s energy policies were, the bigger was the magnitude of the effect. Specifically, competitiveness and infrastructure policies had the largest magnitude, while the sustainability and security of supply policies had the smallest effect. Second, EU energy policies only partially diminished the economic and political risks in relation to foreign gas suppliers. To conclude, to a certain extent the EU?s efforts made a positive contribution to the external dimension of the EU?s gas security, but the distinguishing trait remains that there is no consistency in terms of the magnitude of the effect and its nature.

  18. Safeguard and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support U.S. nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  19. An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds

    Energy Technology Data Exchange (ETDEWEB)

    Simmhan, Yogesh; Kumbhare, Alok; Cao, Baohua; Prasanna, Viktor K.

    2011-07-09

    Power utilities globally are increasingly upgrading to Smart Grids that use bi-directional communication with the consumer to enable an information-driven approach to distributed energy management. Clouds offer features well suited for Smart Grid software platforms and applications, such as elastic resources and shared services. However, the security and privacy concerns inherent in an information rich Smart Grid environment are further exacerbated by their deployment on Clouds. Here, we present an analysis of security and privacy issues in a Smart Grids software architecture operating on different Cloud environments, in the form of a taxonomy. We use the Los Angeles Smart Grid Project that is underway in the largest U.S. municipal utility to drive this analysis that will benefit both Cloud practitioners targeting Smart Grid applications, and Cloud researchers investigating security and privacy.

  20. Safeguards and security issues for the U.S. Fissile Materials Disposition Program

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Moya, R.W.; Duggan, R.A.

    1995-01-01

    The Department of Energy's Office of Materials Disposition (MD) is analyzing long-term storage and disposition options for fissile materials, preparing a Programmatic Environmental Impact Statement (PEIS), preparing for a Record of Decision (ROD) regarding this material, and conducting other related activities. A primary objective of this program is to support US nonproliferation policy by reducing major security risks. Particular areas of concern are the acquisition of this material by unauthorized persons and preventing the reintroduction of the material for use in weapons. This paper presents some of the issues, definitions, and assumptions addressed by the Safeguards and Security Project Team in support of the Fissile Materials Disposition Program (FMDP). The discussion also includes some preliminary ideas regarding safeguards and security criteria that are applicable to the screening of disposition options

  1. 76 FR 75781 - Treasury Inflation-Protected Securities Issued at a Premium

    Science.gov (United States)

    2011-12-05

    ... Inflation-Protected Securities Issued at a Premium AGENCY: Internal Revenue Service (IRS), Treasury. ACTION... tax treatment of Treasury Inflation-Protected Securities issued with more than a de minimis amount of... a toll-free number). SUPPLEMENTARY INFORMATION: Background Treasury Inflation-Protected Securities...

  2. An Empirical Study of Security Issues Posted in Open Source Projects

    DEFF Research Database (Denmark)

    Zahedi, Mansooreh; Ali Babar, Muhammad; Treude, Christoph

    2018-01-01

    When developers gain thorough understanding and knowledge of software security, they can produce more secure software. This study aims at empirically identifying and understanding the security issues posted on a random sample of GitHub repositories. We tried to understand the presence of security...

  3. US oil dependency and energy security

    International Nuclear Information System (INIS)

    Noel, P.

    2002-12-01

    As an introduction to the seminar of the 30 May 2002 on the US oil dependency and energy security, the author analyzes the different factors which characterize the american petroleum market situation today. A special interest is thus done to the price increase of 1999-2000 due to the legislation evolution, the gas market tensions, the impact and the power of the OPEC on the international markets, the 11 September 2001 attempts and their political and military consequences. The author also discusses about three papers written after the seminar. (A.L.B.)

  4. Proposal on concept of security of energy supply with nuclear energy

    International Nuclear Information System (INIS)

    Ujita, Hiroshi; Matsui, Kazuaki; Yamada, Eiji

    2009-01-01

    Security of energy supply (SoS) was a major concern for OECD governments in the early 1970s. Since then, successive oil crises, volatility of hydrocarbon prices, as well as terrorist risks and natural disasters, have brought the issue back to the centre stage of policy agendas. SoS concept has been proposed which is defined by time frame and space frame as well. Wide meaning SoS consists of narrow meaning SoS of short-term energy crisis, which is the traditional concept, and long-term global energy problem, which has become important recently. Three models have been proposed here for evaluating SoS. A method to estimate energy security level in a quantitative manner by comparing with various measures has been also proposed, in which nuclear energy contribution onto SoS can be further measured. (author)

  5. Energy Geographies: Thinking Critically about Energy Issues in the Classroom

    Science.gov (United States)

    Delgado, Elvin

    2016-01-01

    Energy issues are becoming increasingly common subjects of instruction in undergraduate- and graduate-level classrooms across a variety of disciplines. The interdisciplinary character of energy studies provides geographers with a great opportunity to present different applied and theoretical approaches to help students conceptualize energy issues…

  6. Ocean energy: key legal issues and challenges

    International Nuclear Information System (INIS)

    Wright, Glen; Rochette, Julien; O'Hagan, Anne Marie; De Groot, Jiska; Leroy, Yannick; Soininen, Niko; Salcido, Rachael; Castelos, Montserrat Abad; Jude, Simon; Kerr, Sandy

    2015-01-01

    Ocean energy is a novel renewable energy resource being developed as part of the push towards a 'Blue Economy'. The literature on ocean energy has focused on technical, environmental, and, increasingly, social and political aspects. Legal and regulatory factors have received less attention, despite their importance in supporting this new technology and ensuring its sustainable development. In this Issue Brief, we set out some key legal challenges for the development of ocean energy technologies, structured around the following core themes of marine governance: (i) international law; (ii) environmental impacts; (iii) rights and ownership; (iv) consenting processes; and (v) management of marine space and resources. (authors)

  7. Public perceptions of energy issues in Ontario

    International Nuclear Information System (INIS)

    2004-11-01

    In October 2004, the Environics Research Group conducted a telephone survey of 608 adult Ontarians to collect information on matters regarding energy; consumer confidence and protection; responsibilities of the Ontario Energy Board; and consumer information preferences. This report summarizes the key findings of the survey. According to the survey, the most important electricity and natural gas issue was identified as being price and cost issues, followed by reliability of supply, conservation, keeping utilities publicly owned, finding renewable sources of energy, and over-consumption. The survey revealed that Ontarians show much interest in conserving energy to save money, to protect the environment and ensure future energy supply, but they are generally sceptical that their interests are being protected on electricity and natural gas price issues. At least 9 in 10 Ontarians consider the tasks of the Ontario Energy Board to be important. The majority of Ontarians prefer to receive energy conservation information through the mail and from public regulators over a government department or a company. 10 tabs

  8. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, D.J.; Curlee, T.R. (Oak Ridge National Lab., TN (United States)); Bohi, D.R. (Resources for the Future, Inc., Washington, DC (United States))

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab.

  9. Energy security, public policy, and the role of the DOE Office of Energy Emergencies

    International Nuclear Information System (INIS)

    Bjornstad, D.J.; Curlee, T.R.; Bohi, D.R.

    1991-11-01

    This paper addresses the concept of energy security, the costs and benefits of energy security, and policies which could potentially alter these costs and benefits. These issues are considered from the perspective of the DOE's Office of Energy Emergencies, with the goal of determining if alternative or additional roles should be open to this Office. The approach taken is limited to the economic costs and benefits of energy security, reflecting our view that the bulk of important energy security issues can at least be approached from this perspective. An energy emergency results from a sudden change in the quantity, market price, and/or social value of energy, in combination with a domestic and/or world wide energy system that cannot rapidly adjust to that change. We do not believe that mitigating the impacts of such events is always necessary, nor that it is uniquely a governmental responsibility. In fact, the first recourse in emergency preparedness should always be to the private sector. Government should deal with three different aspects of emergency energy activities. First, it should condition the decision making environment by seeing that adequate information about energy conditions is available and that its own policy position is clear. Next, it should evaluate the preparedness measures undertaken by the private sector. Finally, if it finds private sector preparation to be inadequate, government has a variety of direct and indirect means with which to intervene. One direct measure currently used is the buildup and drawdown of the strategic petroleum reserve (SPR). Others include contingency plans to override market allocations during wartime, as might be developed under the graduated mobilization response (GMR). Indirect means include a variety of tax and transfer schemes that alter existing private sector incentives to prepare. Well conceived monetary and fiscal policies complete the tools. 1 fig., 1 tab

  10. Accelerator applications in energy and security

    CERN Document Server

    Chou, Weiren

    2015-01-01

    As accelerator science and technology progressed over the past several decades, the accelerators themselves have undergone major improvements in multiple performance factors: beam energy, beam power, and beam brightness. As a consequence, accelerators have found applications in a wide range of fields in our life and in our society. The current volume is dedicated to applications in energy and security, two of the most important and urgent topics in today's world. This volume makes an effort to provide a review as complete and up to date as possible of this broad and challenging subject. It contains overviews on each of the two topics and a series of articles for in-depth discussions including heavy ion accelerator driven inertial fusion, linear accelerator-based ADS systems, circular accelerator-based ADS systems, accelerator-reactor interface, accelerators for fusion material testing, cargo inspection, proton radiography, compact neutron generators and detectors. It also has a review article on accelerator ...

  11. 31 CFR 356.0 - What authority does the Treasury have to sell and issue securities?

    Science.gov (United States)

    2010-07-01

    ... to sell and issue securities? 356.0 Section 356.0 Money and Finance: Treasury Regulations Relating to... sell and issue securities? Chapter 31 of Title 31 of the United States Code authorizes the Secretary of... AND ISSUE OF MARKETABLE BOOK-ENTRY TREASURY BILLS, NOTES, AND BONDS (DEPARTMENT OF THE TREASURY...

  12. Perceptions of Accounting Practitioners and Educators on E-Business Curriculum and Web Security Issues

    Science.gov (United States)

    Ragothaman, Srinivasan; Lavin, Angeline; Davies, Thomas

    2007-01-01

    This research examines, through survey administration, the perceptions of accounting practitioners and educators with respect to the multi-faceted security issues of e-commerce payment systems as well as e-business curriculum issues. Specific security issues explored include misuse/theft of personal and credit card information, spam e-mails,…

  13. 76 FR 75829 - Treasury Inflation-Protected Securities Issued at a Premium

    Science.gov (United States)

    2011-12-05

    ... Treasury Inflation-Protected Securities Issued at a Premium AGENCY: Internal Revenue Service (IRS... IRS is issuing temporary regulations that provide guidance on the tax treatment of Treasury Inflation....1275-7(d) applies to Treasury Inflation-Protected Securities (TIPS) issued with more than a de minimis...

  14. Competing policy packages and the complexity of energy security

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Saunders, Harry

    2014-01-01

    To underscore both the diversity and severity of energy security tradeoffs, this study examines five different energy security policy packages—five distinct strategies aimed at reducing oil dependence, enhancing energy affordability, expanding access to modern energy services, responding to climate change, and minimizing the water intensity of energy production. It identifies both compelling synergies and conflicts between each of the five strategies. The central value of the study is that it turns on its head the widely accepted notion of a “portfolio approach” or “all of the above” strategy to energy policymaking. To make this case, the article begins by elucidating the complexity and multidimensionality of energy security as a concept. It then introduces our five energy security policy packages to illustrate how some energy security objectives complement each other whereas others counteract each other. It concludes by noting that energy security is not an absolute state, and that achieving it only “works” by prioritizing some dimensions, or policy goals and packages, more than others. - Highlights: • Energy security is a complex, multidimensional concept. • Policy packages aimed at achieving energy security often conflict with each other. • Energy security only “works” by prioritizing some dimensions more than others

  15. Power, Profits, and Politics: Energy Security and Cooperation in Eurasia

    Science.gov (United States)

    Svyatets, Ekaterina

    This study explores varying outcomes of energy cooperation, defined as diplomatic relations, bilateral trade, and investment in oil and natural gas. Tests of theories pertinent to energy security - broadly speaking, realism, liberalism, and domestic politics---reveal that they alone can offer only a narrow and one-sided explanation, not embracing the complexity of energy issues. Nevertheless, using them as a starting point, this study outlined a structured framework that incorporates three variables---economic potential, geopolitical rivalry, and domestic interest groups---that are applied to the cases of U.S.-Russia, U.S.-Azerbaijan, and Russia-Germany energy ties. This study concludes that if the economic potential (defined by geographic proximity and resource availability) is very high, such as in the case of Russia-Germany, states can overcome geopolitical rivalries and historical enmities in favor of energy cooperation. However, if the economic potential is relatively low (because of geographic obstacles or easily available alternative suppliers, as in the cases of U.S.-Russia and U.S.-Azerbaijan), then geopolitics prevails---for example, to bypass Russia or to limit American access to contracts in Russia when U.S.-Russian relations are strained. In all the cases explored here, domestic interest groups have mixed influence: if they are united along energy issues, they usually successfully achieve their energy policy goals, although the impact of these groups often becomes intertwined with state interests. In other situations, when powerful interest groups are divided or focused on non-energy-related issues (such as ethnic priorities), their influence over energy deals is much lower.

  16. Energy Demand and Supply Analysis and Outlook - Energy Forecast for 2001 and Policy Issues

    Energy Technology Data Exchange (ETDEWEB)

    Na, In Gang; Ryu, Ji Chul [Korea Energy Economics Institute, Euiwang (Korea)

    2000-12-01

    The energy consumption in Korea has grown at impressive rates during the last 3 decades, along with the economic growth. The global concern about the environment issue and the restructuring in Korea energy industry has an effect on the pattern and trend of energy demand in Korea. Under the situation, this research are focusing on the analysis of energy consumption and forecast of energy demand. First of all, we analyze the trends and major characteristics of energy consumption, beginning with 1970s and up to the third quarter of 2000. In the analysis of energy consumption by energy types, we also perform qualitative analysis on the trends and characteristics of each energy types, including institutional analysis. In model section, we start with the brief description of synopsis and outline the survey on empirical models for energy demand. The econometric model used in KEEI's short-term energy forecast is outlined, followed by the result of estimations. The 2001 energy demand forecast is predicted in detail by sectors and energy types. In the year 2001, weak demand is projected to continue through the First Half, and pick up its pace of growth only in the Second Half. Projected total demand is 201.3 million TOE or 4.4% growth. In the last section, the major policy issues are summarized in three sub-sections: the restructuring in energy industry, the security of energy demand and supply, international energy cooperation including south-north energy cooperation. (author). 86 refs., 43 figs., 73 tabs.

  17. Maritime security report number 3. September 1996 [U.S. Coast Guard issues passenger vessel and terminal security inspection regulations; international perspectives on maritime security; first Inter-American course on port security

    Science.gov (United States)

    1996-09-01

    While most issues of the Maritime Security Report deal with the security situation in geographic area, the articles in this issue deal with publications, training courses, and policy developments which contribute to deterring opportunities for crimin...

  18. Designing indicators of long-term energy supply security

    International Nuclear Information System (INIS)

    Jansen, J.C.; Van Arkel, W.G.; Boots, M.G.

    2004-01-01

    To our knowledge, so far amazingly little research work has been undertaken to construct meaningful indicators of long-run energy supply security for a particular nation or region. Currently, in addressing energy supply security, policy makers tend to emphasise short-term supply disruptions. In contrast, this pre-study accords with the broader Sustainability Outlook in considering the long-term perspective. This report starts with taking stock, in a concise way, of the official EU energy outlook and issues related to the opportunities to administer changes in the energy mix at the level of major energy use categories. Then a brief survey of relevant literature is made on long-term strategies to ensure survival of systems - be it biological, social, etc. - in an environment largely characterised by high uncertainty and a lot of unchartered territory. We found the work of Andrew Stirling very inspiring in this context. Based on his work and considering the limitations of the present research activity, we retained the Shannon index as the best 'simple' indicator of diversity. In the core of the report, the Shannon index is elaborated into four indicators of long-term energy supply security. Stepwise, additional aspects of long-term energy supply security are introduced. These aspects are: Diversification of energy sources in energy supply; Diversification of imports with respect to imported energy sources; Long-term political stability in regions of origin; The resource base in regions of origin, including the home region/country itself. After small adjustments to allow for data availability, these indicators were applied to the reference year 2030 of four long-term scenarios with data of base year 1995 and projections for underlying variables provided by the Netherlands Environmental Assessment Agency (MNP). Preliminary interpretation of the results suggests the usefulness of the indicators presented in this report. A second activity undertaken in this report was

  19. Homeland Security Affairs Journal, Volume II - 2006: Issue 1, April

    OpenAIRE

    2006-01-01

    Homeland Security Affairs is the peer-reviewed online journal of the Naval Postgraduate School Center for Homeland Defense and Security (CHDS), providing a forum to propose and debate strategies, policies, and organizational arrangements to strengthen U.S. homeland security. The instructors, participants, alumni, and partners of CHDS represent the leading subject matter experts and practitioners in the field of homeland security. April 2006. Welcome to the third edition of Homeland Securit...

  20. Security of Supply of Hydrocarbonates and Differences in Approach to the Issue Definition

    International Nuclear Information System (INIS)

    Dragicevic, T.

    2006-01-01

    Security of Supply became an issue during the First World War when First Lord of Admiralty, W. Churchill, decided to modernize the Navy by replacing coal with oil as a propelling fuel for ships. Crude oil that arrived from the then Persia opened up the question of Security. First Lord of Admiralty defined it in the following way: S afety and certainty in oil lie in variety and variety alone... . This concept of diversification of supply became topical again during the oil crises in 1973. It is topical even today as the world faces disruptions in supply caused by war intervention in Iraq, Al-Qaeda terrorist threats, hurricanes in the Gulf of Mexico or difficulties in natural gas supply caused by disputes between Russia and Ukraine. The important element of security of supply is the own oil and gas production from domestic fields or foreign concessions. The countries that have their own oil industry regard highly the strategic importance of their own reserves. Private ownership of shares in oil companies or sources of capital does not diminish this strategic importance. Participation of renewable energy sources is important not only for environmental protection but for mitigating dependence on energy imports. Croatian energy strategy should be adjusted to new challenges and conditions on the energy market, taking also into account the relevant EU regulations.(author)

  1. Issues of Falsifying Financial Statements in Terms of Economic Security

    Science.gov (United States)

    Zhitlukhina, Olga G.; Rakutko, Svetlana Y.; Berezhnova, Elena I.; Selezneva, Elena Y.; Belik, Elena V.; Shalaeva, Nina I.; Denisevich, Elena I.; Belik, Natalia V.; Saenko, Zhanna E.; Sultanova, Alina A.

    2016-01-01

    The paper deals with problems of the country's economic security and entities, timely resolution of which influences directly the country's national security. The cornerstone of successful existence of any country, especially the Russian Federation, during such complicated period is the presence of effective national economic security system.…

  2. European Uunion Energy Security and Russia

    Directory of Open Access Journals (Sweden)

    Nodari A. Simonia

    2015-01-01

    Full Text Available The article deals with the retrospective of relations between Russia, USA and EU in the sphere of energy security, as well as their interaction regarding the current political crisis in the Ukraine. Particular attention is paid to the evolution of the key actors'positions and the development of their relations within the framework of the regulatory regimes established by the most significant agreements in the energy sphere. In conclusion the authors claim that what they say in their article not only does substantially reinforce the arguments set forth by Professor Giuseppe Guarino, who argues about the negative consequences caused by the dictatorship of the Brussels's bureaucracy within the EU, but also inflicts another blow on the Maastricht Treaty and the Treaty of Lisbon in terms of external policy and trade, since the both Treaties were designed to convert the EU in a real competitor of the United States in the then forming multipolar World. The Brussel's bureaucracy, having turned into a dutiful instrument of the US geopolitical strategy, hindered the movement of the EU in that direction, while its dictatorship in energy security aggravates the crisis situation of the EU, almost pushing the EU to the brink of collapse and disintegration. We have lately witnessed an evolving and growing phenomenon of the so called "Euroscepticism". The results of the Europarliament elections in late May, 2014, were a graphic demonstration of the symptoms of this alarming for the EU disease, when the anti-EU parties in the four out 22 EU countries won the elections (France, United Kingdom, Denmark, and Greece Those results, regardless of the panic headlines in mass media and statements like "shocking" or "earthquake" made by some politicians, were not able to significantly affect the nature of the European Parliament, though they can significantly complicate its work. This is so far the first "alarming bell" tolling for the EU.

  3. Energies-climate review (Panorama energies-climate) - issue 2013

    International Nuclear Information System (INIS)

    Goubet, Cecile; Beriot, Nicolas; Daurian, Aurelien; Vieillefosse, Alice; Ducastelle, Julien; Le Guen, Solenn; Strang, Axel; Courtois, Sophie; Brender, Pierre; Guibert, Olivier de; Croquette, Gilles; Simiu, Diane; Venturini, Isabelle; Hesske, Philip; Oriol, Louise; Louati, Sami; Cadin, Didier; Korman, Bernard; Defays, Julien; Balian, Armelle; Guichaoua, Sabine; Isoard, Vivien; Lamy, Jean-michel; Pelce, Frederic; Fondeville, Louis; Baumont, Thierry; Triquet, Olivier; Mouloudi, Fadwa; Quintaine, Thierry; Reizine, Stanislas; Pertuiset, Thomas; Caron, Antoine; Blanchard, Sidonie; Timsit, Isabelle; Lewis, Florian; Ducouret, Melanie; Leclercq, Martine; Derville, Isabelle; Grenon, Georgina; Thomas, Julien; Oeser, Christian; Thouin, Catherine; Dumiot, Jacques-Emmanuel; Rondeau, Claudine; Menager, Yann; Barber, Nicolas; Weill, Jonathan; Furois, Timothee; Thomines, Marie; Brunet-Lecomte, Helene; Boutot, Romary; Strang, Axel; Giraud, Jean; Thomas, Julien; Oeser, Christian; Perrette, Lionel; Breda, Willy; Panetier, Vincent; Miraval, Bruno; Delaugerre, Frederique; Leinekugel Le Cocq, Thibaut; Lemaire, Yves; Thabet, Soraya

    2013-01-01

    This issue first analyses what is at stake with energy transition: struggle against climate change, management of energy demand and promotion of energy efficiency, struggle against energy poverty, development of technologies for tomorrow's energy system. It discusses France's position within its European and international environment: European energy-climate objectives, world context of oil and gas markets, European electricity markets, imports and exports, energy bill. It presents and analyses the situation of the oil and gas sector in France: hydrocarbon exploration and production in France, refining activities, substitution fuels, oil infrastructures, oil product retailing, and gas infrastructures. It then presents the French electric system (electricity production, electricity transport and distribution grids and networks, electric system safety) and the industrial sectors involved in de-carbonated energy production: biomass, wind energy, sea energy, geothermal energy, hydroelectricity, nuclear energy, photovoltaic and thermodynamic solar energy. It addresses the industrial sectors involved in a better use of energy: dynamic control of smart energy systems (smart grids, hydrogen, energy storage), CO 2 capture and storage, de-carbonated vehicle and its ecosystem. The last part addresses oil product prices, gas prices, electricity prices, the energy tax system, and the arrangements and costs of the support to renewable energy production

  4. AY 2007-2008 Achieving U.S. Energy Security: Energy Industry Sector Report Seminar 8

    National Research Council Canada - National Science Library

    2008-01-01

    ...; the ability to generate and exploit inexpensive energy underpins that strength. Therefore, the United States has a vital interest in ensuring the viability and stability of the global energy system and securing its energy security...

  5. Energy modeling issues in quick service restaurants

    Energy Technology Data Exchange (ETDEWEB)

    Smith, V.A.; Johnson, K.F.

    1997-03-01

    The complexity of monitoring and modeling the energy performance of food-service facilities was discussed. Usually, less than one third of the energy consumed in a commercial food-service facility is used by equipment and systems typically modeled in building simulation software such as DOE-2. Algorithms have not yet been developed to handle independent makeup air units and the kitchen and dining room HVAC systems. The energy used by food process equipment and water heating is based on customer-volume and operation-hours. Monitoring projects have been undertaken to provide detailed energy use profiles of individual appliances and whole restaurants. Some technical issues that are unique to food-service modeling in current versions of DOE-2.1E software in the context of quick service restaurants, such as difficulties in modelling internal heat gains of hooded cooking appliances and walk-in refrigeration, and system and zone limitations on tracking energy consumption, were discussed. 1 fig.

  6. Energy production for environmental issues in Turkey

    Science.gov (United States)

    Yuksel, Ibrahim; Arman, Hasan; Halil Demirel, Ibrahim

    2017-11-01

    Due to the diversification efforts of energy sources, use of natural gas that was newly introduced into Turkish economy, has been growing rapidly. Turkey has large reserves of coal, particularly of lignite. The proven lignite reserves are 8.0 billion tons. The estimated total possible reserves are 30 billion tons. Turkey, with its young population and growing energy demand per person, its fast growing urbanization, and its economic development, has been one of the fast growing power markets of the world for the last two decades. It is expected that the demand for electric energy in Turkey will be 580 billion kWh by the year 2020. Turkey's electric energy demand is growing about 6-8% yearly due to fast economic growing. This paper deals with energy demand and consumption for environmental issues in Turkey.

  7. Sustainable energy issues in developing countries

    Energy Technology Data Exchange (ETDEWEB)

    Munasinghe, M [Environmental Policy Division, The World Bank, Washington D.C. (US)

    1991-07-01

    Increased energy use is a vital pre-requisite for economic development, and less developing countries (LDCs) are struggeling to meet energy needs at acceptable costs. LDC decision-makers share the worldwide environmental concerns, but also face other urgent issues like poverty. The industrialised countries can afford to substitute environmental protection for further material growth, but the LDCs will need concessional funding to participate in addressing global environmental problems. Global financing issues may be analysed and resolved through tradeoffs among several criteria including affordability/additionality, fairness/equity, and economic efficiency. The short-term LDC response to sustainable energy issues will be limited mainly to conventional technologies in efficiency improvements, conservation and resource development. The industrialised nations should provide financial resources to LDCs and develop the technology to be used in the 21st century. Pilot international funds like the Global Environmental Facility and the Ozone Fund will help LDCs participate in the effort to solve global environmental issues. (author) 16 refs.

  8. Renewable corn-ethanol and energy security

    International Nuclear Information System (INIS)

    Eaves, James

    2007-01-01

    Though corn-ethanol is promoted as renewable, models of the production process assume fossil fuel inputs. Moreover, ethanol is promoted as a means of increasing energy security, but there is little discussion of the dependability of its supply. This study investigates the sensibility of promoting corn-ethanol as an automobile fuel, assuming a fully renewable production process. We then use historical data to estimate the supply risk of ethanol relative to imported petroleum. We find that devoting 100% of US corn to ethanol would displace 3.5% of gasoline consumption and the annual supply of the ethanol would be inherently more risky than that of imported oil. Finally, because large temperature increases can simultaneously increase fuel demand and the cost of growing corn, the supply responses of ethanol producers to temperature-induced demand shocks would likely be weaker than those of gasoline producers. (author)

  9. China's Quest for Energy; Impact upon Foreign and Security Policy

    International Nuclear Information System (INIS)

    Kiesow, Ingolf

    2004-11-01

    Contrary to Chinese intentions, the proportion of China's imports coming from potentially unstable countries is steadily increasing. As a response, China tries to diversify its sources of import and to own the oil when loaded in an export harbour. In spite of very high costs and political problems, China tries to import oil and gas from owned fields in Central Asia through pipelines. In the case of China, the competition is evident on the highest international level. Especially with Japan, this tends to make already previously sensitive relations deteriorate. China has territorial disputes with several neighbouring countries that are becoming more complicated by the fact that there is oil and gas on the bottom of the sea in the disputed area. Relations with Russia have been complicated. Since the 1990s they are on their way of being steadily improved, but they become strained, when Japan is given priority access to oil fields in Siberia. The sensitive relations with the U.S. tend to be impaired by China's ways of getting access to more secure supply of oil and gas. Chinese efforts to get a more attractive foreign policy profile is on the other hand alleviating but does not eliminate the potential of the energy issue to complicate. China's foreign and security policy relations. The European Union seems to be on its way to introduce energy questions as a field of common policy. This is a reason for Sweden to study the development. It is a matter of special interest that China has proposed an 'Energy Dialogue between Asia and Europe' about the resources and the Eurasian continent. The Chinese example illustrates the need for a Swedish energy security policy and plans for energy crisis preparedness

  10. Nuclear power and national energy security

    International Nuclear Information System (INIS)

    Addae, A.K.

    2001-01-01

    The demand for energy in Ghana is expected to grow rapidly in the next couple of decades if the objectives of the Vision 2020 Programme are to become a reality. In particular, the demand for electric power is expected to increase 3 to 5 fold over 1997 levels by the year 2020.This calls for early planning. Adequate and dependable central station electric power supplies in the next couple of decades is therefore very critical to sustainable development and the achievement of the objective of the Vision 2020 Programme. Curtailment in electric power supplies cause disruption in economic activities and consequent economic losses. The recent cases in point are the 1983/84 and 1997/1998 power curtailments in Ghana due to low water levels in the Akosombo Reservoir. These led not only to substantial disruptions in economic activities but also to the erosion of invest confidence in the economy. It is, therefore, very essential that the country's central station electric power supply system should not continue to depend on hydro-electric power as in the past years but should be based on a mix of energy sources to provide an acceptable level of national energy security under all circumstances

  11. Cyber security issues, challenges and solutions for the emerging smart grid

    Energy Technology Data Exchange (ETDEWEB)

    Westlund, D. [N-Dimension Solutions Inc., Richmond Hill, ON (Canada)

    2007-07-01

    This paper explored the technology and business issues and challenges associated the smart grid's tolerance of physical and cyber security attacks and proposed a framework that provides practical solutions for the electric operator. The 7 characteristics of a smart grid were described. Notably, a smart grid is self healing; supports client equipment and usage behaviour; tolerates physical and cyber security attacks; delivers high-quality power to customers; supports various power generation technologies; supports competitive power markets; and, delivers capital asset optimization while minimizing operational costs. According to the North American Electric Reliability Council (NERC), power capacity will increase by 6 per cent in the United States and 9 per cent in Canada, while the demand for electricity is expected to rise by 19 and 13 per cent respectively. In addition, total transmission miles are projected to increase by less than 7 per cent in the U.S. and by only 3.5 per cent in Canada. A Smart Grid, with distributed monitoring and control, is therefore needed to meet the increased demand. However, the power and energy sectors are targets for cyber attackers. Cyber security in real-time grid operations is a complex matter. Cyber risks include unauthorized access to control systems; interception of control data; attack on system components; interception of monitoring data; intentional and unintentional human intervention; and, impairment to application software. The proposed solution framework is based on a roadmap developed by the United States Homeland Security organization, the United States Department of Energy, and the Canadian Energy Infrastructure Protection Division. NERC reliability standards and framework are also integrated into this framework. The technical aspects of the framework include: ease of use; defence-in-depth characteristics; extensive monitoring within electronic security perimeters; protection of legacy systems; auditing, logging

  12. Asia-Europe cooperation on energy security an overview of options and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Nicolas, F.; Godement, F.; Yakushiji, T

    2005-07-01

    Asian and European economies are major players on the international energy markets. Because of broad similarities in the energy situation in both regions, and also because of some existing major differences, there is definitely scope for joint discussions and cooperation on energy issues between the countries of the two regions, despite possible competing interests. This document aims at examining the conditions for this possible cooperation, as well as the major incentives and obstacles. After a brief reminder on the notion of energy security, a first section provides a synthesis of the energy situation and outlook in the two regions. The next section focuses more specifically on energy security issues and policies, emphasizing the diversity of strategies followed in the two regions. The last section concludes by sketching possible avenues for cooperation on energy issues between countries of the two regions.

  13. Asia-Europe cooperation on energy security an overview of options and challenges

    International Nuclear Information System (INIS)

    Nicolas, F.; Godement, F.; Yakushiji, T.

    2005-01-01

    Asian and European economies are major players on the international energy markets. Because of broad similarities in the energy situation in both regions, and also because of some existing major differences, there is definitely scope for joint discussions and cooperation on energy issues between the countries of the two regions, despite possible competing interests. This document aims at examining the conditions for this possible cooperation, as well as the major incentives and obstacles. After a brief reminder on the notion of energy security, a first section provides a synthesis of the energy situation and outlook in the two regions. The next section focuses more specifically on energy security issues and policies, emphasizing the diversity of strategies followed in the two regions. The last section concludes by sketching possible avenues for cooperation on energy issues between countries of the two regions

  14. Hawai‘i Distributed Energy Resource Technologies for Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2012-09-30

    HNEI has conducted research to address a number of issues important to move Hawai‘i to greater use of intermittent renewable and distributed energy resource (DER) technologies in order to facilitate greater use of Hawai‘i's indigenous renewable energy resources. Efforts have been concentrated on the Islands of Hawai‘i, Maui, and O‘ahu, focusing in three areas of endeavor: 1) Energy Modeling and Scenario Analysis (previously called Energy Road mapping); 2) Research, Development, and Validation of Renewable DER and Microgrid Technologies; and 3) Analysis and Policy. These efforts focused on analysis of the island energy systems and development of specific candidate technologies for future insertion into an integrated energy system, which would lead to a more robust transmission and distribution system in the state of Hawai‘i and eventually elsewhere in the nation.

  15. Inter-organizational future proof EHR systems A review of the security and privacy related issues

    NARCIS (Netherlands)

    van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan

    2009-01-01

    OBJECTIVES: Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. METHODS: Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in

  16. Radiation Protection, Safety and Security Issues in Ghana

    International Nuclear Information System (INIS)

    Boadu, M. B.; Emi-Reynolds, G.; Amoako, J. K.; Hasford, F.; Akrobortu, E.

    2015-01-01

    The Radiation Protection Board was established in 1993 by PNDC Law 308 as the National Competent Authority for the regulation of radiation sources and radioactive materials in Ghana. The mandate and responsibilities of RPB are prescribed in the legislative instrument, LI 1559 issued in 1993. The operational functions of the Board are carried out by the Radiation Protection Institute, which was established to provide technical support for the enforcement of the legislative instrument. The regulatory activities include among others: – Issuance permits for the import/export of any radiation producing device and radioactive materials into/out of the country. It therefore certifies the radioactivity levels in food and the environmental samples. – Authorization and Inspection of practices using radiation sources and radioactive materials in Ghana. – Undertakes safety assessment services and enforcement actions on practices using radiation sources and radioactive materials in line with regulations. – Provides guidance and technical support in fulfilling regulatory requirement to users of radiation producing devices and radioactive materials nationwide by monitoring of monthly radiation absorbed doses for personnel working at radiation facilities. – Provides support to the management of practices in respect of nuclear and radioactive waste programme. – Calibrates radiation emitting equipment and nuclear instrumentation to ensure the safety of patients, workers and the general public. – Establish guidelines for the mounting (non-ionizing) communication masts. – Environmental monitoring (non-ionizing) programmes for communication masts. With the establishment of the national competent authority, facilities using radioactive sources and radiation emitting devices have been brought under regulatory control. Effective regulatory control of radiation emitting devices are achieved through established legal framework, independent Regulatory Authority supported by

  17. Economics of international energy security policy

    International Nuclear Information System (INIS)

    Paik, I.K.

    1992-01-01

    Because there is no inexpensive substitute for crude oil and petroleum products at the present time, an oil supply disruption inevitably leads to higher oil prices and economic losses. Wealth transfer to oil producing nations, reduced output increased unemployment and inflation. For these reasons, major oil-consuming countries currently have in place various oil emergency response measures to protect themselves from adverse economic consequences of oil supply disruptions: stockpiling emergency oil reserves to augment supplies, if necessary, in an emergency; and lowering oil demand through non-price mechanisms. The main purpose of this paper is to show that while, supply enhancement and demand reduction could have the same effect on oil prices in the event of an oil supply shortfall, they may have significantly different effects on the economies. Section I discusses the principal oil emergency response measures of the members of the International Energy Agency (IEA) -- emergency oil stockpiles and demand restraint -- and their policies for implementing the measures. Section II describes the analytical method used to perform comparative economic analysis of releasing emergency stocks and restraining demand in an oil emergency. Section III presents quantitative results of the analysis, and Section IV, conclusions of the analytical results and their energy security policy implications

  18. Special issue on Resilience and (in)security

    DEFF Research Database (Denmark)

    Kristensen, Kristian Søby

    , and redefine relations of security and insecurity. We show the increased attention – scholarly as well as political – given to resilience in recent times and provide a review of the state of critical security studies literature on resilience. We argue that to advance this discussion, resilience needs...

  19. Security and the 2015 elections: issues and perspectives | Attoh Ph ...

    African Journals Online (AJOL)

    Politics is the quest for power, influence and authority and for the simple reason that political office aids the allocation of resources in transition states it is often viewed as warfare with attendant security implications. Security which is the freedom from danger or damage whether physical or emotional is imperative in the ...

  20. Information Security Issues in Higher Education and Institutional Research

    Science.gov (United States)

    Custer, William L.

    2010-01-01

    Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…

  1. Security Issues for Mobile Medical Imaging: A Primer.

    Science.gov (United States)

    Choudhri, Asim F; Chatterjee, Arindam R; Javan, Ramin; Radvany, Martin G; Shih, George

    2015-10-01

    The end-user of mobile device apps in the practice of clinical radiology should be aware of security measures that prevent unauthorized use of the device, including passcode policies, methods for dealing with failed login attempts, network manager-controllable passcode enforcement, and passcode enforcement for the protection of the mobile device itself. Protection of patient data must be in place that complies with the Health Insurance Portability and Accountability Act and U.S. Federal Information Processing Standards. Device security measures for data protection include methods for locally stored data encryption, hardware encryption, and the ability to locally and remotely clear data from the device. As these devices transfer information over both local wireless networks and public cell phone networks, wireless network security protocols, including wired equivalent privacy and Wi-Fi protected access, are important components in the chain of security. Specific virtual private network protocols, Secure Sockets Layer and related protocols (especially in the setting of hypertext transfer protocols), native apps, virtual desktops, and nonmedical commercial off-the-shelf apps require consideration in the transmission of medical data over both private and public networks. Enterprise security and management of both personal and enterprise mobile devices are discussed. Finally, specific standards for hardware and software platform security, including prevention of hardware tampering, protection from malicious software, and application authentication methods, are vital components in establishing a secure platform for the use of mobile devices in the medical field. © RSNA, 2015.

  2. An Examination of Issues Surrounding Information Security in California Colleges

    Science.gov (United States)

    Butler, Robert D.

    2013-01-01

    Technological advances have provided increasing opportunities in higher education for delivering instruction and other services. However, exposure to information security attacks has been increasing as more organizations conduct their businesses online. Higher education institutions have one of the highest frequencies of security breaches as…

  3. Security and Robustness issues in Collaborative Runtime Verification

    NARCIS (Netherlands)

    Testerink, B.J.G.; Bulling, N.; Dastani, M.M.

    2015-01-01

    Decentralized monitors can have robustness and security risks. Among robustness risks are attacks on the monitor's infrastructure in or- der to disable parts of its functionality. Among security risks are attacks that try to extract information from the monitor, and thereby possibly leak sensitive

  4. The Superpowers: Nuclear Weapons and National Security. Teacher's Guide. National Issues Forums in the Classroom.

    Science.gov (United States)

    Levy, Tedd

    This teacher's guide is designed to accompany the National Issues Forums'"The Superpowers: Nuclear Weapons and National Security." Activities and ideas are provided to challenge students to debate and discuss the United States-Soviet related issues of nuclear weapons and national security. The guide is divided into sections that…

  5. 77 FR 15319 - Treasury Inflation-Protected Securities Issued at a Premium; Hearing Cancellation

    Science.gov (United States)

    2012-03-15

    ... DEPARTMENT OF THE TREASURY Internal Revenue Service 26 CFR Part 1 [REG-130777-11] RIN 1545-BK45 Treasury Inflation-Protected Securities Issued at a Premium; Hearing Cancellation AGENCY: Internal Revenue...), providing guidance on the tax treatment of Treasury Inflation-Protected Securities issued with more than a...

  6. Energy security in a competitive world

    International Nuclear Information System (INIS)

    Stevenson, M.G.

    1989-01-01

    The world is shrinking and becoming increasingly interconnected. Events in one part of the world quickly impact other parts of the world. Rising standards of living in developed countries, along with rapid communications and growing, mobile populations, go hand in hand with greater worldwide interconnectedness but at the same time are leading to a greater rate of resource depletion. Adequate and economical energy resources are one of the crucial factors in maintaining and increasing standards of living around the world, yet nonrenewable energy resources are being depleted. The international marketplace is also becoming more tightly interconnected and competitive. Increasing trade competition among nations may lead to greater economic efficiency and, on the whole, to improved living standards in successful countries, but competition also contributes to barriers against cooperation. International trade competition may be leading to a tendency for competing nations to become more parochial in technology research and development. The impact of growing populations and rising living standards on the world's environment is also increasing and becoming more pervasive. Solid waste disposal is an increasingly aggravating problem, and hazardous waste and toxic wastes are even more difficult to deal with. Acid rain, global climate change, ozone-layer depletion, stream and harbor pollution, and the resulting pollution of the oceans are all evidence of a highly interconnected world. It is easy to argue that solutions must be political, economic, and social. In large part this must be the case; but as technologists, we want to do all we can to give political, economic, and social forces the best opportunity to succeed. Technology will be part of the solution and not just part of the problem of securing adequate energy supplies with acceptable environmental impact. 2 refs

  7. Multi-perspective analysis of China's energy supply security

    International Nuclear Information System (INIS)

    Geng, Jiang-Bo; Ji, Qiang

    2014-01-01

    China's energy supply security has faced many challenges such as the drastic change of the international energy environment and the domestic energy situation and so on. This paper constructs a multi-dimensional indicator system for the main risks deriving from four aspects to evaluate the situation of China's energy supply security and analyze its evolution characteristics from 1994 to 2011. The results indicate that the situation of China's energy supply security generally presented a downtrend during 1994–2008, as a result of increasing international energy market monopoly and high volatility of international crude oil prices. After 2008, the overall level of China's energy supply security has improved to the level of 2003, which is attributed to the relatively stable international energy environment as well as the effective implementation of energy policies. - Highlights: • A multi-dimensional index system for energy supply security is constructed. • The dynamic influences of external and internal risks are analyzed. • China's energy supply security presents a downward trend during 1994–2008. • The level of China's energy supply security has improved since 2009

  8. Neutrino dark energy. Revisiting the stability issue

    Energy Technology Data Exchange (ETDEWEB)

    Eggers Bjaelde, O.; Hannestad, S. [Aarhus Univ. (Denmark). Dept. of Physics and Astronomy; Brookfield, A.W. [Sheffield Univ. (United Kingdom). Dept. of Applied Mathematics and Dept. of Physics, Astro-Particle Theory and Cosmology Group; Van de Bruck, C. [Sheffield Univ. (United Kingdom). Dept. of Applied Mathematics, Astro-Particle Theory and Cosmology Group; Mota, D.F. [Heidelberg Univ. (Germany). Inst. fuer Theoretische Physik]|[Institute of Theoretical Astrophysics, Oslo (Norway); Schrempp, L. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Tocchini-Valentini, D. [Johns Hopkins Univ., Baltimore, MD (United States). Dept. of Physics and Astronomy

    2007-05-15

    A coupling between a light scalar field and neutrinos has been widely discussed as a mechanism for linking (time varying) neutrino masses and the present energy density and equation of state of dark energy. However, it has been pointed out that the viability of this scenario in the non-relativistic neutrino regime is threatened by the strong growth of hydrodynamic perturbations associated with a negative adiabatic sound speed squared. In this paper we revisit the stability issue in the framework of linear perturbation theory in a model independent way. The criterion for the stability of a model is translated into a constraint on the scalar-neutrino coupling, which depends on the ratio of the energy densities in neutrinos and cold dark matter. We illustrate our results by providing meaningful examples both for stable and unstable models. (orig.)

  9. Issue on supply chain of renewable energy

    International Nuclear Information System (INIS)

    Cucchiella, Federica; D’Adamo, Idiano

    2013-01-01

    Highlights: • One of the most relevant debates, is related to energy and environmental issue. • The development of renewable energy usage is due to several factors. • Indeed challenges from a supply chain point of view are required. • Thorough survey on topics of supply chain and renewable energy has been conducted. • Findings are discussed against the backdrop of SCs as sustainable RE option. - Abstract: Actually, one of the most relevant debates, among both citizens that government, is related to energy and environmental issue. The development of renewable energy usage is due to several factors such as the political strategic decisions and geographical situation. Indeed the high development of renewable energies requires challenges from a supply chain point of view. In this paper, a thorough survey of the extant literature on the topic of supply chain (SC) and renewable energy (RE) has been conducted. English papers published on international peer-reviewed journals from 2003 to 2013 have been considered. Sustainable Supply Chain Management (SSCM) resolves the duality between environmental, economic and social aspects. Sustainable manufacturing practices play an essential role in promoting renewable energy development and commercialization; this will require significant changes to the industry’s traditional Supply Chain Management and business model. The aim of the paper is investigate literature insights useful to increase the performance and overcome barriers to the RE supply chain development. Like many typical supply chains, also supply chain related to RE includes elements such as: physical, information, and financial flows. The present research is useful to individualize characteristics of a RE supply chain. Moreover, the research is useful improve the performance of RE supply chain in some aspects like: • better control supply chain costs to make renewable energy more affordable; • manage supply chain to address weakened demand in the near

  10. International trends on sustainable energy Issues

    International Nuclear Information System (INIS)

    Spitalnik, J.

    2007-01-01

    At the U.N. Commission on Sustainable Development (CSD), the role of nuclear power for a carbon free emission supply of energy is now being recognized although with certain reticence or opposition. Such recognition is taking place at the current cycle of discussions devoted to sustainable energy, industrial development, atmospheric pollution and climate change issues. This paper focuses on the arguments and facts provided during CSD deliberations for considering nuclear energy as a valid option: all available energy sources will need to be considered for an adjustment to a world that requires much less carbon liberation to the environment; in the transportation sector, actions need to be urgently implemented for promoting cleaner fuels and more efficient vehicles; massive reduction of greenhouse gas emissions must be urgently implemented in order to mitigate the impacts of global warming; sustainable energy solutions for developed economies are not always adequate in developing countries; the development evolution requires specifically tailored solutions to conditions of large annual growth-rates of energy demand. Consequently, nuclear power will provide the answer to many of these problems. (Author)

  11. Public views on multiple dimensions of security: nuclear weapons, terrorism, energy, and the environment: 2007

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  12. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    Energy Technology Data Exchange (ETDEWEB)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

    2008-01-01

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  13. Liberalisation and energy security in the European Union. Success and questions

    International Nuclear Information System (INIS)

    Clastres, Cedric; Locatelli, Catherine

    2012-09-01

    The energy environment of the European Union as well as its own internal situation have undergone profound changes. The energy security of member states is therefore an important issue that should be examined. This security concerns gas and electricity markets, with infrastructures, long-term contracts, lack of investment and with the increasing use of natural gas to generate electricity. Energy market players have to manage security concerns in these two markets in order to supply socially and economically essential commodities. In this article, we examine two main topics. The first is related to the European Union's capacity to solve the problem of security of supply by finding internal solutions. The second concerns external security of supply. With the upstream structure of the gas market, a problem of investing in trans-national gas pipelines exists, besides relations with gas suppliers outside the EU. (authors)

  14. Nuclear energy in Romania - a road to energy security

    International Nuclear Information System (INIS)

    Chirica, T.; Lucaciu, G.

    2009-01-01

    The Nuclear Program in Romania is a part of the national and European energy policy: sustainable development, security of energy supply and competitiveness; Romania has a proven experience in construction, commissioning and operation of NPPs, as well as the necessary support infrastructure: Unit 2 completion represents the major project of Nuclearelectrica during its first decade of existence; Innovative approach of Nuclearelectrica related is applied to Cernavoda NPP Units 3 and 4 completion: Major project for the second decade of company life; Risks management and allocation – major tool for project management and financing closure; Support from the political class is crucial, considering that the completion of such projects are covering more than one elections cycle

  15. Strategic Culture and Energy Security Policy of South Korea: The Case of Nuclear Energy

    International Nuclear Information System (INIS)

    Kim, Taehyun

    2012-01-01

    The U. S. - ROK Civil Nuclear Cooperation Agreement highlights the dilemma of contemporary international non-proliferation regime. Non-Proliferation Treaty has represented an awkward balance between the ideal of nuclear energy and the reality of nuclear weapons. It is neither complete nor effective. It is not complete because it does not cover all the issues with respect to nuclear energy, which have become increasingly complex. Nuclear security, for example, is not an issue that it addresses, and it is precisely why President Obama called for the unprecedented Nuclear Security Summit. It is not effective. It has failed in preventing proliferation of nuclear weapons states, India, Israel, Pakistan and North Korea, who remain outside of the regime. An international regime is defined as 'a set of principles, norms, rules, and decision-procedures around which actors' expectations converge. The extents to which actors' expectations converge and forceful measures in the name of international community against any violation are justified will measure its effectiveness. NPT regime is sub-par on that. The world is in dire need of a comprehensive and integrated regime for nuclear energy regime, where proliferation, security, and safety concern are effectively addressed. South Korea, if it truly wants to become a key player in the field, has to be one of its architects. The ability to meet the challenge of revising Civil Nuclear Cooperation Agreement will show if it is a qualified architect

  16. The Role of Secure Access to Sustainable Energy in Reducing ...

    African Journals Online (AJOL)

    The Role of Secure Access to Sustainable Energy in Reducing Women's ... of poverty, such as low education levels, inadequate health care and limited ... women in relation to energy will help governments promote overall development goals ...

  17. U.S. Relations with Japan: A Critical Security Issue?

    National Research Council Canada - National Science Library

    Rodgers, David P

    2006-01-01

    .... The 2005 U.S. National Defense Strategy declares that, "We will create conditions for a favorable international system by honoring our security commitments"--commitments which are critical to our interests abroad...

  18. Mobile Connectivity and Security Issues for Cloud Informatic Systems

    OpenAIRE

    Cosmin Cătălin Olteanu

    2015-01-01

    The main purpose of the paper is to illustrate the importance of new software tools that can be used with mobile devices to make them more secure for the use of day to day business software. Many companies are using mobile applications to access some components to ERP’s or CRM’s remotely. Even the new come, cloud Informatic Systems are using more remote devices than ever. This is why we need to secure somehow these mobile applications.

  19. Mobile Connectivity and Security Issues for Cloud Informatic Systems

    Directory of Open Access Journals (Sweden)

    Cosmin Cătălin Olteanu

    2015-05-01

    Full Text Available The main purpose of the paper is to illustrate the importance of new software tools that can be used with mobile devices to make them more secure for the use of day to day business software. Many companies are using mobile applications to access some components to ERP’s or CRM’s remotely. Even the new come, cloud Informatic Systems are using more remote devices than ever. This is why we need to secure somehow these mobile applications.

  20. Security challenges for energy-harvesting wireless sensor networks

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Papini, Davide; Dragoni, Nicola

    2012-01-01

    With the recent introduction of Energy-Harvesting nodes, security is gaining more and more importance in sensor networks. By exploiting the ability of scavenging energy from the surrounding environment, the lifespan of a node has drastically increased. This is one of the reason why security needs...

  1. Analysis and solutions of security issues in Ethernet PON

    Science.gov (United States)

    Meng, Yu; Jiang, Tao; Xiao, Dingzhong

    2005-02-01

    Ethernet Passive Optical Network (EPON), which combines the low cost Ethernet equipment and economic fiber infrastructure, is being considered as a promising solution for Fiber-To-The-Home (FTTH). However, since EPON is an optical shared medium network, some unique features make it more vulnerable to security attacks. In this paper, the key security threats of EPON are firstly analyzed. And then, considering some specific properties which might be utilized for security, such as the safety of transmissions in upstream direction, some novel methods are presented to solve security problems. Firstly, based on some modification about registration, the mechanism of access control is achieved. Secondly, we implement an AES-128 symmetrical encryption and decryption in the EPON system. The AES-128 algorithm can process data blocks of 128 bits, but the length of Ethernet frame is variable. How to deal with the last block, which is not up to 128 bits, is discussed in detail. Finally, key update is accomplished through a vendor specific OAM frame in order to enhance the level of security. The proposed mechanism will remain in conformance with P2MP specification defined by 802.3ah TF, and can supply a complete security solution for EPON.

  2. Computer-Aided Sensor Development Focused on Security Issues

    Directory of Open Access Journals (Sweden)

    Andrzej Bialas

    2016-05-01

    Full Text Available The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  3. Computer-Aided Sensor Development Focused on Security Issues.

    Science.gov (United States)

    Bialas, Andrzej

    2016-05-26

    The paper examines intelligent sensor and sensor system development according to the Common Criteria methodology, which is the basic security assurance methodology for IT products and systems. The paper presents how the development process can be supported by software tools, design patterns and knowledge engineering. The automation of this process brings cost-, quality-, and time-related advantages, because the most difficult and most laborious activities are software-supported and the design reusability is growing. The paper includes a short introduction to the Common Criteria methodology and its sensor-related applications. In the experimental section the computer-supported and patterns-based IT security development process is presented using the example of an intelligent methane detection sensor. This process is supported by an ontology-based tool for security modeling and analyses. The verified and justified models are transferred straight to the security target specification representing security requirements for the IT product. The novelty of the paper is to provide a patterns-based and computer-aided methodology for the sensors development with a view to achieving their IT security assurance. The paper summarizes the validation experiment focused on this methodology adapted for the sensors system development, and presents directions of future research.

  4. 31 CFR 356.4 - What are the book-entry systems in which auctioned Treasury securities may be issued?

    Science.gov (United States)

    2010-07-01

    ... in which auctioned Treasury securities may be issued? There are three book-entry securities systems... marketable Treasury securities. We maintain and transfer securities in these three book-entry systems at... inflation. Securities may be transferred from one system to the other, unless the securities are not...

  5. Investing in the Energy Sector: An Issue of Governance

    International Nuclear Information System (INIS)

    Horst Keppler, J.; Schulke, Ch.

    2009-01-01

    Of all economic sectors, energy is among those where the issue of investments is the most urgent. Because of its technological structure and significant fixed costs, the energy sector is by nature heavily capital intensive. With growing demand and increasingly difficult access to resources, the amounts needed become enormous. The International Energy Agency (IEA) estimates in its World Energy Outlook 2008 that total energy investment needs between now and 2030 will stand at $26 trillion, or close to $1 trillion per year. This is just for energy supply. Half of these investments will be needed in the electricity sector (see below for more details on these estimations). Even after putting these figures into perspective in terms of total worldwide investments over the next 25 years, the amount of money is still significant. All types of energy are involved - oil, gas, coal, nuclear and renewables. In addition, all steps in the supply chain are included - exploration, production, transformation and transportation. The stakes are high. Without the necessary investments, security of supply, global economic growth and environmental integrity are put at risk. The most important challenge for the energy sector in the years to come is thus to pave the way for realising timely and appropriate investments. The current economic recession that is threatening to curb global economic growth will not change this fact. Even if global energy demand slows down in the next two or three years, the world will return to its long term growth path. An energy facility lasts between 20 and 60 years. Thus, the structure of energy production in 2050, when the current economic crisis has been forgotten, will be determined now and over the next years. Even if global energy demand remains stable between now and 2050 (which is highly improbable), the replacement of existing facilities that have reached the end of their life-cycle will still require considerable efforts. (authors)

  6. Issues of Safety and Security: New Challenging to Malaysia Tourism Industry

    OpenAIRE

    Mohd Ayob Norizawati; Masron Tarmiji

    2014-01-01

    The safety and security issues nowadays become one of the forces causing changes in tourism industry in era of millennium. The main concern of this issues more focus on crime rates, terrorism, food safety, health issues and natural disaster. This topic gained the popularity in tourism research after 9/11 tragedy and since then the academicians and practitioners started seeking the best solution in ways to mitigate these negative impacts. For Malaysia, the image as safety and secure destinatio...

  7. China's energy security: Perception and reality

    Energy Technology Data Exchange (ETDEWEB)

    Leung, Guy C.K., E-mail: guyleung@gmail.co [Hong Kong Energy Studies Centre, Hong Kong Baptist University, Kowloon Tong, Hong Kong Special Administrative Region (Hong Kong)

    2011-03-15

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: {yields} Oil is the form of energy that has produced most of China's energy insecurity. {yields} Transport sector, rather than industry, is the largest driver of China's oil demand. {yields} The contribution of oil pipelines to China's energy security is smaller than many assumed. {yields} Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. {yields} Energy security is a means; it is not a goal.

  8. APPROACH TO CYBER SECURITY ISSUES IN NIGERIA: CHALLENGES AND SOLUTION

    Directory of Open Access Journals (Sweden)

    Frank Ibikunle

    2013-06-01

    Full Text Available Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detailed answers to millions of questions every day. Cyberspace is a world that contains just about anything one is searching for. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats concerning it now need to be taken more seriously. This paper attempts to provide an overview of Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cyber-crime and its eradication. It look at those involved and the reasons for their involvement. Methods of stepping up cyber security and the recommendations that would help in checking the increasing rate of cyber-crimes were highlighted. The paper also attempts to name some challenges of cybercrime and present practical and logical solutions to these threats.

  9. The security energy encryption in wireless power transfer

    Science.gov (United States)

    Sadzali, M. N.; Ali, A.; Azizan, M. M.; Albreem, M. A. M.

    2017-09-01

    This paper presents a concept of security in wireless power transfer (WPT) by applying chaos theory. Chaos theory is applied as a security system in order to safeguard the transfer of energy from a transmitter to the intended receiver. The energy encryption of the wireless power transfer utilizes chaos theory to generate the possibility of a logistic map for the chaotic security key. The simulation for energy encryption wireless power transfer system was conducted by using MATLAB and Simulink. By employing chaos theory, the chaotic key ensures the transmission of energy from transmitter to its intended receiver.

  10. Access to primary energy sources - the basis of national energy security

    Science.gov (United States)

    Szlązak, Jan; Szlązak, Rafał A.

    2017-11-01

    National energy security is of fundamental importance for economic development of a country. To ensure such safety energy raw material, also called primary energy sources, are necessary. Currently in Poland primary energy sources include mainly fossil fuels, such as hard coal, brown coal, natural gas and crude oil. Other sources, e.g. renewable energy sources account for c. 15% in the energy mix. Primary energy sources are used to produce mainly electricity, which is considered as the cleanest form of energy. Poland does not have, unfortunately, sufficient energy sources and is forced to import some of them, mainly natural gas and crude oil. The article presents an insightful analysis of energy raw material reserves possessed by Poland and their structure taking account of the requirements applicable in the European Union, in particular, those related to environmental protection. The article also describes demand for electricity now and in the perspective of 2030. Primary energy sources necessary for its production have also been given. The article also includes the possibilities for the use of renewable energy sources in Poland, however, climatic conditions there are not are not particularly favourable to it. All the issues addressed in the article are summed up and ended with conclusions.

  11. Diversification and localization of energy systems for sustainable development and energy security

    International Nuclear Information System (INIS)

    Li Xianguo

    2005-01-01

    The dominance of a single-energy system inevitably leads to excessive burden on, and eventually weakening, a particular aspect of the environment, and can cause environmental fatigue and failure (permanent damage) or even catastrophe if dominated for too long; thus it inevitably poses the health and environmental risk. This is the case for our currently fossil-fuel-based energy systems. In fact, each energy system, including renewables and alternative fuels, has its own unique adverse impact on the environment, as dictated by the second law of thermodynamics. A truly sustainable development may be achieved with the diversification and localization of energy sources and systems if the adverse impact of each energy system is sufficiently small and well within the tolerance limit of the environment. Energy diversification and localization would also provide a security for the energy supply and distribution as well for the energy consumers - a specifically important issue in the wake of blackout (electric power failure) in the Northeastern states to the Midwest of the United States and part of Canada on August 14, 2003. The idea of diversified energy systems for the good of humanity and environment is similar to many analogies in other fields, such as bio-diversity is the best means to prevent the spread and damage of diseases and pests, and diversified investment is the best strategy to guarantee the overall best investment return. It is concluded that the diversification and localization of energy systems is the best future energy systems that would be environmentally compatible, and allow for sustainable development as well as energy security for both supply and distribution to the energy consumers

  12. Diversification and localization of energy systems for sustainable development and energy security

    International Nuclear Information System (INIS)

    Xianguo Li

    2005-01-01

    The dominance of a single-energy system inevitably leads to excessive burden on, and eventually weakening, a particular aspect of the environment, and can cause environmental fatigue and failure (permanent damage) or even catastrophe if dominated for too long; thus it inevitably poses the health and environmental risk. This is the case for our currently fossil-fuel-based energy systems. In fact, each energy system, including renewables and alternative fuels, has its own unique adverse impact on the environment, as dictated by the second law of thermodynamics. A truly sustainable development may be achieved with the diversification and localization of energy sources and systems if the adverse impact of each energy system is sufficiently small and well within the tolerance limit of the environment. Energy diversification and localization would also provide a security for the energy supply and distribution as well for the energy consumers - a specifically important issue in the wake of blackout (electric power failure) in the Northeastern states to the Midwest of the United States and part of Canada on August 14, 2003. The idea of diversified energy systems for the good of humanity and environment is similar to many analogies in other fields, such as bio-diversity is the best means to prevent the spread and damage of diseases and pests, and diversified investment is the best strategy to guarantee the overall best investment return. It is concluded that the diversification and localization of energy systems is the best future energy systems that would be environmentally compatible, and allow for sustainable development as well as energy security for both supply and distribution to the energy consumers. (Author)

  13. APPROACH TO CYBER SECURITY ISSUES IN NIGERIA: CHALLENGES AND SOLUTION

    OpenAIRE

    Frank Ibikunle; Odunayo Eweniyi

    2013-01-01

    Cyber-space refers to the boundless space known as the internet. Cyber-security is the body of rules put in place for the protection of the cyber space. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Over the past decades, the growth of the internet and its use afforded everyone this opportunity. Google, Wikipedia and Bing to mention a few, give detaile...

  14. Security Issues in the Android Cross-Layer Architecture

    OpenAIRE

    Armando, Alessandro; Merlo, Alessio; Verderame, Luca

    2012-01-01

    The security of Android has been recently challenged by the discovery of a number of vulnerabilities involving different layers of the Android stack. We argue that such vulnerabilities are largely related to the interplay among layers composing the Android stack. Thus, we also argue that such interplay has been underestimated from a security point-of-view and a systematic analysis of the Android interplay has not been carried out yet. To this aim, in this paper we provide a simple model of th...

  15. What is the place of the energy supply security and energy independence in the energy policy?

    International Nuclear Information System (INIS)

    2001-12-01

    Since the petroleum crisis and the electric power cuts of the 1999 storm, the energy security interest is growing. The author recall the structural risks of the energy systems and the vulnerability of the occidental economies to the supply disruptions. They propose then a long term cooperation between producer and consumer countries, a development of operational tools to face the crisis and a supply security inside the europe. (A.L.B.)

  16. The Oil Security Metrics Model: A Tool for Evaluating the Prospective Oil Security Benefits of DOE's Energy Efficiency and Renewable Energy R&D Programs

    Energy Technology Data Exchange (ETDEWEB)

    Greene, David L [ORNL; Leiby, Paul Newsome [ORNL

    2006-05-01

    Energy technology R&D is a cornerstone of U.S. energy policy. Understanding the potential for energy technology R&D to solve the nation's energy problems is critical to formulating a successful R&D program. In light of this, the U.S. Congress requested the National Research Council (NRC) to undertake both retrospective and prospective assessments of the Department of Energy's (DOE's) Energy Efficiency and Fossil Energy Research programs (NRC, 2001; NRC, 2005). ("The Congress continued to express its interest in R&D benefits assessment by providing funds for the NRC to build on the retrospective methodology to develop a methodology for assessing prospective benefits." NRC, 2005, p. ES-2) In 2004, the NRC Committee on Prospective Benefits of DOE's Energy Efficiency and Fossil Energy R&D Programs published a report recommending a new framework and principles for prospective benefits assessment. The Committee explicitly deferred the issue of estimating security benefits to future work. Recognizing the need for a rigorous framework for assessing the energy security benefits of its R&D programs, the DOE's Office of Energy Efficiency and Renewable Energy (EERE) developed a framework and approach for defining energy security metrics for R&D programs to use in gauging the energy security benefits of their programs (Lee, 2005). This report describes methods for estimating the prospective oil security benefits of EERE's R&D programs that are consistent with the methodologies of the NRC (2005) Committee and that build on Lee's (2005) framework. Its objective is to define and implement a method that makes use of the NRC's typology of prospective benefits and methodological framework, satisfies the NRC's criteria for prospective benefits evaluation, and permits measurement of that portion of the prospective energy security benefits of EERE's R&D portfolio related to oil. While the Oil Security Metrics (OSM) methodology described

  17. Japan’s energy security predicament post-Fukushima

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2012-01-01

    If energy security is defined as the availability of energy at all times in various forms, in sufficient quantities and at affordable prices, without unacceptable or irreversible impact on the economy and the environment, Japan is facing an energy security predicament. For a country that was already uneasy about energy security, the March 11, 2011 earthquake and tsunami, which caused a nuclear catastrophe in TEPCO’s Fukushima Daiichi nuclear power plant, turned this unease into outright anxiety. With the temporary and/or permanent closure of many nuclear reactors Japan has had to replace lost power. Tokyo has had no choice but to secure additional fossil fuels, a strategy that has negatively affected Japan’s economy due to rising fuel costs. The increase in Japan’s fossil fuel consumption has also caused a significant increase in greenhouse gas emissions, and affected Tokyo’s commitment to Kyoto targets. This paper analyzes the consequences of the 2011 nuclear disaster for Japan’s energy security. Recognizing that Japan’s future energy policy choices are constrained and path dependent, the paper outlines energy policy recommendations for Japan’s government. - Highlights: ► Analysis of Japan’s energy security situation post-Fukushima. ► Energy transition is path dependant and slow. ► Government is facing significant challenges in terms of future energy policy.

  18. Nuclear Arms and National Security. 1983 National Issues Forum.

    Science.gov (United States)

    Melville, Keith, Ed.

    Appropriate for secondary school social studies, this booklet outlines approaches for dealing with the threat of nuclear warfare in six sections. The first section, "Learning to Live with Nuclear Weapons," introduces the topic and considers what can be done to decrease the risk of nuclear warfare without jeopardizing the nation's security. "Arms…

  19. Security issues and service provision in Laz Otti Memorial Library ...

    African Journals Online (AJOL)

    Lagos Journal of Library and Information Science ... Data was analysed with the aid of Statistical Package for Social Sciences (SPSS. ... To curb this menace, library management must educate users on use of library resources ... Keywords: Library security, Theft, Mutilation, Vandalism, Library resources; Laz Otti Memorial ...

  20. 18 CFR 131.43 - Report of securities issued.

    Science.gov (United States)

    2010-04-01

    .... Securities and Exchange Commission registration fee 6. State mortgage registration tax 7. State commission fee 8. Fee for recording indenture 9. United States document tax 10. Printing and engraving expenses 11. Trustee's charges 12. Counsel fees 13. Accountant's fees 14. Cost of listing 15. Miscellaneous...

  1. Energy Security in Asia: Prospects for Regional Cooperation

    OpenAIRE

    Lucas, Nigel

    2014-01-01

    Three case studies illustrate some of the secondary consequences of the search for energy security and its relationship to regional trade and cooperation: the role of the People’s Republic of China, the emerging market in biofuels in Southeast Asia, and diverse feed-in tariffs for renewable energy. The three main ways regional cooperation can strengthen national policies on energy security are (i) sharing information and knowledge to create a sound evidence base for policies, (ii) agreeing on...

  2. Exploring public perceptions of energy security risks in the UK

    International Nuclear Information System (INIS)

    Demski, Christina; Poortinga, Wouter; Pidgeon, Nick

    2014-01-01

    Along with climate change and affordability, concerns about energy security are key drivers behind proposals for major energy system change in the UK and numerous other countries. Unlike climate change we know very little about how the public thinks and feels about this aspect of sustainability and energy policy. Beyond engaging critically with conceptual and theoretical discussions, empirical data from two surveys (Cardiff postal survey, N=520; online UK survey, N=499) using a ten item energy security scale are presented and discussed. Here we show that aspects of energy security are certainly of concern to the UK public, with particularly high concern around dependence on fossil fuels/imports and relatively lower expressed concern for actual disruption of energy supply. However public concerns around energy security are only emerging, and likely to change depending on the context in which it is discussed (e.g. in comparison to climate change). In addition, findings from public interviews are used to further contextualise the survey findings, showing unfamiliarity among the UK public with regards to the term “energy security”. We discuss implications, and further work that would be useful for understanding public perceptions in more depth. - highlights: • Exploring public views on energy security using a 10 item scale. • Concerns over energy security is relatively high but susceptible to framing. • Patterns of concern for different energy security aspects examined. • The term energy security is unfamiliar, only an emerging concern among UK publics. • Further discussion on the meanings and implications of these perceptions

  3. Energy symposium 2007 - energy secured?... for what price. Summary of the congress contributions

    International Nuclear Information System (INIS)

    2008-01-01

    With its topical title ''Energy secured?.. for what price'' the 2007 Energy Symposium has added yet another milestone to its success story. Energy is a fundamental aspect of our industrial society. It is of essential importance that the demand for low-cost energy is strategically secured. Energy prices are basic to calculations on products that have to be sold and exported. They are therefore also an essential factor in securing Europe as an industrial region

  4. American security perspectives: public views on energy, environment, nuclear weapons and terrorism: 2008

    International Nuclear Information System (INIS)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.

    2008-01-01

    We analyze and compare findings from matching national surveys of the US general public on US energy and environmental security administered by telephone and Internet in mid-2008. Key areas of investigation include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alter-native sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include evolving perspectives on global climate change and relationships among environmental issues and potential policy options. We also report findings from an Internet survey of the general public conducted in mid-2008 that investigates assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism.

  5. Challenges and countermeasures of China’s energy security

    International Nuclear Information System (INIS)

    Cao, Wensheng; Bluth, Christoph

    2013-01-01

    China is now a major consumer and importer of energy, and its choices and policies will increasingly affect the rest of the world. This paper analyses the key features of China’s energy policy as it faces the prospect of possible challenges to its energy security given the increasing reliance on fuel imports and the need to transform its energy to meet the requirements of a modern, fast-growing economy. The paper examines whether the current energy mix is appropriate and sustainable, and considers the China’s policymakers new emphasis on energy efficiency, conservation, renewable energy and the shift to natural gas the primary energy source. It examines the internal and external constraints on China’s energy policy and considers the strategic dilemmas arising from China’s increasing involvement in international energy markets. It concludes that both the domestic and international implications of China’s search for energy security will confront policymakers with hard choices that will affect not only energy policy, but also China’s geopolitical grand strategy. - Highlights: ► Conception of energy security and energy policy in China’s grand strategy are expatiated. ► Challenges China is facing are analyzed from 4 aspects. ► New strategic thoughts of China including 6 capability enhancements are raised. ► Major tasks of safeguarding energy security contain 3 measures of improvement.

  6. Security Issues for Information Quality on Mobile Devices

    Directory of Open Access Journals (Sweden)

    Dana Ramona ANDRISESCU

    2010-01-01

    Full Text Available Mobile devices are used everywhere, from making acall to store huge volume of information. But together withdevices shrinking and rise of storage space on a single device webring to mind the problem of trusting the stored information.Trusting the information and assuring its quality meansknowing the security threats these devices face and measuresthat should be taken. Many questions rise from here like “Whathappens when a mobile device is used by several persons andespecially employees?”, “Is that information reliable andoriginal?”, “Who is responsible for a device and its security?”.We are going to see in this paper that information quality can beassured even on portable devices by using the adequate securitymeasures.

  7. New nuclear power in the UK: A strategy for energy security?

    International Nuclear Information System (INIS)

    Watson, Jim; Scott, Alister

    2009-01-01

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  8. New nuclear power in the UK. A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim; Scott, Alister [Sussex Energy Group, SPRU, The Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security - the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made. (author)

  9. New nuclear power in the UK: A strategy for energy security?

    Energy Technology Data Exchange (ETDEWEB)

    Watson, Jim, E-mail: w.j.watson@sussex.ac.u [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom); Scott, Alister [Sussex Energy Group, SPRU, Freeman Centre, University of Sussex, Brighton, East Sussex BN1 9QE (United Kingdom)

    2009-12-15

    The aim of this paper is to explore the extent to which the construction of new nuclear power plants in the UK can safeguard or enhance energy security. The paper starts with a discussion of energy security, and breaks it down into four main categories of threat. These include threats due to fossil fuel scarcity and external disruptions, problems due to a lack of investment in infrastructure, threats due to technology or infrastructure failure, and risks due to domestic activism or terrorism. The paper then discusses one of the most common strategies put forward to improve security-the promotion of diversity within energy systems. Following this, the paper assesses the potential for new nuclear investment to ameliorate security threats in each of the four categories introduced earlier in the paper. The paper concludes that whilst nuclear investment can help to mitigate some threats to UK energy security, the government's case for supporting this investment ignores some equally important security issues. As a result, the energy security case for nuclear power has not yet been made.

  10. Energy security and climate change protection: Complementarity or tradeoff?

    International Nuclear Information System (INIS)

    Brown, Stephen P.A.; Huntington, Hillard G.

    2008-01-01

    Energy security and climate change protection have risen to the forefront of energy policy - linked in time and a perception that both goals can be achieved through the same or similar policies. Although such complementarity can exist for individual technologies, policymakers face a tradeoff between these two policy objectives. The tradeoff arises when policymakers choose the mix of individual technologies with which to reduce greenhouse gas emissions and enhance energy security. Optimal policy is achieved when the cost of the additional use of each technology equals the value of the additional energy security and reduction in greenhouse gas emission that it provides. Such an approach may draw more heavily on conventional technologies that provide benefits in only one dimension than on more costly technologies that both increase energy security and reduce greenhouse gas emissions. (author)

  11. Energy Security of Russia and the EU: Current Legal Problems

    Energy Technology Data Exchange (ETDEWEB)

    Seliverstov, S.

    2009-07-01

    Security of energy supply is a cornerstone of European energy policy. It receives specific mention both in the Constitution Treaty and in the Lisbon Treaty. Of course, energy and energy-generated revenues are vital for Russia as well. It is a common understanding that Russia and the EU are extremely interdependent in terms of energy. On the one hand, Russia is the strategic energy supplier to the EU as a whole; for some member states Russian supplies represent the only source of the external energy flows. On the other hand, the revenues generated from the west-bound supplies of oil and gas constitute a significant share of the overall export income and of the budget of Russian Federation. Taking the interdependency as a point of departure the present article answers the following questions: What are the differences and the similarities in the European and the Russian approaches towards security of energy supply? Is their understanding of energy security so different? What are the current legal instruments guiding interaction in this sphere? What are the actual trends that could give some indication of how the situation may develop in the future? - While the concepts of 'security of energy supplies' or of 'energy security' are theoretical in nature, the ways the concepts are understood and the legal framework for them directly influences the way they are applied in practice. (author)

  12. Energy Security of Russia and the EU: Current Legal Problems

    International Nuclear Information System (INIS)

    Seliverstov, S.

    2009-01-01

    Security of energy supply is a cornerstone of European energy policy. It receives specific mention both in the Constitution Treaty and in the Lisbon Treaty. Of course, energy and energy-generated revenues are vital for Russia as well. It is a common understanding that Russia and the EU are extremely interdependent in terms of energy. On the one hand, Russia is the strategic energy supplier to the EU as a whole; for some member states Russian supplies represent the only source of the external energy flows. On the other hand, the revenues generated from the west-bound supplies of oil and gas constitute a significant share of the overall export income and of the budget of Russian Federation. Taking the interdependency as a point of departure the present article answers the following questions: What are the differences and the similarities in the European and the Russian approaches towards security of energy supply? Is their understanding of energy security so different? What are the current legal instruments guiding interaction in this sphere? What are the actual trends that could give some indication of how the situation may develop in the future? - While the concepts of 'security of energy supplies' or of 'energy security' are theoretical in nature, the ways the concepts are understood and the legal framework for them directly influences the way they are applied in practice. (author)

  13. Global energy security and the implications for the EU

    International Nuclear Information System (INIS)

    Umbach, Frank

    2010-01-01

    The following article will analyse the global and geopolitical dimensions of the future international energy security and its implications for Europe and the EU-27. In this context, I will discuss to which extent the EU's newly proclaimed 'Energy Action Plan' of the EU Spring summit of 2007 and its declared common energy (foreign) policy are a sufficient strategy to cope with the new global and geopolitical challenges. The article concludes the following: (1) The interlinkage between globally designed traditional energy security concepts - that rely just on economic factors and 'market-strategies' - and domestic as well as regional political stability demands new thinking with regard to both energy supply security and foreign and security policies. (2) Although after the Russian-Ukrainian gas conflict in January 2006, energy security has forced its way up the European energy and foreign policy agendas, the EU-27 member states have largely failed to forge a coherent European energy security and energy foreign policy strategy after their Spring summit of 2007 because its declared political solidarity has been still lacking. But the 2nd Strategic Energy Review of November 2008 has recommended new initiatives to overcome this lack by promoting concrete infrastructure and other projects for enhancing Europe's supply security and its political solidarity as part of a common energy (foreign) policy. If the EU is able to implement the March 2007 and November 2008 decisions, the EU oil and gas demand will drastically reduce and freeze at current levels. In this case, Putin's energy policies by using Russia's energy resources and pipeline monopolies as a political instrument to enforce its economic and geopolitical interests will be proved as self-defeating in Russia's long-term strategic interests. It will reduce Gazprom's gas exports to a much smaller EU gas market than originally forecasted as the result of a deliberate EU policy of decreasing its overall gas demand and

  14. Security Issues of the Digital Certificates within Public Key Infrastructures

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available The paper presents the basic byte level interpretation of an X.509 v3 digital certificate according to ASN.1 DER/BER encoding. The reasons for byte level analysis are various and important. For instance, a research paper has mentioned how a PKI security may be violated by MD5 collision over information from the certificates. In order to develop further studies on the topic a serious knowledge about certificate structure is necessary.

  15. Chemical Facility Security: Reauthorization, Policy Issues, and Options for Congress

    Science.gov (United States)

    2010-12-10

    gaseous chlorine disinfection to chloramine disinfection —a change identified by some advocacy groups as being an inherently safer substitution—as being...chemicals, such as chlorine, for purposes such as disinfection .29 Advocates for their inclusion in security regulations cite the presence of such...Science and Technology (S& T ) Directorate is engaged in a Chemical Infrastructure Risk Assessment Project that, among other goals, will assess the

  16. A Survey on Security and Privacy Issues of Bitcoin

    OpenAIRE

    Conti, Mauro; E, Sandeep Kumar; Lal, Chhagan; Ruj, Sushmita

    2017-01-01

    Bitcoin is a popular cryptocurrency that records alltransactions in a distributed append-only public ledger calledblockchain. The security of Bitcoin heavily relies on the incentive-compatible proof-of-work (PoW) based distributed consensus pro-tocol, which is run by network nodes called miners. In exchangefor the incentive, the miners are expected to honestly maintainthe blockchain. Since its launch in 2009, Bitcoin economy hasgrown at an enormous rate, and it is now worth about 170 billions...

  17. Review Of E-Commerce Issues: Consumers Perception On Security And Privacy

    OpenAIRE

    Saravanan Muthaiyah; Joseph Antony Jude Ernest; Chew Kok Wai

    2011-01-01

    Web security has been a major issue of debate in the recent years. The lack of security is perceived as a major stumbling block for doing business online. Electronic cash payment systems are becoming more important than ever to facilitate online transactions and thus replacing traditional payment methods such as checks The prime objective of this paper is to determine the perception of consumers towards the security aspects of e-commerce technology. Specifically this paper examines the percep...

  18. Energy security impacts of a severe drought on the future Finnish energy system.

    Science.gov (United States)

    Jääskeläinen, Jaakko; Veijalainen, Noora; Syri, Sanna; Marttunen, Mika; Zakeri, Behnam

    2018-07-01

    Finland updated its Energy and Climate Strategy in late 2016 with the aim of increasing the share of renewable energy sources, increasing energy self-sufficiency and reducing greenhouse gas emissions. Concurrently, the issue of generation adequacy has grown more topical, especially since the record-high demand peak in Finland in January 2016. This paper analyses the Finnish energy system in years 2020 and 2030 by using the EnergyPLAN simulation tool to model whether different energy policy scenarios result in a plausible generation inadequacy. Moreover, as the Nordic energy system is so heavily dependent on hydropower production, we model and analyse the impacts of a severe drought on the Finnish energy system. We simulate hydropower availability according to the weather of the worst drought of the last century (in 1939-1942) with Finnish Environment Institute's Watershed Simulation and Forecasting System and we analyse the indirect impacts via reduced availability of electricity imports based on recent realised dry periods. Moreover, we analyse the environmental impacts of hydropower production during the drought and peak demand period and the impacts of climate change on generation adequacy in Finland. The results show that the scenarios of the new Energy and Climate Strategy result in an improved generation adequacy comparing to the current situation. However, a severe drought similar to that experienced in 1940s could cause a serious energy security threat. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    OpenAIRE

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to pro...

  20. Transportation Security: Issues for the 109th Congress

    National Research Council Canada - National Science Library

    Frittelli, John

    2005-01-01

    .... The focus of this issue brief is how best to construct and finance a system of deterrence, protection, and response that effectively reduces the possibility and consequences of another terrorist...

  1. Laser Applications to Chemical, Security, and Environmental Analysis: introduction to the feature issue

    International Nuclear Information System (INIS)

    Dreizler, Andreas; Fried, Alan; Gord, James R.

    2007-01-01

    This Applied Optics feature issue on Laser Applications to Chemical, Security,and Environmental Analysis (LACSEA) highlights papers presented at theLACSEA 2006 Tenth Topical Meeting sponsored by the Optical Society ofAmerica

  2. Laser applications to chemical, security, and environmental analysis: introduction to the feature issue.

    Science.gov (United States)

    Seeger, Thomas; Dreier, Thomas; Chen, Weidong; Kearny, Sean; Kulatilaka, Waruna

    2017-04-10

    This Applied Optics feature issue on laser applications to chemical, security, and environmental analysis (LACSEA) highlights papers presented at the LACSEA 2016 Fifteenth Topical Meeting sponsored by the Optical Society of America.

  3. Oil and international security: old and new issues; Petrole et securite internationale: de nouveaux enjeux

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    1998-09-01

    This paper questions the effectiveness of the link between international oil and (inter)national security. First, it explains an acknowledge the rise and decline of the traditional case of this link: the threat that so called ''oil dependence'' inflicts upon the national economy, hence the problem it raises for government. The reason for that decline is looked for in the emergence of multiple forms of competition in oil and energy markets, making the ''oil weapon'' less credible and its use less desirable and less possible. In oil like in any other commodity, the normal situation is the competition between suppliers for access to markets. For all basic economics tells us and experience has confirmed, analyses and policies (at least in France) are still strongly influenced by the ''oil security'' thinking shaped in the eve of the 1970 crises. Yet, those fallacies may be the strongest obstacle to the acknowledgment of the real oil security issues we face. The main one is the possible political destabilization of the Middle East due to oil competition between its members in an increasingly competitive world market. The consequences on regional antagonisms of the come back of Iraqi oil to the market on one hand, the internal stability of Iran and Saudi Arabia in a situation of lasting low oil revenues on the other hand, are reviewed as the main possible factors of regional destabilization in a context of strong competition in the world oil market. A large scale political burst with major oil producers concerned would certainly hurt developed and developing economy. That leads us to this paradoxical situation: the very cause of the decline of the traditional oil dependence issue is, due to Middle East situation, the main cause of possible destabilization of world oil market today. (author)

  4. Oil and international security: old and new issues; Petrole et securite internationale: de nouveaux enjeux

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    1998-09-01

    This paper questions the effectiveness of the link between international oil and (inter)national security. First, it explains an acknowledge the rise and decline of the traditional case of this link: the threat that so called ''oil dependence'' inflicts upon the national economy, hence the problem it raises for government. The reason for that decline is looked for in the emergence of multiple forms of competition in oil and energy markets, making the ''oil weapon'' less credible and its use less desirable and less possible. In oil like in any other commodity, the normal situation is the competition between suppliers for access to markets. For all basic economics tells us and experience has confirmed, analyses and policies (at least in France) are still strongly influenced by the ''oil security'' thinking shaped in the eve of the 1970 crises. Yet, those fallacies may be the strongest obstacle to the acknowledgment of the real oil security issues we face. The main one is the possible political destabilization of the Middle East due to oil competition between its members in an increasingly competitive world market. The consequences on regional antagonisms of the come back of Iraqi oil to the market on one hand, the internal stability of Iran and Saudi Arabia in a situation of lasting low oil revenues on the other hand, are reviewed as the main possible factors of regional destabilization in a context of strong competition in the world oil market. A large scale political burst with major oil producers concerned would certainly hurt developed and developing economy. That leads us to this paradoxical situation: the very cause of the decline of the traditional oil dependence issue is, due to Middle East situation, the main cause of possible destabilization of world oil market today. (author)

  5. Issues of Human Security and Educational Development in the Niger Delta Region of Nigeria

    Science.gov (United States)

    Ololube, Nwachukwu Prince; Kpolovie, Peter James; Amaele, Samuel

    2013-01-01

    Drawing from documents, observation, interview and questionnaire, we highlighted the role of issues of human security and its impact on the educational development of the Niger Delta region as well as means of enhancing human security in Nigeria. This article is a conceptual and methodological breakthrough in Nigeria's academic landscape where…

  6. 6 CFR 27.203 - Calculating the screening threshold quantity by security issue.

    Science.gov (United States)

    2010-01-01

    ... SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.203 Calculating... possesses a chemical of interest that meets the STQ for any security issue, a facility need not include... development, involving chemicals of interest conducted outside the laboratory. (ii) [Reserved] (3) Propane. In...

  7. Information Security Trends and Issues in the Moodle E-Learning Platform: An Ethnographic Content Analysis

    Science.gov (United States)

    Schultz, Christopher

    2012-01-01

    Empirical research on information security trends and practices in e-learning is scarce. Many articles that have been published apply basic information security concepts to e-learning and list potential threats or propose frameworks for classifying threats. The purpose of this research is to identify, categorize and understand trends and issues in…

  8. 78 FR 666 - Treasury Inflation-Protected Securities Issued at a Premium; Bond Premium Carryforward

    Science.gov (United States)

    2013-01-04

    ...-BL29 Treasury Inflation-Protected Securities Issued at a Premium; Bond Premium Carryforward AGENCY... contains final regulations that provide guidance on the tax treatment of Treasury Inflation-Protected... regulations in this document provide guidance to holders of Treasury Inflation-Protected Securities and other...

  9. Crossing borders: Security and privacy issues of the European e-passport

    NARCIS (Netherlands)

    Hoepman, J.H.; Hubbers, E.; Jacobs, B.P.F.; Oostdijk, M.D.; Wichers Schreur, R.

    2008-01-01

    The first generation of European e-passports will be issued in 2006. We discuss how borders are crossed regarding the security and privacy erosion of the proposed schemes, and show which borders need to be crossed to improve the security and the privacy protection of the next generation of

  10. Security And Privacy Issues in Healthcare Monitoring Systems: A Case Study

    DEFF Research Database (Denmark)

    Handler, Daniel Tolboe; Hauge, Lotte; Spognardi, Angelo

    2017-01-01

    Security and privacy issues are rarely taken into account in automated systems for monitoring elderly people in their home, exposing inhabitants to a number of threats they are usually not aware of. As a case study to expose the major vulnerabilities these systems are exposed to, this paper reviews...... a generic example of automated healthcare monitoring system. The security and privacy issues identified in this case study can be easily generalised and regarded as alarm bells for all the pervasive healthcare professionals....

  11. Conceptualizing and measuring energy security: A synthesized approach

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Mukherjee, Ishani

    2011-01-01

    This article provides a synthesized, workable framework for analyzing national energy security policies and performance. Drawn from research interviews, survey results, a focused workshop, and an extensive literature review, this article proposes that energy security ought to be comprised of five dimensions related to availability, affordability, technology development, sustainability, and regulation. We then break these five dimensions down into 20 components related to security of supply and production, dependency, and diversification for availability; price stability, access and equity, decentralization, and low prices for affordability; innovation and research, safety and reliability, resilience, energy efficiency, and investment for technology development; land use, water, climate change, and air pollution for sustainability; and governance, trade, competition, and knowledge for sound regulation. Further still, our synthesis lists 320 simple indicators and 52 complex indicators that policymakers and scholars can use to analyze, measure, track, and compare national performance on energy security. The article concludes by offering implications for energy policy more broadly. -- Highlights: → Energy security should consist of five dimensions related to availability, affordability, technology development, sustainability, and regulation. → The dimensions of energy security can be broken down into 20 components. → These components can be distilled into 320 simple indicators and 52 complex indicators.

  12. The security of energy infrastructure and supply in North Africa: Hydrocarbons and renewable energies in comparative perspective

    Energy Technology Data Exchange (ETDEWEB)

    Lacher, Wolfram, E-mail: wolfram.lacher@swp-berlin.org [Stiftung Wissenschaft und Politik/German Institute for International and Security Affairs (SWP), Berlin (Germany); Kumetat, Dennis, E-mail: d.kumetat@lse.ac.uk [Department of Geography and Environment, London School of Economics and Political Science, London (United Kingdom)

    2011-08-15

    While security risks to energy infrastructure and supply are frequently cited as a source of concern in the public debate on Europe's energy relationships with North Africa, few academic publications have addressed the issue to date. This article focuses on two potential threats to energy security in the North African context: first, intenational disruption of energy supplies by governments; second, attacks by non-state actors on energy infrastructure. Based on an analysis of North African security and energy geopolitics, the article provides an assessment of these threats as they have materialized with regard to existing energy industries, particularly oil and gas. The article then seeks to apply the findings to renewable energy schemes that are currently being discussed and developed, gauging the likelihood and impact of such threats materializing in respect to various technologies, and differentiating between different states of the region. Finally, the article provides recommendations for policy and further research needs for a successful common European-North African energy future. - Research Highlights: >Interest for investments into renewable energy projects in North Africa is growing. >Perceptions of political/security risks to renewables in North Africa are exaggerated. >Investment in renewables would boost interdependencies between Europe, North Africa. >Terrorist attacks unlikely to pose a major threat to renewables projects in North Africa.

  13. The security of energy infrastructure and supply in North Africa: Hydrocarbons and renewable energies in comparative perspective

    International Nuclear Information System (INIS)

    Lacher, Wolfram; Kumetat, Dennis

    2011-01-01

    While security risks to energy infrastructure and supply are frequently cited as a source of concern in the public debate on Europe's energy relationships with North Africa, few academic publications have addressed the issue to date. This article focuses on two potential threats to energy security in the North African context: first, intenational disruption of energy supplies by governments; second, attacks by non-state actors on energy infrastructure. Based on an analysis of North African security and energy geopolitics, the article provides an assessment of these threats as they have materialized with regard to existing energy industries, particularly oil and gas. The article then seeks to apply the findings to renewable energy schemes that are currently being discussed and developed, gauging the likelihood and impact of such threats materializing in respect to various technologies, and differentiating between different states of the region. Finally, the article provides recommendations for policy and further research needs for a successful common European-North African energy future. - Research Highlights: →Interest for investments into renewable energy projects in North Africa is growing. →Perceptions of political/security risks to renewables in North Africa are exaggerated. →Investment in renewables would boost interdependencies between Europe, North Africa. →Terrorist attacks unlikely to pose a major threat to renewables projects in North Africa.

  14. 17 CFR 270.12d3-1 - Exemption of acquisitions of securities issued by persons engaged in securities related businesses.

    Science.gov (United States)

    2010-04-01

    ... securities issued by persons engaged in securities related businesses. 270.12d3-1 Section 270.12d3-1... in securities related businesses. (a) Notwithstanding section 12(d)(3) of the Act, a registered... securities related business, the determination required by paragraph (b) of this section shall be made as...

  15. Food and Livelihood Security in Punjab through Water, Energy and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Food and Livelihood Security in Punjab through Water, Energy and Agricultural Management ... management and facilitating access to resources by low-income farmers. ... Sharing opportunities for innovation in climate change adaptation.

  16. It's Time for a National Energy Security Strategy

    National Research Council Canada - National Science Library

    Wright, George G

    2008-01-01

    .... can preserve that standing in the world. Colonel Greg Wright argues that what is needed to retain our military and economic superpower advantage is a new overarching United States National Energy Security Strategy...

  17. Integrating security issues in nuclear engineering curriculum in Indonesia. Classical vs policy approaches

    International Nuclear Information System (INIS)

    Putero, Susetyo Hario; Rosita, Widya; Sihana, Fnu; Ferdiansjah; Santosa, Haryono Budi; Muharini, Anung

    2015-01-01

    Recently, risk management for nuclear facilities becomes more complex due to security issue addressed by IAEA. The harmonization between safety, safeguards and security is still questionable. It also challenges to nuclear engineering curriculum in the world how to appropriately lecture the new issue. This paper would like to describe how to integrate this issue in developing nuclear engineering curriculum in Indonesia. Indonesia has still no nuclear power plant, but there are 3 research reactors laid in Indonesia. As addition, there are several hospitals and industries utilizing radioisotopes in their activities. The knowledge about nuclear security of their staffs is also not enough for handling radioactive material furthermore the security officers. Universitas Gadjah Mada (UGM) is the only university in Indonesia offering nuclear engineering program, as consequently the university should actively play the role in overcoming this issue not only in Indonesia, but also in Southeast Asia. In the other hand, students has to have proper knowledge in order to complete in the global nuclear industry. After visited several universities in USA and participated in INSEN meeting, we found that most of universities in the world anticipate this issue by giving the student courses related to policy (non-technical) study based on IAEA NSS 12. In the other hand, the rest just make nuclear security as a case study on their class. Furthermore, almost all of programs are graduate level. UGM decided to enhance several present related undergraduate courses with security topics as first step to develop the awareness of student to nuclear security. The next (curriculum 2016) is to integrate security topics into the entire of curriculum including designing a nuclear security elective course for undergraduate level. The first trial has successfully improved the student knowledge and awareness on nuclear security. (author)

  18. Conceptualising energy security and making explicit its polysemic nature

    Energy Technology Data Exchange (ETDEWEB)

    Chester, Lynne [The John Curtin Institute of Public Policy, Curtin University, GPO Box U1987, Perth WA 6845 (Australia)

    2010-02-15

    Twenty-first century access to energy sources depends on a complex system of global markets, vast cross-border infrastructure networks, a small group of primary energy suppliers, and interdependencies with financial markets and technology. This is the context in which energy security has risen high on the policy agenda of governments around the world and the term 'energy security' has quietly slipped into the energy lexicon. The limited discourse about the nature of the term or its underlying assumptions has been totally eclipsed by an almost overwhelming focus on securing supplies of primary energy sources and geopolitics. An examination of explicit and inferred definitions finds that the concept of energy security is inherently slippery because it is polysemic in nature, capable of holding multiple dimensions and taking on different specificities depending on the country (or continent), timeframe or energy source to which it is applied. This 'slipperiness' poses analytical, prediction and policy difficulties but if explicitly recognised through definitional clarity, new levels of understanding will enrich the policy debate to deal with obstacles impacting on the constantly evolving nature of energy security. (author)

  19. Conceptualising energy security and making explicit its polysemic nature

    International Nuclear Information System (INIS)

    Chester, Lynne

    2010-01-01

    Twenty-first century access to energy sources depends on a complex system of global markets, vast cross-border infrastructure networks, a small group of primary energy suppliers, and interdependencies with financial markets and technology. This is the context in which energy security has risen high on the policy agenda of governments around the world and the term 'energy security' has quietly slipped into the energy lexicon. The limited discourse about the nature of the term or its underlying assumptions has been totally eclipsed by an almost overwhelming focus on securing supplies of primary energy sources and geopolitics. An examination of explicit and inferred definitions finds that the concept of energy security is inherently slippery because it is polysemic in nature, capable of holding multiple dimensions and taking on different specificities depending on the country (or continent), timeframe or energy source to which it is applied. This 'slipperiness' poses analytical, prediction and policy difficulties but if explicitly recognised through definitional clarity, new levels of understanding will enrich the policy debate to deal with obstacles impacting on the constantly evolving nature of energy security.

  20. Exploring propositions about perceptions of energy security: An international survey

    International Nuclear Information System (INIS)

    Sovacool, Benjamin K.; Valentine, Scott Victor; Jain Bambawale, Malavika; Brown, Marilyn A.; Fátima Cardoso, Terezinha de; Nurbek, Sayasat; Suleimenova, Gulimzhan; Li Jinke; Xu Yang; Jain, Anil; Alhajji, A.F.; Zubiri, Andrew

    2012-01-01

    This study investigates how energy users from government, industry, civil society, and academia perceive of energy security challenges. It also analyzes how demographic characteristics influence such perceptions, and how geography, economic structure, modes of domestic energy production, and culture shape energy security priorities. Its primary source of data is a four-part survey distributed in seven languages (English, Mandarin, Portuguese, Russian, Arabic, German, and Japanese) to 2167 respondents in Brazil, China, Germany, India, Kazakhstan, Japan, Papua New Guinea, Saudi Arabia, Singapore, and the United States. These countries were selected because they represent a mix of urban and rural populations, developed and developing economies, import- and export-oriented energy trading flows, communist and capitalist societies, liberalized and state-owned energy markets, and small and large geographic sizes. The survey results are used to test four propositions about energy security related to the education, age, occupation, and gender of respondents, as well five propositions about national energy priorities and the interconnected attributes of security of supply, energy efficiency, energy research and development, energy trade, diversification and decentralization, affordability, environmental quality, climate change, and energy governance.

  1. The International Atomic Energy Agency Nuclear Security Education Strategies

    International Nuclear Information System (INIS)

    BRAUNEGGER-GUELICH, A.; RUKHLO, V.; GREGORIC, M.; COLGAN, P.

    2011-01-01

    The threat of nuclear terrorism has not diminished. In response to the concerns of States, an international nuclear security framework has emerged through the establishment of a number of legally binding and non-binding international instruments which obligates or commits States to carry out a number of actions to protect against nuclear terrorism. In this context, the need for human resource development programmes in nuclear security was underscored at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors' Meetings. In the pursuit of this need, the IAEA provides a comprehensive nuclear security training programme to States on a regular basis, and has developed a concept that seeks to effectively pass ownership of nuclear security knowledge and skills to States through the establishment of a Nuclear Security Support Centre. In addition, the IAEA has developed a technical guidance titled IAEA Nuclear Security Series No. 12 - Educational Programme in Nuclear Security that consists of a model of a Master of Science (M.Sc.) and assists educational institutions to provide nuclear security education. The article sets out IAEA efforts in the area of nuclear security training and education, including the assistance to States for establishing a Nuclear Security Support Centre. It underlines the objective and content of the IAEA Nuclear Security Series No. 12, discusses different concepts on how to establish nuclear security at universities and, emphasizes on the IAEA efforts to assist educational and research institutions, and other stake holders to enhance global nuclear security by developing, sharing and promoting excellence in nuclear security education. (author)

  2. Information security of remote-reading energy meters

    International Nuclear Information System (INIS)

    Jacobson, J.

    1994-01-01

    This report presents basic concepts within the field of IT security. The ITSEC security and the ITSEM methods given by the European Community are used as a base. The EC INFOSEC research programme has included the project 'PER DOMUM' which focuses on remote reading of energy meters. The project is a co-operation between TACS (U.K.), GPP (Germany), CESI (Italy) and ENEL (Italy). SP has during the spring and summer of 1994 participated in the concluding of the project. Threats, security functions and security mechanisms are given for remote reading of energy meters. All of the listed functions and mechanisms do not origin from the 'PER DOMUM' project, but are the experiences of SP. The security evaluation is explained in two ways. One description of the required by ITSEM is given. Another description is given of which deliverables are required to perform the evaluation

  3. Energy security in the post-Cold War era: Identifying future courses for crises

    Energy Technology Data Exchange (ETDEWEB)

    Freund, M.T.; Wise, J.A.; Ulibarri, C.A.; Shaw, B.R.; Seely, H.E.; Roop, J.M.

    1994-11-01

    This paper addresses US energy security in the post-Cold War era for a conference on energy security jointly sponsored by the Department of Energy and the National Defense University. It examines the evolving nature of energy security based on analysis of past crisis-inducing events and-discusses potentially important geopolitical, environmental, regulatory, and economic developments during the next twenty-five years. The paper steps beyond the traditional economic focus of energy security issues to examine the interplay between fundamental economic and technical drivers on the one hand, and political, environmental, and perceptual phenomena, on the other hand, that can combine to create crises where none were expected. The paper expands on the premise that the recent demise of the Soviet Union and other changing world conditions have created a new set of energy dynamics, and that it is imperative that the United States revise its energy security perspective accordingly. It proceeds by reviewing key factors that comprise the concepts of ``energy security`` and ``energy crisis`` and how they may fit into the new world energy security equation. The study also presents a series of crisis scenarios that could develop during the next twenty-five years, paying particular attention to mechanisms and linked crisis causes and responses. It concludes with a discussion of factors that may serve to warn analysts and decision makers of impending future crises conditions. The crisis scenarios contained in this report should be viewed only as a representative sample of the types of situations that could occur. They serve to illustrate the variety of factors that can coalesce to produce a ``crisis.``

  4. Conceptual Framework of Energy Security Assessment in Korea

    International Nuclear Information System (INIS)

    Moon, Kee Hwan; Chung, Whan Sam; Kim, Seung Su

    2016-01-01

    Korea's electric power is an essential source of energy, supplying 21.4% of the energy required by the manufacturing industry, 43.4% of that required for commerce, and 59.5% of that required by the public sector in 2014. Korea relies heavily on imports of energy sources because of its lack of natural resources. Its land area is limited, making it difficult to utilize renewable energy. Moreover, it is difficult to trade electricity through grid connections with neighbouring countries. Considering the key role of electric power in Korea and the circumstances of its power generation industry, we must understand the contribution of each fuel used in power plants to energy sustainability. This study derives the conceptual framework to quantify energy security levels for nuclear power generation in Korea and employ them in evaluating the national energy security. And sample calculation of nuclear energy security indicators is performed. The implications drawn from the evaluation are as follows. Nuclear power demonstrates dominance in the dimensions of economy and technology as the related technologies have entered into the stage of maturity. Without constant technological innovation, however, sustainability of nuclear sources will not be guaranteed. Nuclear has in the middle in terms of SS, but their high volatility impels Korea to pursue the diversification of energy suppliers. The energy security indicators suggested in this study are anticipated to contribute to establishing an energy security policy based on a comprehensive understanding of the energy security status in Korea. In the future, it will be necessary to establish specific scenarios for a decrease of regional conflicts and a post-2020 climate change conventions and conduct realistic and dynamic analyses

  5. Conceptual Framework of Energy Security Assessment in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Moon, Kee Hwan; Chung, Whan Sam; Kim, Seung Su [KAERI, Daejeon (Korea, Republic of)

    2016-05-15

    Korea's electric power is an essential source of energy, supplying 21.4% of the energy required by the manufacturing industry, 43.4% of that required for commerce, and 59.5% of that required by the public sector in 2014. Korea relies heavily on imports of energy sources because of its lack of natural resources. Its land area is limited, making it difficult to utilize renewable energy. Moreover, it is difficult to trade electricity through grid connections with neighbouring countries. Considering the key role of electric power in Korea and the circumstances of its power generation industry, we must understand the contribution of each fuel used in power plants to energy sustainability. This study derives the conceptual framework to quantify energy security levels for nuclear power generation in Korea and employ them in evaluating the national energy security. And sample calculation of nuclear energy security indicators is performed. The implications drawn from the evaluation are as follows. Nuclear power demonstrates dominance in the dimensions of economy and technology as the related technologies have entered into the stage of maturity. Without constant technological innovation, however, sustainability of nuclear sources will not be guaranteed. Nuclear has in the middle in terms of SS, but their high volatility impels Korea to pursue the diversification of energy suppliers. The energy security indicators suggested in this study are anticipated to contribute to establishing an energy security policy based on a comprehensive understanding of the energy security status in Korea. In the future, it will be necessary to establish specific scenarios for a decrease of regional conflicts and a post-2020 climate change conventions and conduct realistic and dynamic analyses.

  6. Measuring the energy security implications of fossil fuel resource concentration

    International Nuclear Information System (INIS)

    Lefevre, Nicolas

    2010-01-01

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies-France and the United Kingdom-looking at the evolution of both indexes to 2030.

  7. Measuring the energy security implications of fossil fuel resource concentration

    Energy Technology Data Exchange (ETDEWEB)

    Lefevre, Nicolas [Woodrow Wilson School of Public and International Affairs, Princeton University, New Jersey (United States)

    2010-04-15

    Economic assessments of the welfare effects of energy insecurity are typically uncertain and fail to provide clear guidance to policy makers. As a result, governments have had little analytical support to complement expert judgment in the assessment of energy security. This is likely to be inadequate when considering multiple policy goals, and in particular the intersections between energy security and climate change mitigation policies. This paper presents an alternative approach which focuses on gauging the causes of energy insecurity as a way to assist policy making. The paper focuses on the energy security implications of fossil fuel resource concentration and distinguishes between the price and physical availability components of energy insecurity. It defines two separate indexes: the energy security price index (ESPI), based on the measure of market concentration in competitive fossil fuel markets, and the energy security physical availability index (ESPAI), based on the measure of supply flexibility in regulated markets. The paper illustrates the application of ESPI and ESPAI with two case studies - France and the United Kingdom - looking at the evolution of both indexes to 2030. (author)

  8. On some Issues of the Energy Policy and Sustainable Development

    International Nuclear Information System (INIS)

    Gotsiridze, A.

    2003-01-01

    Some aspects of the energy resources world commerce problems are considered in the article. East-West and North-South energy transport corridors functioning significance and the importance of energy resources transit legal regime creation in the limits of the Energy Charter Theaty are mentioned. World Community great interest to the energy security strengthening and energy sustainable development problems is underscored in the work. (authors)

  9. Cyber-Security Issues in Healthcare Information Technology.

    Science.gov (United States)

    Langer, Steve G

    2017-02-01

    In 1999-2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.

  10. Post 9-11 Security Issues for Non-Power Reactor Facilities

    International Nuclear Information System (INIS)

    Zaffuts, P. J.

    2003-01-01

    This paper addresses the legal and practical issues arising out of the design and implementation of a security-enhancement program for non power reactor nuclear facilities. The security enhancements discussed are derived from the commercial nuclear power industry's approach to security. The nuclear power industry's long and successful experience with protecting highly sensitive assets provides a wealth of information and lessons that should be examined by other industries contemplating security improvements, including, but not limited to facilities using or disposing of nuclear materials. This paper describes the nuclear industry's approach to security, the advantages and disadvantages of its constituent elements, and the legal issues that facilities will need to address when adopting some or all of these elements in the absence of statutory or regulatory requirements to do so

  11. Post 9-11 Security Issues for Non-Power Reactor Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Zaffuts, P. J.

    2003-02-25

    This paper addresses the legal and practical issues arising out of the design and implementation of a security-enhancement program for non power reactor nuclear facilities. The security enhancements discussed are derived from the commercial nuclear power industry's approach to security. The nuclear power industry's long and successful experience with protecting highly sensitive assets provides a wealth of information and lessons that should be examined by other industries contemplating security improvements, including, but not limited to facilities using or disposing of nuclear materials. This paper describes the nuclear industry's approach to security, the advantages and disadvantages of its constituent elements, and the legal issues that facilities will need to address when adopting some or all of these elements in the absence of statutory or regulatory requirements to do so.

  12. SOME LEGAL ASPECTS OF ENERGY SECURITY IN THE RELATIONS BETWEEN EU AND RUSSIA

    Directory of Open Access Journals (Sweden)

    Ovidiu-Horia Maican

    2009-12-01

    Full Text Available The need for a sustainable, secure and competitive energy supply has long been recognized within the Community, and has been addressed on numerous occasions, notably in the Green Papers elaborated by the Commission in 2000 and 2006. Recent supply crises and rapidly escalating fuel prices have focused the minds of leaders across the European Union, as well as those of businesses and individual energy consumers. Energy policy transcends a range of different policy areas, including competition, transport, environment and energy itself. Decisions relating to energy policy in Europe are primarily within the remit of individual Member State governments, with the European Commission’s powers limited to two specific areas (creation of the European single market and matters relating to nuclear safety and security under the EURATOM Treaty. The extent of the transfer of powers towards Europe is clearly a critical decision point and in practice a sensitive balance is likely to be required between those matters for which the Commission should have responsibility and those where Member State governments retain sole authority. European officials are putting into evidence their belief that Europe’s energy predicament is acute and mention energy security as a priority issue for the Common Foreign and Security Policy. Policy commitments say that energy strategy must move beyond the internal sphere and become systematically a part of EU external relations. The Commission’s 2006 Energy Green Paper promised “a better integration of energy objectives into broader relations with third countries”.

  13. Security plan for the energy sector

    International Nuclear Information System (INIS)

    Tapias Stahelin, Fernando

    1998-01-01

    The explosion of pipelines is so alone the tip of the iceberg of a violent situation that, for many, sinks the economic and social panorama of Colombia in an uncertainty difficult to clarify. Although it is certain that we have the elements to build a country with a floating economy and in development, it is also certain that our own war doesn't allow leaving but there. At the moment 3,2% of the Gross Domestic Product - GDP of the country is dedicated to the military expense, it calculates alarming if one keeps in mind that the average of Latin America is of 1.7% and the world average has lowered ostensibly in the last 10 years, passing from 5.1% to so single 2.7 investments. Of continuing this way, in the 2004 the projected inversion of the GDP of Colombia for military expense will overcome 5%. A conscientious analysis reveals the data of this situation that it affects all the contour of the national life. When we speak of violence in the country we should refer to all those factors and actors that destabilize the society and the legally established political institutions, creating it keels and fear in the whole population. In a same way, it becomes necessary to speak of the security and the national defense that should be guaranteed by the government instances. The security of a state of tranquility and well being; the defense, is an activity situation so that in the case that the security loses temper, it can return to the situation of initial security

  14. CHINA’S STRATEGY OF ENERGY SECURITY IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Xing Li

    2013-01-01

    Full Text Available U.S.recently launched strategy of rebalancing to Asia worsens the atmosphere forChina’s energy security and increases the risks for energy transportation from Africa and theMiddle East. The diversification of energy sources is a reasonable strategic choice, so the importance of the Eurasian continent forChinaincreases. Central Asia does not play anymore a supporting role in the agenda ofChina’s energy security strategy. It is rather becoming a region of major strategic importance.

  15. Water-Energy-Food Nexus: Compelling Issues for Geophysical Research

    Science.gov (United States)

    Akhbari, M.; Grigg, N. S.; Waskom, R.

    2014-12-01

    The joint security of water, food, and energy systems is an urgent issue everywhere, and strong drivers of development and land use change, exacerbated by climate change, require new knowledge to achieve integrated solution using a nexus-based approach to assess inter-dependencies. Effective research-based decision support tools are essential to identify the major issues and interconnections to help in implementation of the nexus approach. The major needs are models and data to clearly and unambiguously present decision scenarios to local cooperative groups of farmers, electric energy generators and water officials for joint decisions. These can be developed by integrated models to link hydrology, land use, energy use, cropping simulation, and optimization with economic objectives and socio-physical constraints. The first step in modeling is to have a good conceptual model and then to get data. As the linking of models increases uncertainties, each one should be supplied with adequate data at suitable spatial and temporal resolutions. Most models are supplied with data by geophysical scientists, such as hydrologists, geologists, atmospheric scientists, soil scientists, and climatologists, among others. Outcomes of a recently-completed project to study the water-energy-food nexus will be explained to illuminate the model and data needs to inform future management actions across the nexus. The project included a workshop of experts from government, business, academia, and the non-profit sector who met to define and explain nexus interactions and needs. An example of the findings is that data inconsistencies among sectors create barriers to integrated planning. A nexus-based systems model is needed to outline sectoral inter-dependencies and identify data demands and gaps. Geophysical scientists can help to create this model and take leadership on designing data systems to facilitate sharing and enable integrated management.

  16. Inter-organizational future proof EHR systems. A review of the security and privacy related issues.

    Science.gov (United States)

    van der Linden, Helma; Kalra, Dipak; Hasman, Arie; Talmon, Jan

    2009-03-01

    Identification and analysis of privacy and security related issues that occur when health information is exchanged between health care organizations. Based on a generic scenario questions were formulated to reveal the occurring issues. Possible answers were verified in literature. Ensuring secure health information exchange across organizations requires a standardization of security measures that goes beyond organizational boundaries, such as global definitions of professional roles, global standards for patient consent and semantic interoperable audit logs. As to be able to fully address the privacy and security issues in interoperable EHRs and the long-life virtual EHR it is necessary to realize a paradigm shift from storing all incoming information in a local system to retrieving information from external systems whenever that information is deemed necessary for the care of the patient.

  17. Three blind men and elephant: The Case of energy indices to measure energy security and sustainability

    OpenAIRE

    Kapil Narula; B. Sudhakara Reddy

    2014-01-01

    An 'Energy Index', which is aggregated from energy indicators is a rich source of information and is helpful in providing an assessment of a country's performance. This has, however, resulted in mushrooming of a plethora of indices, which claim to quantify the performance of a country in attaining the goal of energy security and energy sustainability. The paper attempts to compare three different indices, viz., 'Energy Sustainability Index', 'International Index of Energy Security Risk', 'Ene...

  18. Fuelling Insecurity? Sino-Myanmar Energy Cooperation and Human Security in Myanmar

    Science.gov (United States)

    Botel, Gabriel

    This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China's industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world. Within this debate, a key issue has been China's engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international security. However, traditional security analyses rely on state-centric concepts of security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for human security are overlooked; this is in part because human security remains poorly defined and also because there are questions regarding its utility. However, human security is a critical tool in delineating between state, corporate and 'civilian' interests, and how these cleavages shape the security environment and potential for instability in the region. This thesis takes a closer look at some of the entrenched and changing security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive

  19. The future of energy security in the 21st Century

    Science.gov (United States)

    Gupta, Rajan

    2006-10-01

    Energy is essential for modern life and is a critical resource that we take for granted. Economies and security of nations depend on reliable and cost-effective access. As the world transitions from conventional oil and natural gas to nuclear, renewables, and unconventional sources we are increasingly confronted by many unsettling questions. Will there be enough cheap oil and gas for preserve the standard of living in the developed world and allow the industrializing world to develop? Will renewable sources provide a significant fraction of our energy needs in the near future? Is global warming already happening as a result of our consumption of fossil fuels? If there is a resource crunch before new sources come on line, will there be conflict or global cooperation? This talk will attempt to answer these questions by examining the global oil and gas resources, geopolitics, and key science and technology issues that need to be addressed by the global community with cooperation and a sense of urgency.

  20. Energy security in South America and Southern Africa: synthesis report

    International Nuclear Information System (INIS)

    Kiratu, Sheila

    2011-01-01

    In developing countries, the ability to provide adequate and reliable energy supplies is a key to sustainable economic development. The aim of this report is to study the energy supply security in both Southern Africa and South America and how these regions can participate in the international effort to combat climate change. This report showed that South Africa's energy sector mostly relies on carbon intensive coal while Brazil is mainly supplied by hydroelectricity. It was found that in both countries energy needs will increase significantly due to rising demand both internally and at a regional scale. However it was also shown that both Southern Africa and South America have important hydro, solar and wind renewable resources which could enhance their electricity security while minimizing their environmental impacts. This study demonstrated that Southern Africa and South America can enhance their electricity security through the use of renewable energies but that technology and financing is needed to develop the sector.

  1. Energy supply security in Europe: principles and measures

    International Nuclear Information System (INIS)

    Keppler, J.H.

    2007-01-01

    After having recalled a dozen of reasons for some worries about energy supply security in Europe during the past months (oil price increase, intentional interruption of gas and oil deliveries by Russia respectively to Ukraine and Belarus, creation of a new CO 2 trading scheme, tensions on the European electricity markets, and so on), the author distinguishes and discusses those which are actually a threat to energy supply and those which are not. Then, he proposes a classification of these threats in relationship with the reasons for delivery interruption, production capacity limitation, or price increase. These reasons can be political situations and decisions, technical problems, commercial reasons. Then, the author examines what European policy makers can do to manage these risks and ensure energy supply security. This needs economic as well as political responses, coherence between domestic energy policies and energy supply security, and an efficient foreign policy based on a multilateral approach

  2. A generic framework for the description and analysis of energy security in an energy system

    International Nuclear Information System (INIS)

    Hughes, Larry

    2012-01-01

    While many energy security indicators and models have been developed for specific jurisdictions or types of energy, few can be considered sufficiently generic to be applicable to any energy system. This paper presents a framework that attempts to meet this objective by combining the International Energy Agency's definition of energy security with structured systems analysis techniques to create three energy security indicators and a process-flow energy systems model. The framework is applicable to those energy systems which can be described in terms of processes converting or transporting flows of energy to meet the energy–demand flows from downstream processes. Each process affects the environment and is subject to jurisdictional policies. The framework can be employed to capture the evolution of energy security in an energy system by analyzing the results of indicator-specific metrics applied to the energy, demand, and environment flows associated with the system's constituent processes. Energy security policies are treated as flows to processes and classified into one of three actions affecting the process's energy demand or the process or its energy input, or both; the outcome is determined by monitoring changes to the indicators. The paper includes a detailed example of an application of the framework. - Highlights: ► The IEA's definition of energy security is parsed into three energy security indicators: availability, affordability, and acceptability. ► Data flow diagrams and other systems analysis tools can represent an energy system and its processes, flows, and chains. ► Indicator-specific metrics applied to a process's flow determine the state of energy security in an energy system, an energy chain, or process. ► Energy policy is considered as a flow and policy outcomes are obtained by measuring flows with indicator-specific metrics. ► The framework is applicable to most jurisdictions and energy types.

  3. Ukraine stalls on START I vote; presses US on aid, security issues

    International Nuclear Information System (INIS)

    Lockwood, D.

    1993-01-01

    In early January, a Ukrainian delegation came to Washington to discuss issues related to Ukrainian ratification of START I and accession to the nuclear Non-Proliferation Treaty (NPT). The issues discussed at the meeting (US security assurances and economic aid), which were not resolved, have serious implications for START I, the NPT, and the flow-on START II agreement

  4. Nuclear Option for a Secure and Sustainable Energy Supply

    International Nuclear Information System (INIS)

    Kolundzija, V.; Mesarovic, M.

    2002-01-01

    Present energy policy is required to ensure a balance between security of supply, competitiveness and environmental requirements. Recent changes involved by deregulation and liberalization of electricity and natural gas markets even strengthen such a policy. However, dependency on external energy sources carries risks that have to be managed since a large proportion of both oil and gas reserves are found in politically unstable regions. Electrical energy is a fundamental prerequisite for a civilized life and an essential commodity, but it cannot be stored and this restricts the extent to which there can be a real free market for electricity. Therefore, relying on imports of electricity to a large extent may prove unsecure because this requires a true, completely open market in which the opportunities for cross-border trade are effective and balanced and transport connections are adequate. This is equally applied to the countries in the South-Eastern Europe, despite very good prospects for development of the regional electricity market there. In this regard, the use of nuclear energy has not any risk associated with external dependency because there are abundant quantities of uranium available world-wide from many diverse sources. The inherent mitigation of supply risk associated with the use of uranium should act as an incentive to the further use of nuclear energy. In addition, already very large stocks of fuel assemblies and fuel-making materials available, especially when these are measured in terms of power generating capacity per year at current production rates. It is, therefore, very important for any country to recognize such strategic aspect of nuclear energy when addressing the issue of security of power supply. Nuclear option is in a unique position to restore its original role of the main source of energy with an increased attention paid to the security of electricity supply as well as regulatory changes affecting fossil fuels, particularly with due

  5. To the Problem of Energy Security and Energy Objects Control Optimization

    International Nuclear Information System (INIS)

    Gotsiridze, A.; Abzianidze, D.

    2004-01-01

    One of the method of studying energy security of energy objects is evaluation of character and range of main safety risk influence with the help of indicator analysis. In the work is also reviewed an example of applying modern management theory to the group of tasks, connected with the optimal management of energy objects, which is the basis of their secure functioning. (authors)

  6. Inhibiting and driving forces for the digitalization of security systems: security officers’ view on the issue

    OpenAIRE

    Lahtinen, Markus

    2007-01-01

    This memo reports on factors that drive and inhibit the digitalization of security systems. The reported factors are as follows: Technology-push factors • Need to lower costs on the end-user side, i.e. replacing labour with technology • Perceived convenience and ease-of-use of digital systems • Digital products can be connected to the current enterprise network; enabling an expanding set of security features • Firms holding the IP-capability (IP=Internet Protocol) and not h...

  7. Security of Energy Supply - Indicators for Measuring Vulnerability and Risk

    International Nuclear Information System (INIS)

    Heinrich, C.

    2010-01-01

    In an era of increasing globalization, secure and affordable energy supplies are an essential requirement for economies to work, much less develop and grow in the long term. The present study, Energy security of supply - indicators for measuring vulnerability and risk, develops a broad methodical assessment concept to raise awareness among policy makers and the public regarding the vulnerability of energy supplies to potential energy crises. It explores the different aspects of vulnerability, from the primary energy level to energy infrastructure (storage, networks, power plant parks) to the efficiency and cost of energy consumption for end users. The individual characteristics of the formal concept were quantitatively evaluated for several OECD regions (Germany, UK, Sweden, Poland, Italy, France and the US) using a comprehensive empirical database and reduced to a single indicator for assessing energy supply vulnerability. Part of the database comprises historical observations for the period between 1978 and 2007.(author).

  8. Synergies in the Asian energy system: Climate change, energy security, energy access and air pollution

    International Nuclear Information System (INIS)

    Vliet, Oscar van; Krey, Volker; McCollum, David; Pachauri, Shonali; Nagai, Yu; Rao, Shilpa; Riahi, Keywan

    2012-01-01

    We use the MESSAGE model to examine multiple dimensions of sustainable development for three Asian regions in a set of scenarios developed for the Asian Modelling Exercise. Using climate change mitigation as a starting point for the analysis, we focus on the interaction of climate and energy with technology choice, energy security, energy access, and air pollution, which often have higher policy priority than climate change. Stringent climate policies drive the future energy supply in Asia from being dominated by coal and oil to a more diversified system based mostly on natural gas, coal with CCS, nuclear and renewable energy. The increase in diversity helps to improve the energy security of individual countries and regions. Combining air pollution control policies and universal energy access policies with climate policy can further help to reduce both outdoor and indoor air pollution related health impacts. Investments into the energy system must double by 2030 to achieve stringent climate goals, but are largely offset by lower costs for O and M and air pollution abatement. Strong focus on end-use efficiency also helps lowering overall total costs and allows for limiting or excluding supply side technologies from the mitigation portfolio. Costs of additional energy access policies and measures are a small fraction of total energy system costs. - Highlights: ► Half of added investments in energy offset by lower costs for O and M and air pollution. ► Costs for achieving universal energy access much smaller than energy system costs. ► Combined emissions and access policies further reduce air pollution impacts on health. ► Strong focus on end-use efficiency allows for more flexibility on energy sources. ► Stringent climate policy can improve energy security of Asian regions.

  9. Marketing and security issues in e-business

    Directory of Open Access Journals (Sweden)

    Mandarić Marija

    2007-01-01

    Full Text Available Unprecedant development of the IT influenced the development of the electronic business and internet. Introducing the electronic business into companies worldwide and accepting the new global media - internet, have enabled the development of the new area of the marketing practice - electronic marketing. Electronic marketing has kept the basics of the traditional marketing, but it has also adapted to the new standards in the business and, together with internet, it has opened up remarkable opportunities for the small and big companies, through the global accessibility of their offers. Electronic business is become the imperative of the modern business under the conditions of today's economic and political globalization, which dictates the rules of conduct among the world market players. The usage of internet has enabled direct, interactive communication, but has also started questions regarding security of that communication and protection of company's or individual's data. It is certain that the area of the electronic business and electronic trade, has unstoppable and unpredictable directions of development and so many potential users, while globalization has unique goal, but many interested masters. How the world will look like in the future, what countries will fit in, and what countries will dictate the tempo of the further development, remains to be seen.

  10. Event-related stresses in energy systems and their effects on energy security

    International Nuclear Information System (INIS)

    Hughes, Larry; Ranjan, Ashish

    2013-01-01

    Energy systems change over time as events, such as grid failures, new energy sources, and extreme weather conditions, occur, often affecting the system's energy security. Understanding events, their causes, and how they are handled, can help a jurisdiction and its energy stakeholders develop better, evidence-based energy policy. This paper employs a definition of stress in combination with systems analysis to specify methods for explaining the states through which an energy process, chain, or system passes in response to an event and how this response results in energy security improving, deteriorating, or being maintained. The definition uses three dimensions-availability, affordability, and acceptability-derived from the International Energy Agency's definition of energy security to show when and how a system's energy security will change. Examples are used to illustrate the application of the methods. - Highlights: • A generic set of methods and a common terminology to formalize the ongoing energy security discourse is proposed. • The methods define, measure and explain how energy security can change when events cause stresses in an energy system. • Events are classified in terms of three dimensions derived from the IEA's definition of energy security. • The application of the method is illustrated with detailed examples

  11. Department of Energy security program needs effective information systems

    International Nuclear Information System (INIS)

    1991-10-01

    Although security is an important, nearly billion-dollar-a-year function in the Department of Energy (DOE), key information systems that hold important data about security weaknesses and incidents have limited analytical capabilities and contain unreliable information. The resultant difficulty in identifying patterns and trends reduces managers' ability to ensure the effectiveness of the security program. Resources are also wasted because DOE has deployed incompatible systems that are unable to electronically share or transfer data, often forcing employees to manually re-enter data that are already stored in computers elsewhere. Finally, continuing data problems with other important security information systems, such as those used to track security clearances and classified documents, indicate that information system deficiencies are extensive. A major reason for these problems is that DOE has not done a comprehensive, strategic assessment of its information and information technology needs of the security program. DOE's efforts are fragmented because it has not assigned to any organization the leadership responsibility to determine security information needs and to plan and manage security information resources Department-wide. This paper reports that a number of changes are needed to correct these problems and take advantage of information technology to help strengthen the security program

  12. Comparative Discourse Analysis of the Security-Privacy Dilemma: Salience of Security Issues in Printed Media

    Czech Academy of Sciences Publication Activity Database

    Guasti, Petra; Mansfeldová, Zdenka

    2015-01-01

    Roč. 30, č. 10 (2015), s. 127-156 ISSN 0254-0223 EU Projects: European Commission(XE) 285223 - SECONOMICS Institutional support: RVO:68378025 Keywords : security * media * stuxnet Subject RIV: AO - Sociology, Demography Impact factor: 0.444, year: 2015

  13. Energy supply security and geopolitics: A European perspective

    International Nuclear Information System (INIS)

    Correlje, Aad; Linde, Coby van der

    2006-01-01

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets. Regions and Empires involves a world broken up in rival political and economic blocks, competing for resources and markets via political, economic and military power. It is shown that these storylines have a significant impact on the development of the energy market, on the way in which energy supply may be secured and on the effect and applicability of the several types of instruments available. The current EU is geared towards enlargement and a deepening of economic integration, based on the tenets of the post-1945 multilateral world system. The present world tends towards Regions and Empires and suggests that the EU may have to reorient its energy security policy. Energy policy must become an integral part of EU external trade and foreign relations and security policy. The EU should develop its own strategy, actively investing in dialogues with producer countries in the Persian Gulf and Africa and with Russia. Sustainable prosperity and governance in these regions will support EU energy security

  14. Linking consumer energy efficiency with security of supply

    International Nuclear Information System (INIS)

    Rutherford, J.P.; Scharpf, E.W.; Carrington, C.G.

    2007-01-01

    Most modern energy policies seek to achieve systematic ongoing incremental increases in consumer energy efficiency, since this contributes to improved security of supply, favourable environmental outcomes and increased economic efficiency. Yet realised levels of efficiency are typically well below the most cost-effective equilibrium due to variety of behavioural and organisational barriers, which are often linked to information constraints. In addition efficient users are normally unrewarded for collective benefits to system security and to the environment, thus reducing the incentives for energy consumers to invest in efficiency improvements. This paper examines the dichotomies and symmetries between supply- and demand-side solutions to energy security concerns and reviews opportunities to overcome barriers to improved consumer efficiency. A security market is identified as a mechanism to promote both demand- and supply-side investments that support electricity system security. Such a market would assist in setting the optimal quantity of reserves while achieving an efficient balance between supply- and demand-side initiatives. It would also help to smooth overall investment throughout the energy system by encouraging incremental approaches, such as distributed generation and demand-side alternatives where they provide competitive value. Although the discussion is applicable to energy systems in general, it focuses primarily on electricity in New Zealand

  15. Energy security of supply under EU climate policies

    International Nuclear Information System (INIS)

    Groenenberg, H.; Wetzelaer, B.J.H.W.

    2006-12-01

    The implications of various climate policies for the security of supply in the EU-25 were investigated. The security of supply was quantified using the Supply/Demand (S/D) Index. This index aggregates quantitative information on a country's energy system into one single figure. It takes a value between 0 and 100, with higher values indicating a more secure energy system. The S/D Index was calculated for the year 2020 based on the information in a series of policy scenarios, including a baseline (S/D Index 50.7), an energy efficiency scenario (53.8), two renewable energy scenarios (52.6 and 53.3) and two scenarios with combined policies (55.9 and 55.6).The S/D Index proved a useful indicator for assessing the implications of climate policies for the security of supply. As climate policies become more stringent, CO2 index fall, and the S/D index increases. The magnitude of the changes in the two indices is not always similar however. Major falls in CO2 indices in the order of 20% for two scenarios with combined energy efficiency and renewable energy polices lead to less noteworthy improvements in the associated S/D indices. Nevertheless, this combination of policies leads to the greatest improvements in the security of supply

  16. Nuclear power. A cornerstone of energy security

    International Nuclear Information System (INIS)

    Andrews, H.R.; Harvey, M.

    1985-09-01

    Energy options for Canada are examined. Increasing difficulties with oil and gas supplies will induce a growth in electricity demand beyond that presently projected. Nuclear power is the only option that can supply as much energy as needed for as long as needed at predictable costs and with minimal environmental effects

  17. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues.

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas; Friedrich, Christoph M

    2017-10-18

    Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps used secure connections only for selected tasks

  18. Client-Focused Security Assessment of mHealth Apps and Recommended Practices to Prevent or Mitigate Transport Security Issues

    Science.gov (United States)

    Müthing, Jannis; Jäschke, Thomas

    2017-01-01

    Background Mobile health (mHealth) apps show a growing importance for patients and health care professionals. Apps in this category are diverse. Some display important information (ie, drug interactions), whereas others help patients to keep track of their health. However, insufficient transport security can lead to confidentiality issues for patients and medical professionals, as well as safety issues regarding data integrity. mHealth apps should therefore deploy intensified vigilance to protect their data and integrity. This paper analyzes the state of security in mHealth apps. Objective The objectives of this study were as follows: (1) identification of relevant transport issues in mHealth apps, (2) development of a platform for test purposes, and (3) recommendation of practices to mitigate them. Methods Security characteristics relevant to the transport security of mHealth apps were assessed, presented, and discussed. These characteristics were used in the development of a prototypical platform facilitating streamlined tests of apps. For the tests, six lists of the 10 most downloaded free apps from three countries and two stores were selected. As some apps were part of these top 10 lists in more than one country, 53 unique apps were tested. Results Out of the 53 apps tested from three European App Stores for Android and iOS, 21/53 (40%) showed critical results. All 21 apps failed to guarantee the integrity of data displayed. A total of 18 apps leaked private data or were observable in a way that compromised confidentiality between apps and their servers; 17 apps used unprotected connections; and two apps failed to validate certificates correctly. None of the apps tested utilized certificate pinning. Many apps employed analytics or ad providers, undermining user privacy. Conclusions The tests show that many mHealth apps do not apply sufficient transport security measures. The most common security issue was the use of any kind of unprotected connection. Some apps

  19. Improving energy decisions towards better scientific policy advice for a safe and secure future energy system

    CERN Document Server

    Droste-Franke, Bert; Kaiser, M; Schreurs, Miranda; Weber, Christoph; Ziesemer, Thomas

    2015-01-01

    Managing a successful transition of the current energy supply system to less carbon emitting options, ensuring a safe and secure supply during the whole process and in the long term, is one of the largest challenges of our time. Various approaches and first implementations show that it is not only technological issue, but also a matter of societal acceptance and acceptability, considering basic ethic values of the society. The main foci of the book are, thus, to develop an understanding about the specific challenges of the scientific policy advice in the area, to explore typical current approaches for the analysis of future energy systems and to develop criteria for the quality assessment and guidelines for the improvement of such studies. The book provides assistance to the interpretation of existing studies and guidelines for setting up and carrying out new analyses as well as for communicating and applying the results. Thereby, it aims to support the involved actors such as the respective scientific expert...

  20. Energy security in ASEAN: A quantitative approach for sustainable energy policy

    International Nuclear Information System (INIS)

    Tongsopit, Sopitsuda; Kittner, Noah; Chang, Youngho; Aksornkij, Apinya; Wangjiraniran, Weerin

    2016-01-01

    We investigate energy security of the Association of Southeast Asian Nations (ASEAN) under the 4-A’s framework. The ASEAN Economic Community (AEC) agreement launched in 2015 renewed a regional focus on energy security and sustainability. We employ an analytic framework to quantitatively assess progress in different categories including availability, acceptability, affordability, and applicability. Key metrics include the documentation of CO_2 emissions, energy access measures, and energy supply reserves from 2005–2010. We identify relevant energy indicators using high quality historical data from the IEA and World Bank. We find that ASEAN made little progress toward establishing energy security in the previous five-year planning period (2005–2010) as it regressed in most categories except applicability. Therefore, we suggest that increased development of renewable energy and energy efficiency technologies would move ASEAN in a positive direction toward achieving energy security and sustainable energy policy goals. - Highlights: • We investigate energy security in ASEAN across four dimensions. • Energy security in ASEAN has mostly regressed from 2005–2010. • Future cooperative agreements will help ASEAN improve energy security.

  1. Internet of Things in Marketing: Opportunities and Security Issues

    Science.gov (United States)

    Abashidze, Irakli; Dąbrowski, Marcin

    2016-12-01

    Internet of Things (IoT) affects different areas of human activities: everyday life of ordinary citizens, work style of marketing teams, factories and even entire cities. Large companies try to implement the technology in their marketing strategy that reshapes not only communication style and product promotion but consumers' expectations, perceptions and requirements towards companies. IoT is expected to become a huge network that will encompass not only smart devices but significantly influence humans' behavior, in this particular case - decision making style in different phases of purchase process. Therefore, the need for comprehensive scientific research is necessary. The issue needs to be reviewed from various points of view, such as opportunities, advantages, disadvantages, legal and technical considerations. The paper is an attempt to review different aspects of using Internet of Things for marketing purposes, identify some of the major problems and present possible ways of solution.

  2. INTERNET OF THINGS IN MARKETING: OPPORTUNITIES AND SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    Irakli ABASHIDZE

    2016-10-01

    Full Text Available Internet of Things (IoT affects different areas of human activities: everyday life of ordinary citizens, work style of mar-keting teams, factories and even entire cities. Large companies try to implement the technology in their marketing strat-egy that reshapes not only communication style and product promotion but consumers’ expectations, perceptions and requirements towards companies. IoT is expected to become a huge network that will encompass not only smart devic-es but significantly influence humans’ behavior, in this particular case – decision making style in different phases of pur-chase process. Therefore, the need for comprehensive scientific research is necessary. The issue needs to be reviewed from various points of view, such as opportunities, advantages, disadvantages, legal and technical considerations. The paper is an attempt to review different aspects of using Internet of Things for marketing purposes, identify some of the major problems and present possible ways of solution.

  3. Biomass for Energy and the Impacts on Food Security

    NARCIS (Netherlands)

    Nonhebel, Sanderine; Barbir, F; Ulgiati, S

    2010-01-01

    In climate policies in the developed world the use of biomass as an energy source plays an important role Indications exist that these policies are affecting global food security In this chapter we compare the global demands for food, feed and energy in the near future We distinguish between

  4. Enhancing energy security in Malayia: the challenges towards sustainable environment

    International Nuclear Information System (INIS)

    Sahid, E J M; Peng, L Y; Siang, C Ch

    2013-01-01

    Energy is known as one of the essential ingredients for economic development and security of energy supply is crucial in ensuring continuous economic development of a country. Malaysia's proven domestic oil reserves are estimated to last for another 25 years, while that of gas for another 39 years as of 2011. Despite the depleting indigenous energy resources, the primary energy demand has continued to grow robustly, at an annual rate of 6.3 percent per year from 1990 to 2010, while the primary energy import has grown 7.2% per year and the primary energy export has grown at a slower rate of 1.9% per year. This worrying trend is further compounded by the faster rate of primary oil import averaging 10.5% per year while the primary energy export has shrink at a rate of 1.4% per year. This paper has identified two main concerns namely overdependence on fossil fuel and increasing energy import dependency in creating a precarious position towards energy self-sufficiency. The study will analyse the energy security of the country and explore possible options and challenges in enhancing the energy supply security toward sustainable environment.

  5. The Dynamics of Good Governance in Promoting Energy Security: The Case of Bangladesh

    Directory of Open Access Journals (Sweden)

    Sakib B. Amin

    2017-07-01

    Full Text Available In the modern era, energy and its sustainability have emerged as one of the most important economic issues worldwide. It is widely believed that no country has managed to embrace development without ensuring a sustainable energy supply that could be accessed by a large portion of the population. Thus, this concept of energy sufficiency is of greater importance for the underdeveloped countries those, historically, had not been able to match their local energy demand. Apart from the inefficiencies and resource constraints associated with the energy sector, lack of good governance within an economy is believed to be a critical issue in aggravating energy crisis in those countries. However, following strategic impotence, political unwillingness and inefficient governance of the energy sector, the underdeveloped countries have failed to mitigate the energy deficits which in turn have hampered the development prospects in those countries. This paper highlights the potential roles good governance can play to promote energy security considering the case of Bangladesh, a developing country that is leaving no stones unturned in becoming a middle-income country by 2021. Besides, the role of good governance in complementing fuel diversification as a tool for ensuring energy security has also been put forward. Thus, the government of Bangladesh should reinstate good governance within the economy creating a favourable environment for investment in the energy sector which would enhance competition and mitigate inefficiencies in energy generation, transmission, and distribution.

  6. A SES (sustainable energy security) index for developing countries

    International Nuclear Information System (INIS)

    Narula, Kapil; Reddy, B. Sudhakara

    2016-01-01

    Measuring the performance of the energy system of a country is a prerequisite for framing good energy polices. However, the existing indices which claim to measure energy security have limited applicability for developing countries. Energy sustainability is also increasingly gaining importance and countries are keen to measure it to tailor their energy policies. Therefore, the concept of SES (sustainable energy security) has been proposed as the goal for a developing country. This paper presents an analytical framework for the assessment of SES of an energy system and the methodology for constructing an SES index. A hierarchical structure has been proposed and the energy system has been divided into 'supply', 'conversion & distribution' and 'demand' sub-systems. Each subsystem is further divided into its components which are evaluated for four dimensions of SES, Availability, Affordability, Efficiency and (Environmental) Acceptability using quantitative metrics. Energy indices are constructed using 'scores' (objective values), and 'weights' (subjective values representing tradeoffs) which are then aggregated, bottom-up, to obtain an overall SES Index for a country. The proposed SES Index is multidimensional, quantitative, modular, systemic and flexible. Such a SES Index can be used to design policy interventions for transitioning to a sustainable and a secure energy future. - Highlights: • A SES (sustainable energy security) index is proposed for developing countries. • A hierarchical structure includes the entire energy system from supply to end use. • The performance of all energy sources, energy carriers and sectors is assessed. • Availability, affordability, efficiency and acceptability dimensions are evaluated. • The SES index is multidimensional, quantitative, modular, systemic and flexible.

  7. The city and the energy security

    International Nuclear Information System (INIS)

    Roques, F.; Volkov, E.; Gantes, P.; Peek, P.; Vallar, Ch.; Telegina, E.; Fache, D.; Dreiski, P.; Pouffary, St.; Plate, N.; Kopsov, A.Y.; Benque, J.P.; Allegre, M.; Gsell, K.; Sanchez, M.; Hadhri, M.; Rouyer, J.L.; Rogeaux, B.; Clauwaert, A.; Garin, P.; Mernier, A.; Ruban, L.; Alario, E.; Allegre, M.; Asiani, F.; Banon, G.; Barelli, P.; Benque, J.P.; Bertoglio, S.; Blot, Y.; Bogolyubov, S.; Bonnaure, A.; Cabana, Y.; Casanova, L.; Chegodaev, A.; Cisse, S.; Clauwaert, A.; Colombier, A.M.; Collard, P.; Coma, O.; Combe, M.; Corbiere-Medecin, A.; Courdy, J.C.; Coursimault, E.; D'Addio, J.C.; Dastarac, H.; Daugreilh, J.P.; Surville, H. de; Doz, M.; Dreiski, P.; Efimouchkine, S.; Fache, D.; Ferrari, B.; Forkasiewicz, J.; Gantes, P.; Garin, P.; Gouirand, P.; Gsell, K.; Guibbolini, P.; Guillot, V.; Hadhri, M.; Ionescu, S.; Kostyuk, V.; Lecach, J.; Lorieux, L.; Luca, L.; Mangeard, Ph.; Matchabelli, V.; Mernier, A.; Murgeanu, R.; Nastase, A.; Nigoul, C.; D'Oleon, M.; Ollivier, J.; Oulianovsky, Y.; Pages, D.; Pataki, Z.; Peek, P.; Perdigon, M.F.; Piacenza, M.; Plate, N.; Poirier, J.; Pouffary, St.; Prez, Ch.; Prufer, Y.; Rogeaux, B.; Roques, F.; Rouyer, J.L.; Ruban, L.; Sanchez, M.; Sayamov, Y.; Semenescu, O.; Skorov, G.; Telegina, E.; Theiler, Ch.; Thomas, D.; Valais, M.; Vallar, Ch.; Volkov, E.; Von Scholz, H.; Waechter, M.; Zaboussov, V.; Zakharova, N.; Zoubkov, Y.

    2006-01-01

    The answers to the world energy crisis should not be limited to the management of geopolitical factors (Iran, Nigeria, Venezuela etc.) and to the control of the offer (inciting OPEC countries to optimize their production). They involve also a change of the demand and of the consumers' behaviour. The comments caused by the recent rise of oil prices have shown that this idea, considered as marginal by policy-makers, has started to make its way. The analyses limited to macro-economical units (states, international organization), always forget that cities are the main places of energy consumption. Recent events, like the repetitive saturation of power grids at the origin of spectacular blackouts (Moscow, California, Switzerland, Italy), have led the local authorities to take into consideration part of the problem. They effectively have at their disposition some important leviers which allow them to act both on the offer and on the behaviours. It is evident that in domains like transports, urban renovation or waste treatment, the local authorities have to play a significant role by implementing policies that maximize the energy efficiency and minimize the costs at the same time. The debates which took place during this forum were based on the experiences and realizations presented by experts of several big cities, in particular of Moscow, Madrid and Nuremberg. Some remarkable examples were presented, in particular in the domain of energy auditing, mastery of energy consumptions and production of alternative resources. The usual topics were also approached: energy overview, main trends of the present day energy policy of Russia, new opportunities of new technologies, geo-energy evolutions, Russia-European Union dialogue. (J.S.)

  8. The renewable energies: a topical issue

    International Nuclear Information System (INIS)

    2003-09-01

    This document analyzes the situation of the renewable energies in the french energy sector. The first part presents the part of the renewable energies in the energy production and consumption, their interest in the fight against the climatic change and in the employment creation. The second part details for each renewable energy source the government policy in favor their development and the legislative framework. The third part provides data on cost, CO 2 emissions, life cycle and employments to illustrate the analysis. The last part presents the government objectives of the renewable energies development for 2010. (A.L.B.)

  9. Renewable energy: the secure and sustainable option for Pakistan

    International Nuclear Information System (INIS)

    Asif, M.

    2005-01-01

    Pakistan is an energy deficient country that heavily relies on imports of fossil fuels to meet its energy requirements. Pakistan is facing severe energy challenges -indigenous oil and gas reserves are running out, energy demand is rapidly increasing, gap between demand and supply is growing, concerns about secure supply of energy are increasing and fuel cost is rising at an unprecedented rate. For sustainable development, it is crucial to ensure supply of adequate, consistent and secure supply of energy. Renewable energy resources that are sustainable are abundantly available in Pakistan in various forms such as hydel power, solar energy, wind power and biomass. To address the growing energy challenges, it has become inevitable for the country to diversify its energy market through harnessing renewable energy resources. It has been found that hydel power is one of the most significant renewable energy sources that can help Pakistan address the present as well as future energy challenges. It has been identified that solar water heating is another ready to adopt renewable energy technology that alone has the potential to meet as much as 12-15% of the country's entire energy requirements. (author)

  10. Implementation of Safety and Security Issues in the Transport of Radioactive Material in Argentina

    International Nuclear Information System (INIS)

    López Vietri, J.; Elechosa, C.; Gerez Miranda, C.; Menossi, S.; Rodríguez Roldán, M.S.; Fernández, A.

    2016-01-01

    This paper is intended to describe implementation of safety and security issues in the transport of radioactive material by the Nuclear Regulatory Authority (in Spanish Autoridad Regulatoria Nuclear, ARN), which is the Competent Authority of Argentina in Safety, Security and Safeguards of radioactive and nuclear material. There are depicted main regulatory activities dealing with the mentioned issues, and relevant milestones of national regulatory standards and guidance applied, that are based on requirements and guides from IAEA. Interfaces between Safety and Security sections are most of the times complementary but sometimes conflictive, therefore the resolution of such conflicts and goals achieved during their implementation are also commented; as well as future joint planned activities between both sections of ARN as a way to provide safety and security without compromising one or the other. (author)

  11. 17 CFR 239.23 - Form N-14, for the registration of securities issued in business combination transactions by...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form N-14, for the registration of securities issued in business combination transactions by investment companies and business... N-14, for the registration of securities issued in business combination transactions by investment...

  12. 17 CFR 230.488 - Effective date of registration statements relating to securities to be issued in certain business...

    Science.gov (United States)

    2010-04-01

    ... statements relating to securities to be issued in certain business combination transactions. 230.488 Section... REGULATIONS, SECURITIES ACT OF 1933 Investment Companies; Business Development Companies § 230.488 Effective date of registration statements relating to securities to be issued in certain business combination...

  13. NNSA Laboratory Directed Research and Development Program 2008 Symposium--Focus on Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    Kotta, P R; Sketchley, J A

    2008-08-20

    The Laboratory Directed Research and Development (LDRD) Program was authorized by Congress in 1991 to fund leading-edge research and development central to the national laboratories core missions. LDRD anticipates and engages in projects on the forefront of science and engineering at the Department of Energy (DOE) national laboratories, and has a long history of addressing pressing national security needs at the National Nuclear Security Administration (NNSA) laboratories. LDRD has been a scientific success story, where projects continue to win national recognition for excellence through prestigious awards, papers published and cited in peer-reviewed journals, mainstream media coverage, and patents granted. The LDRD Program is also a powerful means to attract and retain top researchers from around the world, to foster collaborations with other prominent scientific and technological institutions, and to leverage some of the world's most technologically advanced assets. This enables the LDRD Program to invest in high-risk and potentially high-payoff research that creates innovative technical solutions for some of our nation's most difficult challenges. Worldwide energy demand is growing at an alarming rate, as developing nations continue to expand their industrial and economic base on the back of limited global resources. The resulting international conflicts and environmental consequences pose serious challenges not only to this nation, but to the international community as well. The NNSA and its national security laboratories have been increasingly called upon to devote their scientific and technological capabilities to help address issues that are not limited solely to the historic nuclear weapons core mission, but are more expansive and encompass a spectrum of national security missions, including energy security. This year's symposium highlights some of the exciting areas of research in alternative fuels and technology, nuclear power, carbon

  14. 17 CFR 239.34 - Form F-4, for registration of securities of foreign private issuers issued in certain business...

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Form F-4, for registration of securities of foreign private issuers issued in certain business combination transactions. 239.34 Section 239.34 Commodity and Securities Exchanges SECURITIES AND EXCHANGE COMMISSION FORMS PRESCRIBED UNDER THE...

  15. Energy Issues and Problems in Developing Countries

    International Nuclear Information System (INIS)

    Mehdizadeh, Saeed

    1999-01-01

    In general, the developing countries due to changes in supply and demand for energy in the world, are facing several problems, such as: 1. Energy growth. 2.Energy consumption 3.Environmental protection. The objective of this paper is to study the problems caused by the increase in the energy consumption of the developing countries. also several guideline and solution schemes are recommended for these problems

  16. Assessment of energy security in China based on ecological network analysis: A perspective from the security of crude oil supply

    International Nuclear Information System (INIS)

    Lu, Weiwei; Su, Meirong; Zhang, Yan; Yang, Zhifeng; Chen, Bin; Liu, Gengyuan

    2014-01-01

    Energy security usually considers both the stability of energy supply and security of energy use and it is receiving increasing attention globally. Considering the strategic importance and sensitivity to international change of the crude oil supply, we decided to examine China’s energy security. An original network model was established based on ecological network analysis to holistically evaluate the security of the crude oil supply in China. Using this model, we found that the security of the crude oil supply in China generally increased from 2001 to 2010. The contribution of different compartments in the network to the overall energy security resembled a pyramid structure, with supply sources at the bottom, the consumption sector at the top, and the refining and transfer sectors in the middle. North and South America made the largest contribution to the security of the crude oil supply in China. We provide suggestions to improve the security of the crude oil supply in China based on our results and further scenario analysis. The original network model provides a new perspective for energy security assessment, which can be used as a baseline to develop other models and policy. - Highlights: • Ecological network analysis (ENA) is introduced into energy security assessment. • A model of crude oil supply network in China is established based on ENA. • A pyramid structure of the contributions of different compartments to energy security was found. • Suggestions for forming a stable network are given to improve energy security

  17. China's energy security: Oil and gas

    International Nuclear Information System (INIS)

    Wu, Kang

    2014-01-01

    China is currently the largest energy consuming country in the world. Until the early 1990s, China had long been a net energy exporter. The country became a net oil importer in 1993, the first time since the 1960s. For China, energy security first means oil supply security. China turned into a net natural gas importer in 2007 and then a net coal importer in 2009. In other words, China is now a net importer of all three types of fossil energy—oil, natural gas, and coal. In the context of rising oil imports and implementation of China's 12th Five-Year Program from 2011 to 2015, this paper examines China's energy security strategies with a focus on three leading elements, namely overseas oil investment, strategic petroleum reserves (SPR)and unconventional gas development. Our findings suggest that the Chinese government has promoted overseas investment strongly; its SPR program has been established though the progress for Phase II has been slower than expected and the government intends to boost the unconventional gas sector development. However, the challenges are enormous as well. As for future research, other elements for each dimension of energy security should be reviewed to reach a comprehensive conclusion about how well China has done and what steps are needed to move forward. - Highlights: • Identified China's key energy security strategies during the 12th Five-Year Program (FYP) and previous FYPs. • Provided a unique insight into China's rising oil imports. • Reviewed China's overseas oil and gas investment as a key energy security measure. • Assessed China's strategic petroleum reserves program and the future growth. • Provided a comprehensive coverage of China's unconventional gas development, including both coal-bed methane and shale gas

  18. Energy demand and supply, energy policies, and energy security in the Republic of Korea

    International Nuclear Information System (INIS)

    Kim, Hoseok; Shin, Eui-soon; Chung, Woo-jin

    2011-01-01

    The Republic of Korea (ROK) has enjoyed rapid economic growth and development over the last 30 years. Rapid increases in energy use-especially petroleum, natural gas, and electricity, and especially in the industrial and transport sectors-have fueled the ROK's economic growth, but with limited fossil fuel resources of its own, the result has been that the ROK is almost entirely dependent on energy imports. The article that follows summarizes the recent trends in the ROK energy sector, including trends in energy demand and supply, and trends in economic, demographic, and other activities that underlie trends in energy use. The ROK has been experiencing drastic changes in its energy system, mainly induced by industrial, supply security, and environmental concerns, and energy policies in the ROK have evolved over the years to address such challenges through measures such as privatization of energy-sector activities, emphases on enhancing energy security through development of energy efficiency, nuclear power, and renewable energy, and a related focus on reducing greenhouse gas emissions. The assembly of a model for evaluating energy futures in the ROK (ROK2010 LEAP) is described, and results of several policy-based scenarios focused on different levels of nuclear energy utilization are described, and their impacts on of energy supply and demand in the ROK through the year 2030 are explored, along with their implications for national energy security and long-term policy plans. Nuclear power continues to hold a crucial position in the ROK's energy policy, but aggressive expansion of nuclear power alone, even if possible given post-Fukushima global concerns, will not be sufficient to attain the ROK's 'green economy' and greenhouse gas emissions reduction goals. - Research highlights: →Rapid industrialization caused ROK energy use to increase over 10-fold during 1970-2000, with dramatic structural changes. → Growth in energy use after 2000 slowed to under 5%/yr, and

  19. ENVIRONMENTAL INNOVATIVE BUSINESS SOLUTIONS AS A STRATEGIC FACTOR OF ECONOMIC SECURITY ISSUES

    Directory of Open Access Journals (Sweden)

    A. S. Senin

    2016-01-01

    Full Text Available The relevance of this work lies in the fact that it attempts to disclose the key theoretical and practical issues of economic security solutions, taking into account the problems of global transformations taking place in the global economy. As part of the article we have been studied various aspects that characterize global economic, environmental trends that will shape the future of modern civilization. The article also addresses the problem of exit from the raw model of the economy, the formation of economic mechanisms that take into account environmental costs, proposed internalization of environmental externalities.The purpose/goal. The purpose of this article and its main task is to systematize the areas of environmentally oriented development of economic entities, as well as the determination of the list of key provisions of environmental policies, which will ensure the further socio-economic development of Russia in line with the green economy.Methods. In this article, based on content analysis of theoretical and empirical basic conceptual provisions of economic security were formulated in the context of eco-oriented production, the transition to which world civilization is currently implementing. It was concluded that the economic, energy, environmental and social issues of sustainable development of modern civilization is directly linked, so the transition to ecooriented production is possible, firstly, it provided aggressive reduction of production and wasteful use of traditional hydrocarbon resources, and, secondly, on the condition of rational replacement of traditional energy sources with renewable energy.Results. This article outlines the basic solutions that can be used to provide environmentally responsible operation and development of Russian business and corporate structures. Also offered in the basic decisions that are to be included in the national environmental policy as a major incentive for the further transition to a

  20. Secure Automated Microgrid Energy System (SAMES)

    Science.gov (United States)

    2016-12-01

    electrical components of the clustered microgrid, using sophisticated analysis to provide a real time comparison of predicted operation to actual...in spring and fall months when electricity consumption is not affected by summer air-conditioning or winter heating loads. There are a variety of...30 Figure 14. Energy Consumption at Buildings 1-7, Naval Medical Center

  1. Final report of the Conference on Forging North American Energy Security

    International Nuclear Information System (INIS)

    2004-06-01

    This paper discussed the main themes of the Forging American Energy Security Forum. The factors that may contribute to a potential energy crisis were identified as being the major blackout affecting the American Northeast and Ontario, political tensions in the Middle East, the volatility of oil and natural gas prices, fear of terrorist attacks on energy infrastructures and attempts to reform the Mexican energy sector. The conference addressed issues such as the reliability and physical integrity of the North American power supply grids, supply of energy at a stable and competitive price, growth of energy autonomy through increasing North American power supply and energy efficiency and the development of interconnections between power grids in the three countries. Diversification of energy supply sources was discussed, with particular reference to the increased use of renewable energies. Improvements in efficiency were suggested for how different levels of government interact on issues concerning energy development. It was recommended that the energy sector could serve as a springboard to implement a North American investment fund, and that Mexico should take advantage of its energy resources to attract foreign investors in order to finance an increase in Mexican energy production. It was suggested that a trilateral strategy aiming for energy security would accelerate national objectives. The fact that Mexico imports energy from the United States even though it already has the energy resources was also examined. Lack of capital in Mexico was seen as an impediment to development. It was concluded that relaxing regulations would facilitate in the management of the energy sector. The challenges of using clean energy sources were highlighted, as well the difficulties associated with establishing an integrated market for tradable renewable energy certificates. refs., figs

  2. Final report of the Conference on Forging North American Energy Security

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-06-01

    This paper discussed the main themes of the Forging American Energy Security Forum. The factors that may contribute to a potential energy crisis were identified as being the major blackout affecting the American Northeast and Ontario, political tensions in the Middle East, the volatility of oil and natural gas prices, fear of terrorist attacks on energy infrastructures and attempts to reform the Mexican energy sector. The conference addressed issues such as the reliability and physical integrity of the North American power supply grids, supply of energy at a stable and competitive price, growth of energy autonomy through increasing North American power supply and energy efficiency and the development of interconnections between power grids in the three countries. Diversification of energy supply sources was discussed, with particular reference to the increased use of renewable energies. Improvements in efficiency were suggested for how different levels of government interact on issues concerning energy development. It was recommended that the energy sector could serve as a springboard to implement a North American investment fund, and that Mexico should take advantage of its energy resources to attract foreign investors in order to finance an increase in Mexican energy production. It was suggested that a trilateral strategy aiming for energy security would accelerate national objectives. The fact that Mexico imports energy from the United States even though it already has the energy resources was also examined. Lack of capital in Mexico was seen as an impediment to development. It was concluded that relaxing regulations would facilitate in the management of the energy sector. The challenges of using clean energy sources were highlighted, as well the difficulties associated with establishing an integrated market for tradable renewable energy certificates. refs., figs.

  3. Environmental issues of Ukrainian energy sector

    International Nuclear Information System (INIS)

    Streimikiene, D.

    2005-01-01

    Ukraine's power sector is the twelfth-largest in the world in terms of installed capacity, with 54 GW and Ukraine still obtains over 50% of its electricity usage from nuclear source. In terms of energy consumption per dollar, Ukraine has one of the highest levels of energy and carbon intensity in the world. The country has very huge energy sector which cause a significant impact on environment

  4. Nuclear power for energy security - Indian scenario

    International Nuclear Information System (INIS)

    Sinha, R.K.

    2013-01-01

    India has been witnessing an impressive growth in GDP in the face of several challenges including the fact that India has a population of over 1.2 billion. In order to provide and maintain a comfortable standard of living to our large population, as well as to sustain the national economic growth, it is essential to have a matching growth in the availability of energy. One such indicator is per capita electricity consumption, and for India, it is about 700 kWh which is far below that of the OECD countries (∼8000 kWh). Furthermore, India's population is expected to rise to about 1.5 billion by 2050. A per capita use of about 5000 kWh energy in the form of electricity every year would be needed for achieving a state of reasonably high development. This will require an installed electricity generation capacity exceeding 1300 GWe, which is slightly more than six times the existing installed electricity generation capacity of 210 GWe in India. Despite the fact that at present India is the fifth largest electricity generating country, India has to increase total electricity generation to almost 10 times the present generation level (about 875 billion kWh). It is against this backdrop, that we cannot afford to ignore any source of energy production including the nuclear option, since no single source alone, or not even a combination of only a couple of sources, can ever meet the entire energy needs of our country in a reliable and sustainable manner. (author)

  5. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    2015-09-01

    equipment, and habitat destruction from general construction (DoE, “ Wind Turbine Interactions with Birds , Bats, and Their Habitats,” pgs 2-4). Another...utility-resource-efficiency>, accessed 16 December 2014. Department of Energy, Wind Turbine Interactions with Birds , Bats, and Their Habitats... Wind power is a mature technology, with wind turbines first being used for electricity in the late 19th century. The Air Force operates two wind

  6. Is the energy supply secure after 1985

    International Nuclear Information System (INIS)

    Barthelt, K.

    1981-01-01

    At the centre of the remarks is the meeting of the demand for electricity in the Federal Republic of Germany, and furthermore nuclear energy for the base load and coal for the middle. In detail the author analyses the controversy which has already been around too long, and that is that of the continued extension of nuclear technology, and forcibly warning of the dangers which result from these delaying tactics. In this context, we are reminded of our dependence on imported oil and of the balance of payments' deficit resulting from the extremely sharply risen and still rising oil-prices. The strongly export-orientated German industry today not only produces with the highest wage unit-costs in the world, but also with energy which is too expensive, in particular compared to its competitors, for example France. Another just as important aspect is the endangering of promising technologies in which nuclear technology no doubt plays a big role. Highly qualified positions are in danger here. In conclusion the author appeals strongly to a energy policy of good sense in our country; it must be treated now so that no more valuable time is uselessly wasted. (orig./UA) [de

  7. China's energy security, the Malacca dilemma and responses

    International Nuclear Information System (INIS)

    Zhang Zhongxiang

    2011-01-01

    China's rapid economic growth has led to a huge increase in oil imports. This has raised great concern regarding its energy security because China depends on a single chokepoint, the Strait of Malacca, with nearly three-quarters of its oil imports flowing through the Strait. Given its strategic importance to China and China's little sway on the waterway, this viewpoint focuses mainly on China's concerns about and efforts at both demand and supply sides towards energy security, in particular regarding the Malacca dilemma, and puts potential Arctic oil and gas into that context.

  8. Freedom or security - the unsolvable dilemma of atomic energy

    International Nuclear Information System (INIS)

    Rossnagel, A.

    1989-01-01

    The threat of a non-peaceful use of atomic energy is not a fixed quantity. The hazard may increase depending on the social situation and the insentity of social crises emerging. In view of the damage potential involved with atomic energy, the principle of 'dynamic protection of civil rights' requires security measures to be intensified according to growing threat. The restrictions of freedom connected with enhanced security measures are to be felt already today. The pressure for security of nuclear installations or material creates a dilemma: any security step-up will be done at the expense of freedom, and conserving freedom will mean reducing security. The pressure for security which is achieved by the instruments of balancing the objects of legal protection and following the principle of reasonablenesse, will eventually lead to a de facto decline of the civil rights by way of a clandestine and gradual change of legal terms and definitions. We even then would be living in a constitutional state. But what will freedom then mean? The civil rights would still be incorporated in our Basic Law, but protection in practical life will have been decreased. (orig./HSCH) [de

  9. Nuclear issues in the Canadian energy context

    Energy Technology Data Exchange (ETDEWEB)

    1979-01-01

    Participants holding a wide spectrum of views and representing the nuclear industry, churches, anti-nuclear groups, and the general public participated in sessions on the ethics of nuclear power, waste disposal, health and environmental effects of energy development, decision making and the regulatory process, and the economics of nuclear and other energy sources.

  10. The role of sustainable energy issues in development cooperation

    International Nuclear Information System (INIS)

    Jansen, J.C.; Buskens, V.W.

    1994-01-01

    The author discusses the need to reduce primary energy resource requirements to provide more affordable basic energy services to the developing countries. The relationship between energy supply and environment/developing issues (such as climate change, deforestation, poverty, health etc.) is discussed. The Bruntland Report and two UNCED agreements the Framework Convention on Climate Change, and Agenda 21 are summarised and a brief assessment made of their coverage of sustainable energy issues. 27 refs

  11. Energy security and European Union. Proposals for the French presidency

    International Nuclear Information System (INIS)

    Mandil, C.

    2008-04-01

    This report treats of energy security and of the two related topics which are the fight against climatic change and the economic growth. The first chapter analyses the energy risks that we will have to face. It makes a difference between the long-term risks (depletion of energy resources) and the short-term risks (supply disruption). Concerning the short-term risks, it is recalled that most of the supply incidents have an internal cause and that imports can have advantages and not only drawbacks. The second chapter approaches the delicate problem of European harmonization between the speech and the action when the energy security is in concern. A conclusion of this chapter is that the 'speaking with a single voice' goal can be reached only if improvements are made in the domain of solidarity between member states. The completion of the internal energy market is therefore a priority and the mission of regulators must include the security aspect. The third chapter treats of the particular case of the relation with the Russian supplier. It suggests to work for a lower energy dependence with respect to Russia, by developing the energy efficiency, the LNG industry, the renewable energies and the nuclear energy. The fourth chapter deals with the relations with the Caspian sea surrounding countries in the perspective of gas exports towards Europe. Here again, the cooperation with Russia is of prime importance. It approaches also the problem of the gas negotiation with Turkey which requires a significant improvement of the consistency of European diplomacy in this area. The last chapter treats of the role of international organisations and of the dialogue in the domain of energy. It suggests some paths to develop the confidence between the different intervening parties. It stresses on the lack of transparency which disturbs the markets and weakens the security. (J.S.)

  12. Nuclear energy and the Green Paper of the European Commission 'An European strategy for sustainable, competitive and secure energy'

    International Nuclear Information System (INIS)

    Metes, Mircea

    2006-01-01

    At present the energy is for European Union officials an issue of top priority. In the beginning of 2006 the natural gas crisis between Russia and Ukraine remembered menacingly to the Europeans that energy supply of the continent depends decisively on importation from other geographic areas and that these importation raise risks of a great variety. In addition to the power problems, disastrous effects on the economy, human life and eco-systems appeared to have the climate changes produced by fossil fuel burning. Consequently, a common energetic policy of Europe should be targeted at three main objectives: sustainability, competitiveness and security of supply. Six directions of action were identified: 1. EU must finalize the construction of internal European gas and electricity market; 2. EU should ensure that its energy market guaranties the security of supply under a solidary policy of the member states; 3. It is necessary that a large debate to have place about different sources of energy including the problems of costs and impact on climatic change, security and supply competitiveness and sustainability; 4. EU should approach the climatic change issues in agreement with the objectives established at Lisbon conference aiming at placing EU in the forefront of technological and scientific progress; 5. A strategic plan concerning the energy technology; 6. A common foreign policy in the field of energy. It is worthy to stress that the present Green Paper of EU has a manifestly different position concerning the nuclear energy with respect to the prior Green Paper of November 2000. While, in 2000 the EU Commission viewed the nuclear energy as being 'in limbo', in the 2006 version the Commission declared the nuclear energy as the most important source of power in Europe without CO 2 emissions. It is stated that all the energy options should be kept open while the Europe states have the right to establish their own energy mix, which they consider optimal, and in which

  13. Analysis and improvement of security of energy smart grids

    International Nuclear Information System (INIS)

    Halimi, Halim

    2014-01-01

    The Smart grid is the next generation power grid, which is a new self-healing, self-activating form of electricity network, and integrates power-flow control, increased quality of electricity, and energy reliability, energy efficiency and energy security using information and communication technologies. Communication networks play a critical role in smart grid, as the intelligence of smart grid is built based on information exchange across the power grid. Its two-way communication and electricity flow enable to monitor, predict and manage the energy usage. To upgrade an existing power grid into a smart grid, it requires an intelligent and secure communication infrastructure. Because of that, the main goal of this dissertation is to propose new architecture and implementation of algorithms for analysis and improvement of the security and reliability in smart grid. In power transmission segments of smart grid, wired communications are usually adopted to ensure robustness of the backbone power network. In contrast, for a power distribution grid, wireless communications provide many benefits such as low cost high speed links, easy setup of connections among different devices/appliances, and so on. Wireless communications are usually more vulnerable to security attacks than wired ones. Developing appropriate wireless communication architecture and its security measures is extremely important for a smart grid system. This research addresses physical layer security in a Wireless Smart Grid. Hence a defense Quorum- based algorithm is proposed to ensure physical security in wireless communication. The new security architecture for smart grid that supports privacy-preserving, data aggregation and access control is defined. This architecture consists of two parts. In the first part we propose to use an efficient and privacy-preserving aggregation scheme (EPPA), which aggregates real-time data of consumers by Local Gateway. During aggregation the privacy of consumers is

  14. Energy Drinks: A Contemporary Issues Paper.

    Science.gov (United States)

    Higgins, John P; Babu, Kavita; Deuster, Patricia A; Shearer, Jane

    2018-02-01

    Since their introduction in 1987, energy drinks have become increasingly popular and the energy drink market has grown at record pace into a multibillion-dollar global industry. Young people, students, office workers, athletes, weekend warriors, and service members frequently consume energy drinks. Both health care providers and consumers must recognize the difference between energy drinks, traditional beverages (e.g., coffee, tea, soft drinks/sodas, juices, or flavored water), and sports drinks. The research about energy drinks safety and efficacy is often contradictory, given the disparate protocols and types of products consumed: this makes it difficult to draw firm conclusions. Also, much of the available literature is industry-sponsored. After reports of adverse events associated with energy drink consumption, concerns including trouble sleeping, anxiety, cardiovascular events, seizures, and even death, have been raised about their safety. This article will focus on energy drinks, their ingredients, side effects associated with their consumption, and suggested recommendations, which call for education, regulatory actions, changes in marketing, and additional research.

  15. Historical and economic aspects of energy issues

    International Nuclear Information System (INIS)

    Sander, M.

    2000-01-01

    The classical macro-economic aggregate production function considered that output as measured by Gross Domestic product (GDP) was the result of the factor inputs: land, labour and capital. The production function was given by: GDP=f(Land, Capital, Labour). We propose: GDP=function (LAND, CAPITAL, LABOUR, ENERGY, TECHNOLOGY, INFORMATION), GDP=function(Z, K, R, E, T, I). Measuring effects of these variables on growth of GDP over longer periods of time is difficult statistical and mathematical task. Mathematical relations are not derived but instead historical exposition with a selection of statistical data was given to prove validity of the production function relation. through long historical periods, energy was reduced to energy of animal and human muscles sometimes with a help of mechanical levers and mechanisms. With coal use in 18th century animal and human muscles are no more main energy sources but in substitute to them thermal machines (from steam reciprocating machines to Otto, diesel machines in combination with electric machines) startedto be main movers of industrial age with high energy intensity. Energy as general thermodynamic concept for availability or ability of substance to produce work was introduced. Between primary forms of energy crude oil like fuel with greatest energy or ability to produce mechanical work, specially in transport takes the dominant place in 20th and 21st century. Use of crude oil in gas turbines, internal combustion engines, reaches upper levels of efficiency, but in the same time there is no technology that could substitute it in the transport. Influence of crude oil on prices and all other forms of energy and as political and economic factor is considered. (author)

  16. Protecting and securing the energy infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Gillham, B. [Conoco Canada Ltd., Calgary, AB (Canada)

    2002-07-01

    Critical Infrastructure Protection (CIP) includes protection against physical and cyber attacks as well as potential interruptions and vulnerabilities such as natural disasters and human error. CIP makes it possible to deal with the consequences of infrastructure failures that can have regional, national and international impacts. The energy sector is challenged because there has been an irreversible move to automated control systems and electronic transactions. In addition, due to mergers and joint ventures, the line between traditional oil, natural gas companies and power companies is not perfectly clear. Energy industries can no longer be seen in isolation of each other because they depend on other critical infrastructures. Industry should lead CIP programs through risk management assessments, develop and implement global information technology standards, and enhance response and recovery planning. The National Petroleum Council (NPC) will continue to develop the capabilities of the newly formed Information Sharing and Assessment Centre (ISAC). The sector will also continue to develop common vulnerability assessment goals. It was noted that response and recovery plans must include the cyber dimension, because there has been an increasing number of scans and probes from the Internet since the events of September 11, 2001. It was noted that physical incidents can often turn into cyber incidents and vice versa.

  17. Future regional nuclear fuel cycle cooperation in East Asia: Energy security costs and benefits

    International Nuclear Information System (INIS)

    Hippel, David von; Hayes, Peter; Kang, Jungmin; Katsuta, Tadahiro

    2011-01-01

    Economic growth in East Asia has rapidly increased regional energy, and especially, electricity needs. Many of the countries of East Asia have sought or are seeking to diversify their energy sources and bolster their energy supply and/or environmental security by developing nuclear power. Rapid development of nuclear power in East Asia brings with it concerns regarding nuclear weapons proliferation associated with uranium enrichment and spent nuclear fuel management. This article summarizes the development and analysis of four different scenarios of nuclear fuel cycle management in East Asia, including a scenario where each major nuclear power user develops uranium enrichment and reprocessing of spent fuel individually, scenarios featuring cooperation in the full fuel cycle, and a scenario where reprocessing is avoided in favor of dry cask storage of spent fuel. The material inputs and outputs and costs of key fuel cycle elements under each scenario are summarized. - Highlights: → We evaluate four scenarios of regional nuclear fuel cycle cooperation in East Asia and the Pacific. → The scenarios cover fuel supply, enrichment, transport, reprocessing, and waste management. → We evaluate nuclear material flows, energy use, costs, and qualitative energy security impacts. → Regional cooperation on nuclear fuel cycle issues can help to enhance energy security. → A regional scenario in which reprocessing is rapidly phased out shows security and cost advantages.

  18. Empowering Distributed Solar PV Energy for Malaysian Rural Housing: Towards Energy Security and Equitability of Rural Communities

    OpenAIRE

    Ahmad, N.A; Byrd, H

    2013-01-01

    This paper illustrates on how Malaysia’s development landscapes has been poweredby cheap oil and gas making it dependent and addicted on using large amounts of fossil fuels. As acountry that is primarily depended on fossil fuels for generating power supply, Malaysia needs tocogitate of long-term energy security due to fossil fuel depletion and peak oil issues. Loss of theseresources could leadto thereduction of power generation capacitywhich will threaten the stabilityof the electricity suppl...

  19. Security and privacy issues in implantable medical devices: A comprehensive survey.

    Science.gov (United States)

    Camara, Carmen; Peris-Lopez, Pedro; Tapiador, Juan E

    2015-06-01

    Bioengineering is a field in expansion. New technologies are appearing to provide a more efficient treatment of diseases or human deficiencies. Implantable Medical Devices (IMDs) constitute one example, these being devices with more computing, decision making and communication capabilities. Several research works in the computer security field have identified serious security and privacy risks in IMDs that could compromise the implant and even the health of the patient who carries it. This article surveys the main security goals for the next generation of IMDs and analyzes the most relevant protection mechanisms proposed so far. On the one hand, the security proposals must have into consideration the inherent constraints of these small and implanted devices: energy, storage and computing power. On the other hand, proposed solutions must achieve an adequate balance between the safety of the patient and the security level offered, with the battery lifetime being another critical parameter in the design phase. Copyright © 2015 Elsevier Inc. All rights reserved.

  20. Energy and sustainable development: issues and options

    International Nuclear Information System (INIS)

    Appert, O.

    2001-01-01

    Future development needs to be sustainable in all of its dimensions if it is to continue to fully contribute to human welfare. In the achievement of this objective, the manner in which energy is produced and consumed is of crucial importance. In the wake of these insights, first attempts begin to provide concrete options for steps towards sustainability in the energy sector. Two criteria can be identified for developing sustainable development policies. First, such policies need to strike a balance between the three dimensions of sustainable development - economic, environmental and social - acknowledging that all three are intrinsically linked. Second, policies in the energy sector need to reduce exposure to large-scale risks and improve the resilience of the energy system through active risk management and diversification. (authors)

  1. Promoting India's development: energy security and climate security are convergent goals

    Energy Technology Data Exchange (ETDEWEB)

    Rajan, Gupta [Los Alamos National Laboratory; Shankar, Harihar [Los Alamos National Laboratory; Joshi, Sunjoy [INDIA

    2009-01-01

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  2. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    Energy Technology Data Exchange (ETDEWEB)

    Ray Fink

    2006-10-01

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  3. Globalization of energy issues and Japan`s correspondance to it; Energy mondai no gurobaru ka to Nihon no taio

    Energy Technology Data Exchange (ETDEWEB)

    Toichi, T. [Japan Energy Economic Research Inst., Tokyo (Japan)

    1996-02-20

    There are three energy issues in the 21st century, i.e., energy security, global warming, and improvement in efficiency of energy supply. The correspondence to these issues was described. Topics in the energy security issue are the present situation of Middle East, the trend of energy demand in the rapidly developing countries such as China, ASEAN countries, Korea, and Taiwan, and the nuclear fuel and peaceful utilization of plutonium. For the global warming, the Frame Work Convention on Climate Change, which has became officially effective, and the attitude of developed countries to it, the establishment of responsibility to reducing the emission after 2000, and the increasing expectation to co-operation and discrepancy among Japan, U.S.A., EU, and developing countries. Concerning the improvement in efficiency of energy supply system and the relaxation of regulation, the progress of regulation relaxation in the U.S.A. and necessity of promoting the flexibility and efficiency improvement in energy demand and supply system in Japan were explained. 3 tabs.

  4. Issues affecting Northeast Asian minerals and energy markets

    International Nuclear Information System (INIS)

    Sheales, T.; Smith, V.

    1993-01-01

    Some of the broad issues likely to affect industry developments and trade in minerals and energy commodities in Northeast Asia in the 1990s are examined. Many of these issues will have a bearing on the development of mineral and energy resources of the Russian Far East region. 23 refs., 1 fig., 3 tabs

  5. The security of gas supply-a critical issue for Europe?

    International Nuclear Information System (INIS)

    Weisser, Hellmuth

    2007-01-01

    Gas is competing with oil for being the dominant energy source. In electricity generation gas is to play as pivotal a role as oil in transportation. The security equation of gas and electricity become unseparably interrelated. Energy disruptions have considerable influence on the national accounts far beyond the direct cost of market participants (asymmetry). The present gas supply to the EU depends dangerously on too few sources and venues. There is a decided lack of optionality. The EU directly or through its members needs a clear proactive policy on 'Security of Gas Supply' with a strong multilateral direction. The measures developed for the oil industry over the last 30 years can at least serve as a starting point for a constructive debate. When discussing security of supply dependence it is useful to clearly define the various risks one wishes to protect against. Free riders relying on alternative fuels without participating in their security systems are not permissible

  6. Enhancing Tribal Energy Security and Clean Energy (Fact Sheet)

    Energy Technology Data Exchange (ETDEWEB)

    2013-07-01

    This fact provides information on the Strategic Technical Assistance Response Team (START) Program, a U.S. Department of Energy Office of Indian Energy Policy and Programs (DOE-IE) initiative to provide technical expertise to support the development of next-generation energy projects in Indian Country.

  7. Smart Grid Communications Security Project, U.S. Department of Energy

    Energy Technology Data Exchange (ETDEWEB)

    Barnes, Frank [Univ. of Colorado, Boulder, CO (United States)

    2012-09-01

    There were four groups that worked on this project in different areas related to Smart Girds and Security. They included faculty and students from electric computer and energy engineering, law, business and sociology. The results of the work are summarized in a verity of reports, papers and thesis. A major report to the Governor of Colorado’s energy office with contributions from all the groups working on this project is given bellow. Smart Grid Deployment in Colorado: Challenges and Opportunities, Report to Colorado Governor’s Energy Office and Colorado Smart Grid Task Force(2010) (Kevin Doran, Frank Barnes, and Puneet Pasrich, eds.) This report includes information on the state of the grid cyber security, privacy, energy storage and grid stability, workforce development, consumer behavior with respect to the smart grid and safety issues.

  8. IT security standards for the digitalization of the energy transition

    International Nuclear Information System (INIS)

    Laupichler, Dennis

    2016-01-01

    Intelligent measuring systems are important components in the intelligent net and require security and privacy by design in this critical infrastructure. The smart meter gateway as secure communication platform makes the digital sector coupling possible and becomes the driver for innovations of the digitalization. The protection profiles and the technical rules of the BSI as essential part of the law for the digitalization of the energy transition guarantee a great amount of data protection and data security and provide a unique security standard in the future energy supply system. The data -protection concept of the intelligent measuring system regards a calibration-law conformal data processing and star-shaped data dispatch of the gateway. By this both a traceability and a transparency for the final user is guaranteed and the handling of the data in the sense of the data sovereignty is also technically enforced. For the evidences of compliance of the protection profiles and the technical rules correponding tests in approved test centers with final certification by the BSI are performed. The law for the digitalization of the energy transition makes the first important step to an innovative, digital infrastructure of the intelligent net. By the legal framework additionally a base is created, in order to perform a progressive development of the security targets of the BSI both for intelligent measuring systems as for further important system components of the intelligent energy net via a roadmap for the digitalization. In connection with the technical standards of the BSI the law creates the necessary legal certainty and realizes the aim pursued in the coalition treaty to regulate binding framework conditions for the secure and data-protection conformal application of intelligent measuring systems for diversified application cases in the intelligent net.

  9. Accounting Issues: An Essay Series Part VI--Investments in Securities

    Science.gov (United States)

    Laux, Judy

    2008-01-01

    The sixth in a series of theory-based essays, this article presents accounting for investments in debt and equity securities along with some related conceptual and measurement issues. Additional coverage is devoted to potential ethical dilemmas and both theoretical and empirical literature related to this asset. (Contains 1 footnote.)

  10. Education Issues Raised by S.744: The Border Security, Economic Opportunity, and Immigration Modernization Act

    Science.gov (United States)

    Murphy, Garrett

    2014-01-01

    This brief report summarizes the requirements for undocumented immigrants set forth by the Border Security, Economic Opportunity, and Immigration Modernization Act (S.744). Assuming that S.744 will move forward in Congress, the report also examines issues having to do with certain language, civics and government, and education/training provisions…

  11. 13 CFR 107.1505 - Liquidity requirements for Licensees issuing Participating Securities.

    Science.gov (United States)

    2010-01-01

    ... 13 Business Credit and Assistance 1 2010-01-01 2010-01-01 false Liquidity requirements for... (Leverage) Participating Securities Leverage § 107.1505 Liquidity requirements for Licensees issuing... liquidity to avoid a condition of Liquidity Impairment. Such a condition will constitute noncompliance with...

  12. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  13. A Review of Cyber-Physical Energy System Security Assessment

    DEFF Research Database (Denmark)

    Rasmussen, Theis Bo; Yang, Guangya; Nielsen, Arne Hejde

    2017-01-01

    Increasing penetration of renewable energy resources (RES) and electrification of services by implementing distributed energy resources (DER) has caused a paradigm shift in the operation of the power system. The controllability of the power system is predicted to be shifted from the generation side...... to the consumption side. This transition entails that the future power system evolves into a complex cyber-physical energy system (CPES) with strong interactions between the power, communication and neighboring energy systems. Current power system security assessment methods are based on centralized computation...

  14. Energy policy seesaw between security and protecting the environment

    International Nuclear Information System (INIS)

    Finon, D.

    1994-01-01

    It is just the price of oil that causes the energy policies of importing countries to vacillate. Changing perceptions of energy supply factors has had as much to do with transfiguring government action modes since 1973 as has the idea of the legitimacy of that action. The present paper thus draws a parallel between the goal of energy security twenty years ago and that of global environmental protection today, which explains the critical reversion to a view of minimum government action in the energy field - a view that marked the eighties. (author). 20 refs

  15. Scientists credit `Atoms for Peace' for progress on energy, security

    CERN Multimedia

    Jones, D

    2003-01-01

    "Fifty years after President Eisenhower unveiled his plan for developing peaceful uses for nuclear fission, the scientific advances spawned by his Atoms for Peace program have made possible major advances in energy and national security, a panel of physicists said last week" (1 page).

  16. Energy supply security and geopolitics : A European perspective

    NARCIS (Netherlands)

    Correlje, A; van der Linde, C

    The security of energy supply to the EU is examined in the context of two storylines. Markets and Institutions exemplifies an economically and politically integrated, multilateral world with effective institutions and markets, Regions and Empires involves a world broken up in rival political and

  17. A Strategy for American Power: Energy, Climate and National Security

    Science.gov (United States)

    2008-06-01

    For example, Greg Mankiw , Harvard economist and former chair of President Bush’s Council of Economic Advisors, has proposed phasing in a $1 per...International Energy Barrier By Amy Myers Jaffe 77 Chapter V: Overcoming the Economic Barriers to Climate Change and Energy Security By Jason Furman (lead...Hamilton Project. He previously served in the Clinton administration and at the Council of Economic Advisers, the National Economic Council, and the World

  18. European Climate - Energy Security Nexus. A model based scenario analysis

    International Nuclear Information System (INIS)

    Criqui, Patrick; Mima, Silvana

    2011-01-01

    In this research, we have provided an overview of the climate-security nexus in the European sector through a model based scenario analysis with POLES model. The analysis underline that under stringent climate policies, Europe take advantage of a double dividend in its capacity to develop a new cleaner energy model and in lower vulnerability to potential shocks on the international energy markets. (authors)

  19. Radiological protection, safety and security issues in the industrial and medical applications of radiation sources

    International Nuclear Information System (INIS)

    Vaz, Pedro

    2015-01-01

    The use of radiation sources, namely radioactive sealed or unsealed sources and particle accelerators and beams is ubiquitous in the industrial and medical applications of ionizing radiation. Besides radiological protection of the workers, members of the public and patients in routine situations, the use of radiation sources involves several aspects associated to the mitigation of radiological or nuclear accidents and associated emergency situations. On the other hand, during the last decade security issues became burning issues due to the potential malevolent uses of radioactive sources for the perpetration of terrorist acts using RDD (Radiological Dispersal Devices), RED (Radiation Exposure Devices) or IND (Improvised Nuclear Devices). A stringent set of international legally and non-legally binding instruments, regulations, conventions and treaties regulate nowadays the use of radioactive sources. In this paper, a review of the radiological protection issues associated to the use of radiation sources in the industrial and medical applications of ionizing radiation is performed. The associated radiation safety issues and the prevention and mitigation of incidents and accidents are discussed. A comprehensive discussion of the security issues associated to the global use of radiation sources for the aforementioned applications and the inherent radiation detection requirements will be presented. Scientific, technical, legal, ethical, socio-economic issues are put forward and discussed. - Highlights: • The hazards associated to the use of radioactive sources must be taken into account. • Security issues are of paramount importance in the use of radioactive sources. • Radiation sources can be used to perpetrate terrorist acts (RDDs, INDs, REDs). • DSRS and orphan sources trigger radiological protection, safety and security concerns. • Regulatory control, from cradle to grave, of radioactive sources is mandatory.

  20. Energy Security and the Role of Nuclear power

    International Nuclear Information System (INIS)

    Kim, Jinwoo

    2008-01-01

    Nuclear power is expected to play a more important role to cope with rapidly changing energy market environment. Recently re-evaluation on nuclear energy is taking place in major countries like USA, Japan, and Sweden. It is of particular interest in Korea to make out optimal level of nuclear power from energy security perspectives. This paper is aiming to derive options for optimal fuel mix and sets up scenarios on major premises such back-end costs and fuel price of nuclear, and CO 2 emission cost. Six scenarios are analyzed for optimal fuel mix and additional cases are examined for the effect on CO 2 emission. The model outcomes suggest to construct 3∼13 units of 1,400 MW nuclear reactors by 2030 to meet ever-growing power demand. It is found that base-load facilities are taking about 70% of total installed capacity in any case. As a reasonable option, 9 units (12.6 GW) of nuclear is recommended to be built, taking 37.0% of total installed capacity in 2030. CO 2 emission turns out to be largely affected by nuclear proportion, which is sensitive to environmental cost. However, expansion of renewable energy or demand side management is found to have rather on CO 2 emission. Energy security aspects need to be considered in developing an optimal fuel mix of power generation. But In-depth studies are needed to obtain a practical range of optimal level of nuclear power from energy security point of view

  1. Energy for Tomorrow: An Issue for Today.

    Science.gov (United States)

    1980-09-01

    centage increases per year as proof of the simplicity of the solution. These are similar to the rates used to describe inflation, give birth and death ...Hayes, Denis, Nuclear Power: The Fifth Horseman , Worldwatch Paper No. 6, Worldwatch Institute, Washington, D.C., May 1976. 16. The International Energy

  2. Policy issues in Ethiopian energy development

    Energy Technology Data Exchange (ETDEWEB)

    1981-05-01

    One of the most serious constraints to current survival and future development in Ethiopia is energy. The question of energy for survival is dependent on biomass which is being rapidly depleted;at the current rate of deforestation, Ethiopia will be bare of forests in 20 years. There are several points to emphasize in establishing a forestry policy which include: 1) Accurate costing of per unit of production 2) Selection of appropriate species by ecological zone 3) Land management improvements 4) Suitable Land Tenure Systems It is possible to outline general principles for energy-forestry management, namely: 1) Around densely settled areas, encourage the production of trees as a cash crop 2) In dry areas, encourage agroforestry to enchance total biomass productivity 3) Require state farms and all new settlement as far as possible to be self supporting in fuel through settlement woodlots 4) Enforce 'Green (Energy) Belts' around major urban areas. Without forestry, there will be no fuel. Except for hydroelectricity and geothermal, there are no substantial, really proven indigenous reserves: even the exploitation of hydropower and geothermal potential is totally dependent on foreign technology.

  3. Prioritizing low-carbon energy sources to enhance China’s energy security

    International Nuclear Information System (INIS)

    Ren, Jingzheng; Sovacool, Benjamin K.

    2015-01-01

    Highlights: • Four dimensions and ten metrics are used for energy security assessment. • Both qualitative and quantitative metrics are considered for energy security. • AHP has been used to quantify qualitative metrics. • TOPSIS method has been used for prioritize the low-carbon energy sources. • Sensitivity analysis and integrated ranking have been carried out. - Abstract: This paper explores how low-carbon systems compare to each other in terms of their net effect on Chinese energy security, and how they ought to be ranked and strategized into an optimal and integrated resource plan. The paper utilizes Analytic Hierarchy Process (AHP) to first determine the relative performances of hydroelectricity, wind energy, solar energy, biomass energy, and nuclear power with respect to the energy security dimensions of availability, affordability, accessibility, and acceptability. Both qualitative and quantitative metrics are considered. It relies on AHP to calculate the relative weights of the qualitative metrics attached to these dimensions of energy security for each of our five low carbon energy sources. Then, energy security performance is determined by aggregating multiple, weighted metrics into a generic index based on the method of TOPSIS and then tweaked with a sensitivity analysis. Finally, an integrated method has been developed to rank the low-carbon energy systems from most to least important, with major implications for Chinese decision-makers and stakeholders. We conclude that hydroelectricity and wind power are the two low-carbon energy sources with the most potential to enhance China’s energy security. By contrast, nuclear and solar power have the least potential

  4. Obstacles in energy security: An analysis of congressional and presidential framing in the United States

    International Nuclear Information System (INIS)

    Below, Amy

    2013-01-01

    Despite decades of policymaking, the U.S. has only recently made significant strides in becoming a more energy secure nation. With a focus on the executive and legislative branches, this paper investigates two possible political obstacles to achieve this policy goal. The first question it asks is whether or not the two branches have been defining energy security in the same way. As the concept itself has no universal definition, it is possible that the branches have been focusing on different aspects of the term. Results from a content analysis of presidential speeches and congressional hearings suggest that no such division has occurred. The subsequent question asks whether or not the two branches, in tandem, are providing the foundation for sound policy. Results suggest that Congress and presidents have defined and discussed energy security in a generally balanced, comprehensive and internally non-conflictual way. What policy emerges from these discussions should be the subject of future research. -- Highlights: •A content-analysis of congressional hearings and presidential speeches was conducted. •Executive and legislative branches have been generally unified in how they frame the issue of energy security. •Both have avoided overreliance on sensationalized frames. •Both do not focus enough attention on energy efficiency and intensity

  5. U.S. energy security: problems and policies

    Energy Technology Data Exchange (ETDEWEB)

    Toman, M.A

    2002-12-15

    The reemergence of concern about energy security in the wake of the September 2001 terror attacks amplified a theme that was already present in U.S. energy policy debates. Energy security was a central theme in the Bush administration energy policy report released by Vice President Cheney in the spring of 2001. World oil prices rose from about 10 dollar a barrel in 1998 to more than 30 dollar a barrel in late 2000. Prices trended down through most of 2001 to below 20 dollar a barrel, although the combined effect of improving economic conditions, OPEC supply cuts, and Middle East conflict (both actual and potential) have recently brought prices back into the dollar 25 per barrel neighborhood. In 2000 the United States imported almost 60 percent of the petroleum it consumed; imports from the Organization of Petroleum Exporting Countries (OPEC) made up about a quarter of total U.S. consumption. In previous energy security debates in the U.S., most of the attention has been on international oil markets and geopolitics. This time, even before September 11, the energy security debate had a much larger domestic component. The 2001 ''electricity market meltdown'' in California raised large concerns there and nationwide about the causes and consequences of electricity shortages and price volatility. The concerns run so deep that they are likely to have a significant effect on the ongoing debate about restructuring of the power sector though the nature of that effect remains to be determined. Similarly, periods of sharply rising motor fuels prices over the past few years increases well beyond what would be implied just by crude oil price volatility have led to concerns about the effects on households and commerce. All of these concerns are only amplified by worries about attacks on critical energy infrastructure. (author)

  6. U.S. energy security: problems and policies

    International Nuclear Information System (INIS)

    Toman, M.A.

    2002-12-01

    The reemergence of concern about energy security in the wake of the September 2001 terror attacks amplified a theme that was already present in U.S. energy policy debates. Energy security was a central theme in the Bush administration energy policy report released by Vice President Cheney in the spring of 2001. World oil prices rose from about 10 dollar a barrel in 1998 to more than 30 dollar a barrel in late 2000. Prices trended down through most of 2001 to below 20 dollar a barrel, although the combined effect of improving economic conditions, OPEC supply cuts, and Middle East conflict (both actual and potential) have recently brought prices back into the dollar 25 per barrel neighborhood. In 2000 the United States imported almost 60 percent of the petroleum it consumed; imports from the Organization of Petroleum Exporting Countries (OPEC) made up about a quarter of total U.S. consumption. In previous energy security debates in the U.S., most of the attention has been on international oil markets and geopolitics. This time, even before September 11, the energy security debate had a much larger domestic component. The 2001 ''electricity market meltdown'' in California raised large concerns there and nationwide about the causes and consequences of electricity shortages and price volatility. The concerns run so deep that they are likely to have a significant effect on the ongoing debate about restructuring of the power sector though the nature of that effect remains to be determined. Similarly, periods of sharply rising motor fuels prices over the past few years increases well beyond what would be implied just by crude oil price volatility have led to concerns about the effects on households and commerce. All of these concerns are only amplified by worries about attacks on critical energy infrastructure. (author)

  7. Tackling Dependency: The EU and its Energy Security Challenges

    Energy Technology Data Exchange (ETDEWEB)

    Larsson, Robert L.

    2007-10-15

    Europe is facing a future of augmenting energy demands, domestic depletion, high prices and other energy-political challenges. Climate change, infrastructure resilience, producers' coercive energy policy and the EU's internal market failures have put stress on the EU's emerging energy policy and inspired the union to address its challenges with greater enthusiasm than before. Some of the EU's challenges call for strategic choices of a magnitude that EU is not used to handle. The aim of this report is therefore to identify, analyse and assess the political side of Europe's energy predicament and import dependency. Against the background of increasing dependence on energy imports, the report tries to answer questions: what are the key dimensions of Europe's energy security and what are their consequences?

  8. Tackling Dependency: The EU and its Energy Security Challenges

    Energy Technology Data Exchange (ETDEWEB)

    Larsson, Robert L

    2007-10-15

    Europe is facing a future of augmenting energy demands, domestic depletion, high prices and other energy-political challenges. Climate change, infrastructure resilience, producers' coercive energy policy and the EU's internal market failures have put stress on the EU's emerging energy policy and inspired the union to address its challenges with greater enthusiasm than before. Some of the EU's challenges call for strategic choices of a magnitude that EU is not used to handle. The aim of this report is therefore to identify, analyse and assess the political side of Europe's energy predicament and import dependency. Against the background of increasing dependence on energy imports, the report tries to answer questions: what are the key dimensions of Europe's energy security and what are their consequences?

  9. Tackling Dependency: The EU and its Energy Security Challenges

    International Nuclear Information System (INIS)

    Larsson, Robert L.

    2007-10-01

    Europe is facing a future of augmenting energy demands, domestic depletion, high prices and other energy-political challenges. Climate change, infrastructure resilience, producers' coercive energy policy and the EU's internal market failures have put stress on the EU's emerging energy policy and inspired the union to address its challenges with greater enthusiasm than before. Some of the EU's challenges call for strategic choices of a magnitude that EU is not used to handle. The aim of this report is therefore to identify, analyse and assess the political side of Europe's energy predicament and import dependency. Against the background of increasing dependence on energy imports, the report tries to answer questions: what are the key dimensions of Europe's energy security and what are their consequences?

  10. The green paper 'towards a European strategy for the security of energy supply'

    International Nuclear Information System (INIS)

    Laponche, B.; Tillerson, K.

    2001-01-01

    The Green Paper, 'Towards a European Strategy for the Security of Energy Supply' was adopted by the European Commission on the 20. of November, 2000 (COM(2000)769 final). At this occasion, the Commission launched a public debate on this strategic document. On the 21. of June 2001, a Public Hearing on Security of energy supply in Europe, on the basis of the Green Paper, was organised by the Committee on Industry, External Trade, Research and Energy of the European Parliament. Bernard Laponche was among the six experts participating to the Hearing and presented the following paper, prepared with Kenya Tillerson. This presentation is organised in three chapters: I - Comments on the Green Paper; II - Energy efficiency potentials; III - Conclusions and Recommendations. Chapter I shows that under the heading of the security of supply, the Green paper elaborates and proposes a global energy strategy taking into account environmental and internal market issues and constraints. This leads to recommendations for a common energy policy for Europe based, as first priority, on a demand policy, i.e. energy efficiency on the demand side. If the necessity of such a policy is clearly stated, the Green paper remains weak on the quantitative objectives, due to the lack of contrasted energy forecast scenarios, as well as on the means of a vigorous energy efficiency policy at European Level. The issue of energy efficiency potentials at European Union level is examined in Chapter II, in the light of the poor information which can be extracted from the energy scenarios presented by the European Commission in various publications. A comparison of energy consumption indicators in France and the European Union leads to a rough estimate of a potential for energy demand efficiency by 2020 of the order of 280 Mtoe on final energy consumption, for the European Union. Chapter III underlines the merits of the Green Paper which are a clear-sighted analysis and a well defined main recommendation

  11. Some Major Issues Influencing Nuclear Energy Prospective

    International Nuclear Information System (INIS)

    Feretic, D.

    2012-01-01

    The presentation analyses some issues which are of particular importance for future nuclear power application. These include duration of uranium reserves and high level radioactive waste decay period in function of uranium reserves (determined, assumed and speculative) and type of fuel cycle used. Public acceptance during essential historical milestones of nuclear power use, influence of safety and compatibility evaluations, quantified risk, externalities and nuclear accidents. Short review of major accidents, causes, consequences, impact of LNT and hormesis hypothesis. Particular problem for future of nuclear power is potential shortage of experienced personnel due to long period without plants construction. To address some of problems which may face future investors a brief review of specific events experienced during construction of NPP Krsko is presented. Such events could be of interest to countries planning to construct nuclear power plant.(author).

  12. Energy and water tradeoffs in enhancing food security: A selective international assessment

    International Nuclear Information System (INIS)

    Mushtaq, Shahbaz; Maraseni, Tek Narayan; Maroulis, Jerry; Hafeez, Mohsin

    2009-01-01

    Rice is the major staple food in most Asian countries. However, with rapidly growing populations, sustained high productivity and yields through improving water productivity is critically important. Increasingly complex energy-agriculture relationships require an in-depth understanding of water and energy tradeoffs. This study contributes to energy and food policies by analysing the complex energy, water and economics dynamics across a selection of major rice growing countries. The results show that tradeoffs exist between yield and energy inputs with high yield attributed to higher levels of energy input. The selected developed countries show higher energy productivity, relative to all other energy inputs, compared to the selected developing counties, owing to enhanced mechanisation, on-farm technology and improved farm management. Among all countries, China has the highest water productivity due to water-saving irrigation practices. These practices offer opportunities for developed and developing countries to increase water productivity at the same time taking advantage of economic and energy benefits of reduced pumping. Sustained production from agriculture is vital to food security. Improved irrigation practices can offset environmental footprints in the short run but their large-scale implementation remains an issue. In the long run, investments are needed to buffer the negative impacts of food production on the environment. Investments to boost water productivity and improved energy use efficiency in crop production are two pathways to reduce energy dependency, enhanced natural resource sustainability and ensuring future food security.

  13. Green paper - towards a European strategy for the security of energy supply, technical document

    International Nuclear Information System (INIS)

    2005-01-01

    The Green Paper sets forth a series of questions regarding the security of energy in Europe. It addresses the issue of increased consumption and dependence on oil, and sketches out possible strategies for broadening the energy supply and slowing global warming. It draws an alarming picture of the EU energy situation. If no action is taken, it predicts that the EU energy dependency will climb from 50% in 2000 to 70% in 2030. The particular situation for the main imported fossil fuels is described. This technical paper is particularly devoted to the context, the energy sources, the supply disruption, the energy demand, the fuel balance, the energy technology and the transport of fuel in the EU (transit). (A.L.B.)

  14. Energy - an overview of issues in power sector

    International Nuclear Information System (INIS)

    Rajan, Y.S.; Anil Kumar, B.

    1998-01-01

    Economic growth is critically dependent on energy which is a key input in all forms of products. With the ecological and environmental concerns for sustainable use of energy, much emphasis is being laid on demand side management, energy efficiency and conservation and alternative sources of energy. This is being witnessed in the long term trends of energy - gross domestic product (GDP) elasticity, which has declined due to changing technology especially for the industrial sector whose share is comparatively reducing in the overall energy consumption. This paper examines mainly the issues involved in meeting the growing demand for electricity, most important form of energy. These issues have been classified as Technical, Financial, Institutional, Policy, Political and International. Each issue is not mutually exclusive of the other and therefore calls for an integrated and holistic approach while addressing them. (author)

  15. China energy, environment, and climate study: Background issues paper

    Energy Technology Data Exchange (ETDEWEB)

    Sinton, Jonathan E.; Fridley, David G.; Logan, Jeffrey; Guo, Yuan; Wang, Bangcheng; Xu, Qing

    2000-10-10

    The total costs and impacts of expanding energy use in China will depend, in part, on a number of important factors, an understanding of which is vital for China's policy-makers. These issues include the additional environmental and public health impacts associated with energy use, the economic costs of infrastructure expansion to meet growing energy needs, and the potential role that renewable energy technologies could play if pushed hard in China's energy future. This short report summarizes major trends and issues in each of these three areas.

  16. China's conception of energy security : sources and international impacts

    Energy Technology Data Exchange (ETDEWEB)

    Constantin, C.

    2005-03-01

    The unique challenges and opportunities associated with China's rapid economic growth were discussed with reference to the potential risk of political disruption or destabilizing international markets. The author notes that two common mistakes are typically made when assessing the evolution of China's energy policy. The first is that China's future path is assimilated with that of developed countries, thereby dismissing evidence that might point toward a different relationship with energy. Second, analysts tend to focus on the external expression of China's energy needs, its oil imports, while overlooking other energy-related issues such as insufficient electricity supplies or environmental degradation. The author argues that Chinese leadership is redefining its understanding of what constitutes energy security for the country. This report assesses the international impacts of such a redefinition along with the international aspects of a business-as-usual scenario in which China pursues its traditional model of energy security. It was emphasized that two different views of energy security lead to different sets of challenges and opportunities for western governments and businesses. 101 refs., 2 figs.

  17. Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security

    Science.gov (United States)

    Islam, M. A.; Hasanuzzaman, M.; Rahim, N. A.; Nahar, A.; Hosenuzzaman, M.

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration. PMID:25243201

  18. Global renewable energy-based electricity generation and smart grid system for energy security.

    Science.gov (United States)

    Islam, M A; Hasanuzzaman, M; Rahim, N A; Nahar, A; Hosenuzzaman, M

    2014-01-01

    Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.

  19. Global Renewable Energy-Based Electricity Generation and Smart Grid System for Energy Security

    Directory of Open Access Journals (Sweden)

    M. A. Islam

    2014-01-01

    Full Text Available Energy is an indispensable factor for the economic growth and development of a country. Energy consumption is rapidly increasing worldwide. To fulfill this energy demand, alternative energy sources and efficient utilization are being explored. Various sources of renewable energy and their efficient utilization are comprehensively reviewed and presented in this paper. Also the trend in research and development for the technological advancement of energy utilization and smart grid system for future energy security is presented. Results show that renewable energy resources are becoming more prevalent as more electricity generation becomes necessary and could provide half of the total energy demands by 2050. To satisfy the future energy demand, the smart grid system can be used as an efficient system for energy security. The smart grid also delivers significant environmental benefits by conservation and renewable generation integration.

  20. Energy consensus talks collapse over nuclear issues

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    Germany's energy consensus talks, ongoing since March 1993, were brought to unsuccessful end on October 26. Representatives from the Social Democratic Party (SDP), led by Lower Saxony's prime minister, Gerhard Schroeder, failed to get approval from party leaders on continued development of advanced reactors with enhanced safety - notably the Siemens/Framatome-designed 1500-MWe European pressurized water reactor (EPR) plan, for which the prospective schedule envisages a construction start in 1998. Nor would the SDP leadership accept the continued operation of existing nuclear plans to the end of their design life (some 20 to 25 years)